No profile (default benchmark)
Rules and Groups employed by this XCCDF Profile
-
SRG-OS-000029-GPOS-00010
<GroupDescription></GroupDescription>Group -
IBM z/OS Session manager must properly configure wait time limits.
<VulnDiscussion>A session time-out lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinit...Rule Medium Severity -
SRG-OS-000032-GPOS-00013
<GroupDescription></GroupDescription>Group -
The IBM z/OS BPX.SMF resource must be properly configured.
<VulnDiscussion>Remote access services, such as those providing remote access to network devices and information systems, which lack automate...Rule Medium Severity -
SRG-OS-000038-GPOS-00016
<GroupDescription></GroupDescription>Group -
IBM z/OS must specify SMF data options to ensure appropriate activation.
<VulnDiscussion>Without establishing when events occurred, it is impossible to establish, correlate, and investigate the events leading up to...Rule Medium Severity -
SRG-OS-000046-GPOS-00022
<GroupDescription></GroupDescription>Group -
IBM z/OS BUFUSEWARN in the SMFPRMxx must be properly set.
<VulnDiscussion>It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required....Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
IBM z/OS PASSWORD data set and OS passwords must not be used.
<VulnDiscussion>Configuring the operating system to implement organization-wide security implementation guides and security checklists ensure...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
The CA-TSS database must be on a separate physical volume from its backup and recovery data sets.
<VulnDiscussion>Configuring the operating system to implement organization-wide security implementation guides and security checklists ensure...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
The CA-TSS database must be backed up on a scheduled basis.
<VulnDiscussion>Configuring the operating system to implement organization-wide security implementation guides and security checklists ensure...Rule Medium Severity -
SRG-OS-000480-GPOS-00232
<GroupDescription></GroupDescription>Group -
The IBM z/OS Policy Agent must be configured to deny-all, allow-by-exception firewall policy for allowing connections to other systems.
<VulnDiscussion>Configuration settings are the set of parameters that can be changed in hardware, software, or firmware components of the sys...Rule Medium Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
IBM z/OS must not have Inaccessible APF libraries defined.
<VulnDiscussion>It is detrimental for operating systems to provide, or install by default, functionality exceeding requirements or mission ob...Rule Medium Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
IBM z/OS inapplicable PPT entries must be invalidated.
<VulnDiscussion>It is detrimental for operating systems to provide, or install by default, functionality exceeding requirements or mission ob...Rule Medium Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
IBM z/OS LNKAUTH=APFTAB must be specified in the IEASYSxx member(s) in the currently active parmlib data set(s).
<VulnDiscussion>It is detrimental for operating systems to provide, or install by default, functionality exceeding requirements or mission ob...Rule Medium Severity -
SRG-OS-000138-GPOS-00069
<GroupDescription></GroupDescription>Group -
IBM z/OS sensitive and critical system data sets must not exist on shared DASD.
<VulnDiscussion>Preventing unauthorized information transfers mitigates the risk of information, including encrypted representations of infor...Rule Medium Severity -
SRG-OS-000142-GPOS-00071
<GroupDescription></GroupDescription>Group -
The IBM z/OS Policy Agent must contain a policy that manages excess capacity, bandwidth, or other redundancy to limit the effects of information flooding types of denial-of-service (DoS) attacks.
<VulnDiscussion>DoS is a condition when a resource is not available for legitimate users. When this occurs, the organization either cannot ac...Rule Medium Severity -
SRG-OS-000274-GPOS-00104
<GroupDescription></GroupDescription>Group -
The IBM z/OS system administrator (SA) must develop a process to notify appropriate personnel when accounts are created.
<VulnDiscussion>Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of reestablishing ...Rule Medium Severity -
SRG-OS-000275-GPOS-00105
<GroupDescription></GroupDescription>Group -
The IBM z/OS system administrator (SA) must develop a process to notify appropriate personnel when accounts are modified.
<VulnDiscussion>Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of reestablishing ...Rule Medium Severity -
SRG-OS-000276-GPOS-00106
<GroupDescription></GroupDescription>Group -
The IBM z/OS system administrator (SA) must develop a process to notify appropriate personnel when accounts are deleted.
<VulnDiscussion>When operating system accounts are disabled, user accessibility is affected. Accounts are utilized for identifying individual...Rule Medium Severity -
SRG-OS-000277-GPOS-00107
<GroupDescription></GroupDescription>Group -
The IBM z/OS system administrator (SA) must develop a process to notify appropriate personnel when accounts are removed.
<VulnDiscussion>When operating system accounts are disabled, user accessibility is affected. Accounts are utilized for identifying individual...Rule Medium Severity -
SRG-OS-000368-GPOS-00154
<GroupDescription></GroupDescription>Group -
Unsupported IBM z/OS system software must not be installed and/or active on the system.
<VulnDiscussion>Control of program execution is a mechanism used to prevent execution of unauthorized programs. Some operating systems may pr...Rule High Severity -
SRG-OS-000368-GPOS-00154
<GroupDescription></GroupDescription>Group -
IBM z/OS must not allow nonexistent or inaccessible Link Pack Area (LPA) libraries.
<VulnDiscussion>Control of program execution is a mechanism used to prevent execution of unauthorized programs. Some operating systems may pr...Rule Medium Severity -
SRG-OS-000368-GPOS-00154
<GroupDescription></GroupDescription>Group -
IBM z/OS must not allow nonexistent or inaccessible LINKLIST libraries.
<VulnDiscussion>Control of program execution is a mechanism used to prevent execution of unauthorized programs. Some operating systems may pr...Rule Medium Severity -
SRG-OS-000364-GPOS-00151
<GroupDescription></GroupDescription>Group -
CA-TSS must be installed and properly configured.
<VulnDiscussion>Failure to provide logical access restrictions associated with changes to system configuration may have significant effects o...Rule High Severity -
SRG-OS-000341-GPOS-00132
<GroupDescription></GroupDescription>Group -
IBM z/OS SMF collection files (system MANx data sets or LOGSTREAM DASD) must have storage capacity to store at least one weeks worth of audit data.
<VulnDiscussion>In order to ensure operating systems have a sufficient storage capacity in which to write the audit logs, operating systems n...Rule Medium Severity -
SRG-OS-000342-GPOS-00133
<GroupDescription></GroupDescription>Group -
IBM z/OS System Administrators must develop an automated process to collect and retain SMF data.
<VulnDiscussion>Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common...Rule Medium Severity -
SRG-OS-000355-GPOS-00143
<GroupDescription></GroupDescription>Group -
The IBM z/OS SNTP daemon (SNTPD) must be active.
<VulnDiscussion>Inaccurate time stamps make it more difficult to correlate events and can lead to an inaccurate analysis. Determining the cor...Rule Medium Severity -
SRG-OS-000355-GPOS-00143
<GroupDescription></GroupDescription>Group -
IBM z/OS SNTP daemon (SNTPD) permission bits must be properly configured.
<VulnDiscussion>Inaccurate time stamps make it more difficult to correlate events and can lead to an inaccurate analysis. Determining the cor...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.