Skip to content

No profile (default benchmark)

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000259

    <GroupDescription></GroupDescription>
    Group
  • CICS system data sets are not properly protected.

    &lt;VulnDiscussion&gt;CICS is a transaction-processing product that provides programmers with the facilities to develop interactive applications. U...
    Rule Medium Severity
  • SRG-OS-000080

    <GroupDescription></GroupDescription>
    Group
  • Sensitive CICS transactions are not protected in accordance with security requirements.

    &lt;VulnDiscussion&gt;Sensitive CICS transactions offer the ability to circumvent transaction level controls for accessing resources under CICS. Th...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • CICS System Initialization Table (SIT) parameter values must be specified in accordance with proper security requirements.

    &lt;VulnDiscussion&gt;The CICS SIT is used to define system operation and configuration parameters of a CICS system. Several of these parameters co...
    Rule Medium Severity
  • SRG-OS-000104

    <GroupDescription></GroupDescription>
    Group
  • CICS region logonid(s) must be defined and/or controlled in accordance with the security requirements.

    &lt;VulnDiscussion&gt;CICS is a transaction-processing product that provides programmers with the facilities to develop interactive applications. I...
    Rule Medium Severity
  • SRG-OS-000104

    <GroupDescription></GroupDescription>
    Group
  • CICS default logonid(s) must be defined and/or controlled in accordance with the security requirements.

    &lt;VulnDiscussion&gt;CICS is a transaction-processing product that provides programmers with the facilities to develop interactive applications. I...
    Rule Medium Severity
  • SRG-OS-000029

    <GroupDescription></GroupDescription>
    Group
  • CICS logonid(s) must be configured with proper timeout and signon limits.

    &lt;VulnDiscussion&gt;CICS is a transaction-processing product that provides programmers with the facilities to develop interactive applications. I...
    Rule Medium Severity
  • SRG-OS-000259

    <GroupDescription></GroupDescription>
    Group
  • ACF2/CICS parameter data sets are not protected in accordance with the proper security requirements.

    &lt;VulnDiscussion&gt;CICS is a transaction-processing product that provides programmers with the facilities to develop interactive applications. U...
    Rule Medium Severity
  • SRG-OS-000018

    <GroupDescription></GroupDescription>
    Group
  • IBM CICS Transaction Server SPI command resources must be properly defined and protected.

    &lt;VulnDiscussion&gt;IBM CICS Transaction Server can run with sensitive system privileges, and potentially can circumvent system controls. Failure...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • CICS startup JCL statement is not specified in accordance with the proper security requirements.

    &lt;VulnDiscussion&gt;The CICS SIT is used to define system operation and configuration parameters of a CICS system. Several of these parameters c...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • Key ACF2/CICS parameters must be properly coded.

    &lt;VulnDiscussion&gt;The ACF2/CICS parameters define the security controls in effect for CICS regions. Failure to code the appropriate values coul...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • Sensitive CICS transactions are not protected in accordance with the proper security requirements.

    &lt;VulnDiscussion&gt;Sensitive CICS transactions offer the ability to circumvent transaction level controls for accessing resources under CICS. T...
    Rule Medium Severity
  • SRG-OS-000324

    <GroupDescription></GroupDescription>
    Group
  • Sensitive CICS transactions are not protected in accordance with the proper security requirements.

    &lt;VulnDiscussion&gt;Sensitive CICS transactions offer the ability to circumvent transaction level controls for accessing resources under CICS. T...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules