Skip to content

I - Mission Critical Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000104-GPOS-00051

    Group
  • IBM z/OS Certificate Name Filtering must be implemented with appropriate authorization and documentation.

    To assure accountability and prevent unauthenticated access, organizational users must be identified and authenticated to prevent potential misuse and compromise of the system. Organizational user...
    Rule Medium Severity
  • SRG-OS-000066-GPOS-00034

    Group
  • IBM z/OS must not use Expired Digital Certificates.

    Without path validation, an informed trust decision by the relying party cannot be made when presented with any certificate not already explicitly trusted. A trust anchor is an authoritative entit...
    Rule Medium Severity
  • SRG-OS-000066-GPOS-00034

    Group
  • All IBM z/OS digital certificates in use must have a valid path to a trusted Certification authority.

    Without path validation, an informed trust decision by the relying party cannot be made when presented with any certificate not already explicitly trusted. A trust anchor is an authoritative entit...
    Rule Medium Severity
  • SRG-OS-000001-GPOS-00001

    Group
  • CA-ACF2 OPTS GSO record must be set to ABORT mode.

    Enterprise environments make account management challenging and complex. A manual process for account management functions adds the risk of a potential oversight or other errors. A comprehensive a...
    Rule High Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • The number of ACF2 users granted the special privilege PPGM must be justified.

    To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DoD-approved PKIs, all DoD systems (e.g., web servers and web portals) must be...
    Rule Medium Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • The number of ACF2 users granted the special privilege OPERATOR must be kept to a strictly controlled minimum.

    To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DoD-approved PKIs, all DoD systems (e.g., web servers and web portals) must be...
    Rule Low Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • The number of ACF2 users granted the special privilege CONSOLE must be justified.

    To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DoD-approved PKIs, all DoD systems (e.g., web servers and web portals) must be...
    Rule Low Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • The number of ACF2 users granted the special privilege ALLCMDS must be justified.

    To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DoD-approved PKIs, all DoD systems (e.g., web servers and web portals) must be...
    Rule Medium Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • IBM z/OS system commands must be properly protected.

    To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DoD-approved PKIs, all DoD systems (e.g., web servers and web portals) must be...
    Rule Medium Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • IBM z/OS Sensitive Utility Controls must be properly defined and protected.

    To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DoD-approved PKIs, all DoD systems (e.g., web servers and web portals) must be...
    Rule Medium Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • CA-ACF2 NJE GSO record value must indicate validation options that apply to jobs submitted through a network job entry subsystem (JES2, JES3, RSCS).

    To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DoD-approved PKIs, all DoD systems (e.g., web servers and web portals) must be...
    Rule Medium Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • CA-ACF2 must protect Memory and privileged program dumps in accordance with proper security requirements.

    To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DoD-approved PKIs, all DoD systems (e.g., web servers and web portals) must be...
    Rule Medium Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • CA-ACF2 must properly define users that have access to the CONSOLE resource in the TSOAUTH resource class.

    To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DoD-approved PKIs, all DoD systems (e.g., web servers and web portals) must be...
    Rule Medium Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • CA-ACF2 must limit access to SYSTEM DUMP data sets to appropriate authorized users.

    Access control policies include: identity-based policies, role-based policies, and attribute-based policies. Access enforcement mechanisms include: access control lists, access control matrices, an...
    Rule Medium Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • CA-ACF2 must limit access to SYS(x).TRACE to system programmers only.

    To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DoD-approved PKIs, all DoD systems (e.g., web servers and web portals) must be...
    Rule Medium Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • CA-ACF2 allocate access to system user catalogs must be properly protected.

    Access control policies include: identity-based policies, role-based policies, and attribute-based policies. Access enforcement mechanisms include: access control lists, access control matrices, an...
    Rule Medium Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • ACF2 Classes required to properly security the z/OS UNIX environment must be ACTIVE.

    To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DoD-approved PKIs, all DoD systems (e.g., web servers and web portals) must be...
    Rule Medium Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • Access to IBM z/OS special privilege TAPE-LBL or TAPE-BLP must be limited and/or justified.

    To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DoD-approved PKIs, all DoD systems (e.g., web servers and web portals) must be...
    Rule Medium Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • CA-ACF2 must limit access to System page data sets (i.e., PLPA, COMMON, and LOCALx) to system programmers.

    To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DoD-approved PKIs, all DoD systems (e.g., web servers and web portals) must be...
    Rule Medium Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • IBM z/OS must protect dynamic lists in accordance with proper security requirements.

    To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DoD-approved PKIs, all DoD systems (e.g., web servers and web portals) must be...
    Rule High Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • IBM z/OS Libraries included in the system REXXLIB concatenation must be properly protected.

    To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DoD-approved PKIs, all DoD systems (e.g., web servers and web portals) must be...
    Rule High Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • CA-ACF2 must limit Write or greater access to SYS1.UADS To system programmers only and read and update access must be limited to system programmer personnel and/or security personnel.

    To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DoD-approved PKIs, all DoD systems (e.g., web servers and web portals) must be...
    Rule High Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • CA-ACF2 must limit all system PROCLIB data sets to appropriate authorized users.

    To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DoD-approved PKIs, all DoD systems (e.g., web servers and web portals) must be...
    Rule High Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • CA-ACF2 access to the System Master Catalog must be properly protected.

    To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DoD-approved PKIs, all DoD systems (e.g., web servers and web portals) must be...
    Rule High Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • IBM z/OS MCS consoles access authorization(s) for CONSOLE resource(s) must be properly protected.

    To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DoD-approved PKIs, all DoD systems (e.g., web servers and web portals) must be...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules