I - Mission Critical Public
Rules and Groups employed by this XCCDF Profile
-
SRG-OS-000066-GPOS-00034
Group -
All IBM z/OS digital certificates in use must have a valid path to a trusted Certification Authority (CA).
Without path validation, an informed trust decision by the relying party cannot be made when presented with any certificate not already explicitly trusted. A trust anchor is an authoritative entit...Rule Medium Severity -
SRG-OS-000066-GPOS-00034
Group -
Expired IBM z/OS digital certificates must not be used.
Without path validation, an informed trust decision by the relying party cannot be made when presented with any certificate not already explicitly trusted. A trust anchor is an authoritative entit...Rule Medium Severity -
SRG-OS-000104-GPOS-00051
Group -
IBM z/OS must have Certificate Name Filtering implemented with appropriate authorization and documentation.
To assure accountability and prevent unauthenticated access, organizational users must be identified and authenticated to prevent potential misuse and compromise of the system. Organizational user...Rule Medium Severity -
SRG-OS-000080-GPOS-00048
Group -
CA-TSS Security control ACIDs must be limited to the administrative authorities authorized and that require these privileges to perform their job duties.
The use of security policy filters provides protection for the confidentiality of data by restricting the flow of data. A crucial part of any flow control solution is the ability to configure polic...Rule High Severity -
SRG-OS-000080-GPOS-00048
Group -
The number of CA-TSS ACIDs possessing the tape Bypass Label Processing (BLP) privilege must be limited.
The use of security policy filters provides protection for the confidentiality of data by restricting the flow of data. A crucial part of any flow control solution is the ability to configure polic...Rule Medium Severity -
SRG-OS-000001-GPOS-00001
Group -
CA-TSS MODE Control Option must be set to FAIL.
Enterprise environments make account management challenging and complex. A manual process for account management functions adds the risk of a potential oversight or other errors. A comprehensive a...Rule High Severity -
SRG-OS-000021-GPOS-00005
Group -
The CA-TSS NPWRTHRESH Control Option must be properly set.
By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-force attacks, is reduced. Limits are imposed by locking...Rule Medium Severity -
SRG-OS-000021-GPOS-00005
Group -
The CA-TSS NPPTHRESH Control Option must be properly set.
By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-force attacks, is reduced. Limits are imposed by locking...Rule Medium Severity -
SRG-OS-000021-GPOS-00005
Group -
The CA-TSS PTHRESH Control Option must be set to 2.
By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-force attacks, is reduced. Limits are imposed by locking...Rule Medium Severity -
SRG-OS-000057-GPOS-00027
Group -
IBM z/OS must limit access for SMF collection files (i.e., SYS1.MANx) to appropriate users and/or batch jobs that perform SMF dump processing.
SMF data collection is the system activity journaling facility of the z/OS system. Unauthorized access could result in the compromise of logging and recording of the operating system environment, E...Rule Medium Severity -
SRG-OS-000063-GPOS-00032
Group -
IBM z/OS SYS1.PARMLIB must be properly protected.
Without the capability to restrict which roles and individuals can select which events are audited, unauthorized personnel may be able to prevent the auditing of critical events. Misconfigured audi...Rule High Severity -
SRG-OS-000067-GPOS-00035
Group -
IBM z/OS for PKI-based authentication must use ICSF or the ESM to store keys.
If the private key is discovered, an attacker can use the key to authenticate as an authorized user and gain access to the network infrastructure. The cornerstone of the PKI is the private key use...Rule Medium Severity -
SRG-OS-000069-GPOS-00037
Group -
The CA-TSS NEWPHRASE and PPSCHAR Control Options must be properly set.
Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure of the effectiveness of a password in resistin...Rule Medium Severity -
SRG-OS-000071-GPOS-00039
Group -
The CA-TSS NEWPW control options must be properly set.
If the private key is stolen, this will lead to the compromise of the authentication and nonrepudiation gained through PKI because the attacker can use the private key to digitally sign documents a...Rule Medium Severity -
SRG-OS-000073-GPOS-00041
Group -
IBM z/OS must use NIST FIPS-validated cryptography to protect passwords in the security database.
Passwords need to be protected at all times, and encryption is the standard method for protecting passwords. If passwords are not encrypted, they can be plainly read (i.e., clear text) and easily c...Rule High Severity -
SRG-OS-000076-GPOS-00044
Group -
The CA-TSS PWEXP Control Option must be set to 60.
Any password, no matter how complex, can eventually be cracked. Therefore, passwords need to be changed periodically. If the operating system does not limit the lifetime of passwords and force user...Rule Medium Severity -
SRG-OS-000076-GPOS-00044
Group -
The CA-TSS PPEXP Control Option must be properly set.
Any password, no matter how complex, can eventually be cracked. Therefore, passwords need to be changed periodically. If the operating system does not limit the lifetime of passwords and force user...Rule Medium Severity -
SRG-OS-000077-GPOS-00045
Group -
The CA-TSS PWHIST Control Option must be set to 10 or greater.
Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. If the information system or application allows the user...Rule Medium Severity -
SRG-OS-000077-GPOS-00045
Group -
The CA-TSS PPHIST Control Option must be properly set.
Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. If the information system or application allows the user...Rule Medium Severity -
SRG-OS-000080-GPOS-00048
Group -
CA-TSS access to SYS1.LINKLIB must be properly protected.
To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DOD-approved PKIs, all DOD systems (e.g., web servers and web portals) must be...Rule Medium Severity -
SRG-OS-000080-GPOS-00048
Group -
CA-TSS must limit Write or greater access to SYS1.SVCLIB to system programmers only.
To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DoD-approved PKIs, all DoD systems (e.g., web servers and web portals) must be...Rule High Severity -
SRG-OS-000080-GPOS-00048
Group -
CA-TSS must limit Write or greater access to SYS1.IMAGELIB to system programmers only.
To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DoD-approved PKIs, all DoD systems (e.g., web servers and web portals) must be...Rule High Severity -
SRG-OS-000080-GPOS-00048
Group -
CA-TSS must limit Write or greater access to SYS1.LPALIB to system programmers only.
To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DoD-approved PKIs, all DoD systems (e.g., web servers and web portals) must be...Rule High Severity -
SRG-OS-000080-GPOS-00048
Group -
CA-TSS must limit WRITE or greater access to all APF-authorized libraries to system programmers only.
To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DoD-approved PKIs, all DoD systems (e.g., web servers and web portals) must be...Rule High Severity -
SRG-OS-000080-GPOS-00048
Group -
IBM z/OS libraries included in the system REXXLIB concatenation must be properly protected.
To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DoD-approved PKIs, all DoD systems (e.g., web servers and web portals) must be...Rule High Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.