Skip to content

III - Administrative Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000066-GPOS-00034

    Group
  • All IBM z/OS digital certificates in use must have a valid path to a trusted Certification Authority (CA).

    Without path validation, an informed trust decision by the relying party cannot be made when presented with any certificate not already explicitly trusted. A trust anchor is an authoritative entit...
    Rule Medium Severity
  • SRG-OS-000066-GPOS-00034

    Group
  • Expired IBM z/OS digital certificates must not be used.

    Without path validation, an informed trust decision by the relying party cannot be made when presented with any certificate not already explicitly trusted. A trust anchor is an authoritative entit...
    Rule Medium Severity
  • SRG-OS-000104-GPOS-00051

    Group
  • IBM z/OS must have Certificate Name Filtering implemented with appropriate authorization and documentation.

    To assure accountability and prevent unauthenticated access, organizational users must be identified and authenticated to prevent potential misuse and compromise of the system. Organizational user...
    Rule Medium Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • CA-TSS Security control ACIDs must be limited to the administrative authorities authorized and that require these privileges to perform their job duties.

    The use of security policy filters provides protection for the confidentiality of data by restricting the flow of data. A crucial part of any flow control solution is the ability to configure polic...
    Rule High Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • The number of CA-TSS ACIDs possessing the tape Bypass Label Processing (BLP) privilege must be limited.

    The use of security policy filters provides protection for the confidentiality of data by restricting the flow of data. A crucial part of any flow control solution is the ability to configure polic...
    Rule Medium Severity
  • SRG-OS-000001-GPOS-00001

    Group
  • CA-TSS MODE Control Option must be set to FAIL.

    Enterprise environments make account management challenging and complex. A manual process for account management functions adds the risk of a potential oversight or other errors. A comprehensive a...
    Rule High Severity
  • SRG-OS-000021-GPOS-00005

    Group
  • The CA-TSS NPWRTHRESH Control Option must be properly set.

    By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-force attacks, is reduced. Limits are imposed by locking...
    Rule Medium Severity
  • SRG-OS-000021-GPOS-00005

    Group
  • The CA-TSS NPPTHRESH Control Option must be properly set.

    By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-force attacks, is reduced. Limits are imposed by locking...
    Rule Medium Severity
  • SRG-OS-000021-GPOS-00005

    Group
  • The CA-TSS PTHRESH Control Option must be set to 2.

    By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-force attacks, is reduced. Limits are imposed by locking...
    Rule Medium Severity
  • SRG-OS-000057-GPOS-00027

    Group
  • IBM z/OS must limit access for SMF collection files (i.e., SYS1.MANx) to appropriate users and/or batch jobs that perform SMF dump processing.

    SMF data collection is the system activity journaling facility of the z/OS system. Unauthorized access could result in the compromise of logging and recording of the operating system environment, E...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules