Mainframe Product Security Requirements Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates ✎ 7
Comparison against the immediately-prior release (V1R3). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Content changes 7
- V-68145 Medium description The Mainframe Product must notify system programmers and security administrators when accounts are created.
- V-68147 Medium description The Mainframe Product must notify system programmers and security administrators when accounts are modified.
- V-68149 Medium description The Mainframe Product must notify system programmers and security administrators for account disabling actions.
- V-68151 Medium description The Mainframe Product must notify system programmers and security administrators for account removal actions.
- V-68153 Medium description The Mainframe Product must automatically audit account enabling actions.
- V-68157 Medium description The Mainframe Product must notify system programmers and security administrators of account enabling actions.
- V-68189 Medium checkfix The Mainframe Product must allow only the information system security manager (ISSM) or individuals or roles appointed by the ISSM to select which auditable events are to be audited.
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- SRG-APP-000001-MFP-000001
- Vuln IDs
-
- V-67801
- Rule IDs
-
- SV-82291r1_rule
Checks: C-68369r1_chk
If the Mainframe Product has no log on capability, this requirement is not applicable. Examine installation and configuration settings. If concurrent sessions are not limited to three per account by type of user, this is a finding.
Fix: F-73917r1_fix
Configure the Mainframe Product to limit current sessions to three per account by type of user.
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000060
- Version
- SRG-APP-000002-MFP-000002
- Vuln IDs
-
- V-68109
- Rule IDs
-
- SV-82599r1_rule
Checks: C-68667r1_chk
If the Mainframe Product has no data screen capability, this requirement is not applicable. Examine configuration parameters to determine whether information previously displayed on the screen is concealed at a session lock. If information is not concealed, this is a finding.
Fix: F-74225r1_fix
Configure the Mainframe Product to conceal previously displayed information at a session lock.
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000057
- Version
- SRG-APP-000003-MFP-000003
- Vuln IDs
-
- V-68111
- Rule IDs
-
- SV-82601r1_rule
Checks: C-68669r1_chk
If the Mainframe Product has no data screen capability, this requirement is not applicable. Examine configuration parameters to determine whether the Mainframe Product performs a session lock after 15 minutes of inactivity. If it does not, this is a finding.
Fix: F-74227r1_fix
Configure the Mainframe Product to perform a session lock after 15 minutes of inactivity.
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000058
- Version
- SRG-APP-000004-MFP-000004
- Vuln IDs
-
- V-68113
- Rule IDs
-
- SV-82603r1_rule
Checks: C-68671r1_chk
If the Mainframe Product has no data screen capability, this requirement is not applicable. Determine whether the Mainframe Product allows users to directly initiate a session lock. If it does not this is a finding. Examine the Mainframe Product configuration parameters and user attributes to determine whether user can initiate a session lock. If the parameters are not properly set and/or user is not permitted, this is a finding.
Fix: F-74229r1_fix
Configure the Mainframe Product user’s attributes to enable ability to initiate a session lock. Verify the external security manager permits it.
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000056
- Version
- SRG-APP-000005-MFP-000005
- Vuln IDs
-
- V-68115
- Rule IDs
-
- SV-82605r1_rule
Checks: C-68673r1_chk
If the Mainframe Product has no data screen capability, this requirement is not applicable. Determine whether the Mainframe Product has the capability to retain the session lock until user reestablishes access using established Identification and authentication procedures. If it does not, this is a finding. Examine configuration settings to determine if sessions locks are held until the user reestablishes access. If they are not properly set, this is a finding.
Fix: F-74231r1_fix
Configure the Mainframe Product setting to retain session locks until user reestablishes access using established identification and authentication procedures.
- RMF Control
- AC-12
- Severity
- M
- CCI
- CCI-002361
- Version
- SRG-APP-000295-MFP-000006
- Vuln IDs
-
- V-68117
- Rule IDs
-
- SV-82607r1_rule
Checks: C-68675r1_chk
If the Mainframe Product has no data screen capability, this requirement is not applicable. Determine whether the Mainframe Product has capability to terminate user sessions according to conditions as defined in site security plan and triggers. If it cannot, this is a finding. Examine Configuration settings to determine whether the Mainframe Product is configured to automatically terminate sessions. If it is not, this is a finding.
Fix: F-74233r1_fix
Configure the Mainframe Product to automatically terminate a user session after any conditions as defined in site security plan or trigger requiring disconnect.
- RMF Control
- AC-12
- Severity
- M
- CCI
- CCI-002363
- Version
- SRG-APP-000296-MFP-000007
- Vuln IDs
-
- V-68119
- Rule IDs
-
- SV-82609r1_rule
Checks: C-68677r1_chk
If the Mainframe Product has no logon capability, this requirement is not applicable. If the Mainframe Product does not provide a logout capability for user initiated communication sessions, this is a finding. Examine the Mainframe Product configuration settings to determine whether a user can logoff. If the configurations are not properly set, this is a finding.
Fix: F-74235r1_fix
Configure the Mainframe Product settings to provide capability of user-initiated logoff.
- RMF Control
- AC-12
- Severity
- M
- CCI
- CCI-002364
- Version
- SRG-APP-000297-MFP-000008
- Vuln IDs
-
- V-68121
- Rule IDs
-
- SV-82611r1_rule
Checks: C-68679r1_chk
If the Mainframe Product has no logon capability, this requirement is not applicable. Examine the Mainframe Product configuration settings to determine whether the Mainframe Product displays an explicit logoff message. If it does not, this is a finding
Fix: F-74237r1_fix
Configure the Mainframe Product to display a specific logoff message.
- RMF Control
- AC-16
- Severity
- M
- CCI
- CCI-002262
- Version
- SRG-APP-000311-MFP-000025
- Vuln IDs
-
- V-68123
- Rule IDs
-
- SV-82613r1_rule
Checks: C-68681r1_chk
If the Mainframe Product does not perform data management or storage function this is not applicable. Examine installation and configuration settings and / or specific meta-data for security attributes as defined by the organization. If there is no data labeling or tagging, this is a finding.
Fix: F-74239r1_fix
Configure the Mainframe Product to associate organization-defined security attributes to managed data sets in storage. Verify the datasets attributes are labeled and/or tagged appropriately.
- RMF Control
- AC-16
- Severity
- M
- CCI
- CCI-002263
- Version
- SRG-APP-000313-MFP-000026
- Vuln IDs
-
- V-68125
- Rule IDs
-
- SV-82615r1_rule
Checks: C-68683r1_chk
If the Mainframe Product does not perform data management or storage function this is not applicable. Examine installation and configuration settings and / or specific meta-data for individual types of security attributes as defined by the organization. If there is no specific data labeling or tagging, this is a finding.
Fix: F-74241r1_fix
Configure the Mainframe Product to associate organization-defined security attributes to managed data sets in process. Verify the datasets attributes are labeled and/or tagged appropriately.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000015
- Version
- SRG-APP-000023-MFP-000033
- Vuln IDs
-
- V-68127
- Rule IDs
-
- SV-82617r1_rule
Checks: C-68685r1_chk
Examine installation and configuration settings. If the Mainframe Product does not use an external security manager to support all account management functions, this is a finding.
Fix: F-74243r1_fix
Configure the Mainframe Product to use an external security manager for all account management functions.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-002142
- Version
- SRG-APP-000317-MFP-000034
- Vuln IDs
-
- V-68129
- Rule IDs
-
- SV-82619r1_rule
Checks: C-68687r1_chk
If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine account management settings. If Shared/group credentials are not terminated when members leave the group, this is a finding.
Fix: F-74245r1_fix
Configure the Mainframe Product account management settings to terminate shared/group account credentials when members leave the group.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000016
- Version
- SRG-APP-000024-MFP-000036
- Vuln IDs
-
- V-68131
- Rule IDs
-
- SV-82621r1_rule
Checks: C-68689r1_chk
If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine account management settings. If temporary users are not removed or disabled after 72 hours, this is a finding.
Fix: F-74247r1_fix
Configure the Mainframe Product account management settings to automatically remove or disable temporary user accounts after 72 hours.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001682
- Version
- SRG-APP-000234-MFP-000037
- Vuln IDs
-
- V-68133
- Rule IDs
-
- SV-82623r1_rule
Checks: C-68691r1_chk
If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine account management settings. If emergency accounts are configured to never be automatically removed or disabled, this is not a finding.
Fix: F-74249r1_fix
Configure the Mainframe Product account management settings to never automatically remove or disable emergency accounts. Accounts should be configured to terminate within 72 hours or until crisis has passed.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000017
- Version
- SRG-APP-000025-MFP-000038
- Vuln IDs
-
- V-68135
- Rule IDs
-
- SV-82625r1_rule
Checks: C-68693r1_chk
If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine account management settings. If the Mainframe Product automatically disables accounts after 35 days of inactivity, this is not a finding.
Fix: F-74251r1_fix
Configure the Mainframe Product account management settings to automatically disable accounts after 35 days of account inactivity.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000018
- Version
- SRG-APP-000026-MFP-000039
- Vuln IDs
-
- V-68137
- Rule IDs
-
- SV-82627r1_rule
Checks: C-68695r1_chk
If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine account management settings. If the Mainframe Product does not automatically audit account creation, this is a finding.
Fix: F-74253r1_fix
Configure the Mainframe Product account management settings to automatically audit account creation.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001403
- Version
- SRG-APP-000027-MFP-000040
- Vuln IDs
-
- V-68139
- Rule IDs
-
- SV-82629r1_rule
Checks: C-68697r1_chk
If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine account management settings. If the Mainframe Product does not automatically audit account modification, this is a finding.
Fix: F-74255r1_fix
Configure the Mainframe Product account management settings to automatically audit account modification.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001404
- Version
- SRG-APP-000028-MFP-000041
- Vuln IDs
-
- V-68141
- Rule IDs
-
- SV-82631r1_rule
Checks: C-68699r1_chk
If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine account management settings. If the Mainframe Product does not automatically audit account disabling actions, this is a finding.
Fix: F-74257r1_fix
Configure the Mainframe Product account management settings to automatically audit account disabling actions.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001405
- Version
- SRG-APP-000029-MFP-000042
- Vuln IDs
-
- V-68143
- Rule IDs
-
- SV-82633r1_rule
Checks: C-68701r1_chk
If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine account management settings. If the Mainframe Product does not automatically audit account removal actions, this is a finding.
Fix: F-74259r1_fix
Configure the Mainframe Product account management settings to automatically audit account removal actions.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001683
- Version
- SRG-APP-000291-MFP-000043
- Vuln IDs
-
- V-68145
- Rule IDs
-
- SV-82635r2_rule
Checks: C-68705r1_chk
If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine account management settings. If the Mainframe Product does not notify system programmers and security administrators when accounts are created, this is a finding.
Fix: F-74261r1_fix
Configure the Mainframe Product account management settings to notify system programmers and security administrators when accounts are created.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001684
- Version
- SRG-APP-000292-MFP-000044
- Vuln IDs
-
- V-68147
- Rule IDs
-
- SV-82637r2_rule
Checks: C-68707r1_chk
If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine account management settings. If the Mainframe Product does not notify system programmers and security administrators when accounts are modified, this is a finding.
Fix: F-74263r1_fix
Configure the Mainframe Product account management settings to notify system programmers and security administrators when accounts are modified.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001685
- Version
- SRG-APP-000293-MFP-000045
- Vuln IDs
-
- V-68149
- Rule IDs
-
- SV-82639r2_rule
Checks: C-68709r1_chk
If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine account management settings. If the Mainframe Product does not notify System programmers and security administrators of account disabling actions, this is a finding.
Fix: F-74265r1_fix
Configure the Mainframe Product account management settings to notify system programmers and security administrators when there are account disabling actions performed.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001686
- Version
- SRG-APP-000294-MFP-000046
- Vuln IDs
-
- V-68151
- Rule IDs
-
- SV-82641r2_rule
Checks: C-68711r1_chk
If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine account management settings. If the Mainframe Product does not notify system programmers and security administrators of account removal actions, this is a finding.
Fix: F-74267r1_fix
Configure the Mainframe Product account management settings to notify system programmers and security administrators when there are account removal actions performed.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-002130
- Version
- SRG-APP-000319-MFP-000047
- Vuln IDs
-
- V-68153
- Rule IDs
-
- SV-82643r2_rule
Checks: C-68713r1_chk
If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine account management settings. If the Mainframe Product does not automatically audit account creation, this is a finding.
Fix: F-74269r1_fix
Configure the Mainframe Product account management settings to automatically audit account enabling actions.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-002132
- Version
- SRG-APP-000320-MFP-000048
- Vuln IDs
-
- V-68157
- Rule IDs
-
- SV-82647r2_rule
Checks: C-68715r1_chk
If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine account management settings. If the Mainframe Product does not notify system programmers and security administrators of account enabling actions, this is a finding.
Fix: F-74273r1_fix
Configure the Mainframe Product account management settings to notify system programmers and security administrators of account enabling actions.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- SRG-APP-000033-MFP-000056
- Vuln IDs
-
- V-68159
- Rule IDs
-
- SV-82649r1_rule
Checks: C-68719r1_chk
If an external security manager is used, check the external security manager rules and configuration. If there are no rules for these resources or the rules do not restrict user access in accordance with applicable access control policies, this is a finding. Examine mainframe product installation and configuration settings. Verify that the Mainframe Product enforces role and/or resource access in accordance with applicable access control policies. If it does not, this is a finding.
Fix: F-74275r1_fix
Configure the Mainframe Product to enforce role and/or resource access in accordance with applicable access control policies. This can be accomplished using an external security manager. Configure the external security manager to restrict user access according to applicable access control policies.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- SRG-APP-000033-MFP-000057
- Vuln IDs
-
- V-68161
- Rule IDs
-
- SV-82651r1_rule
Checks: C-68721r1_chk
If an external security manager is used, check the external security manager rules and configuration. If there are no rules for these resources or the rules do not restrict security administrator access in accordance with applicable access control policies, this is a finding. Examine installation and configuration settings. Verify that the Mainframe Product enforces security administrator access to information and system resources in accordance with applicable access control policies. If it does not, this is a finding.
Fix: F-74277r1_fix
Configure the Mainframe Product to enforce role and/or resource access in accordance with applicable access control policies. This can be accomplished using an external security manager. Configure the external security manager to restrict security administrator access according to applicable access control policies.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002165
- Version
- SRG-APP-000328-MFP-000061
- Vuln IDs
-
- V-68163
- Rule IDs
-
- SV-82653r1_rule
Checks: C-68725r1_chk
Examine installation, configuration, and product documentation. If the Mainframe Product does not enforce organization-defined discretionary access control policies over defined subjects and objects, this is a finding.
Fix: F-74279r1_fix
If necessary, configure the Mainframe Product installation and configuration settings to enforce organization-defined discretionary access control policies over defined subjects and objects.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- SRG-APP-000033-MFP-000066
- Vuln IDs
-
- V-68165
- Rule IDs
-
- SV-82655r1_rule
Checks: C-68727r1_chk
If an external security manager (ESM) is used, check the ESM rules and configuration. If there are no rules for these resources or the rules do not restrict system programmer access in accordance with applicable access control policies, this is a finding. If an ESM is not in use, examine installation and configuration settings. Verify that the Mainframe Product enforces system programmer access to information and system resources in accordance with applicable access control policies. If it does not, this is a finding.
Fix: F-74281r1_fix
Configure the Mainframe Product to enforce role and/or resource access in accordance with applicable access control policies. This can be accomplished using an ESM. Configure the ESM to restrict system programmer access according to applicable access control policies.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001368
- Version
- SRG-APP-000038-MFP-000067
- Vuln IDs
-
- V-68167
- Rule IDs
-
- SV-82657r1_rule
Checks: C-68729r1_chk
Examine installation and configuration settings. Verify that the Mainframe Product enforces approved authorizations for controlling the flow of information within the system with applicable access control policies. If it does not, this is a finding.
Fix: F-74283r1_fix
Configure the Mainframe Product to enforce approved authorizations for controlling the flow of information within the system with applicable access control policies.
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- SRG-APP-000340-MFP-000088
- Vuln IDs
-
- V-68169
- Rule IDs
-
- SV-82659r1_rule
Checks: C-68731r1_chk
Examine installation and configuration settings. Determine the Mainframe Product privileged functions. If the Mainframe Product uses an external security manager (ESM) for access authorizations, verify the ESM prevents access to privileged functions to appropriate privileged users. If it does not, this is a finding. If the Mainframe Product does not use an ESM to verify installation and configuration settings to prevent access to privileged functions to appropriate privileged users, this is a finding.
Fix: F-74285r1_fix
Configure the Mainframe Product to prevent non-privileged users from executing privileged functions. This can be accomplished using the ESM. Configure the ESM to restrict update and higher access to privileged functions to privileged users.
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002233
- Version
- SRG-APP-000342-MFP-000090
- Vuln IDs
-
- V-68171
- Rule IDs
-
- SV-82661r1_rule
Checks: C-68733r1_chk
Examine installation and configuration settings. Determine that the Mainframe Product identifies functions requiring elevated privileges. If the Mainframe Product uses an external security manager ensure that execution uses authority of the initiating user rather than that of the Mainframe Product. If it does not, this is a finding. The Mainframe Product does not use an external security manager ensure installation and configuration settings use the authority of the initiating user rather than that of the Mainframe Product. If it does not, this is a finding.
Fix: F-74287r1_fix
Using information from the Mainframe Product about privileged function, configure the external security manager to enforce submitting jobs on behalf of another user parameters.
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002234
- Version
- SRG-APP-000343-MFP-000091
- Vuln IDs
-
- V-68173
- Rule IDs
-
- SV-82663r1_rule
Checks: C-68735r1_chk
Examine installation and configuration settings. Verify the Mainframe Product provides logging for execution of privileged functions through use of SMF, the SYSLOG, the external security management software log, or to some other reliable log file. If it does not, this is a finding.
Fix: F-74289r1_fix
Configure the Mainframe Product to log the execution of privileged functions using the external security manager, SMF, and/or the SYSLOG.
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-000044
- Version
- SRG-APP-000065-MFP-000093
- Vuln IDs
-
- V-68175
- Rule IDs
-
- SV-82665r1_rule
Checks: C-68737r1_chk
If the Mainframe Product has no function or capability for user logon, this is not applicable. If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine Mainframe Product configuration settings. Verify that the Mainframe Product account management settings enforce a limit of three consecutive invalid logon attempts by a user during a 15 minute time period. If it does not, this is a finding.
Fix: F-74291r1_fix
Configure the Mainframe Product account management settings to enforce a limit of three consecutive invalid logon attempts by a user during a 15 minute time period.
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-002238
- Version
- SRG-APP-000345-MFP-000094
- Vuln IDs
-
- V-68177
- Rule IDs
-
- SV-82667r1_rule
Checks: C-68739r1_chk
If the Mainframe Product has no function or capability for user logon, this is not applicable. If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine Mainframe Product configuration settings. Verify that the Mainframe Product account management setting automatically locks the account until the locked account is released by an administrator when three unsuccessful logon attempts in 15 minutes are exceeded. If it does not, this is a finding.
Fix: F-74293r1_fix
Configure the Mainframe Product account management settings to automatically lock the account until the locked account is released by an administrator when three unsuccessful logon attempts in 15 minutes are exceeded.
- RMF Control
- AU-10
- Severity
- M
- CCI
- CCI-000166
- Version
- SRG-APP-000080-MFP-000102
- Vuln IDs
-
- V-68179
- Rule IDs
-
- SV-82669r1_rule
Checks: C-68741r1_chk
If the Mainframe Product does not perform tasks on the behalf of other users, this is not applicable. Examine configuration settings. Determine whether settings identify initiating user for authentication. If it does not, this is a finding.
Fix: F-74295r1_fix
Configure the Mainframe Product to identify initiating user for authentication for all tasks.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000174
- Version
- SRG-APP-000086-MFP-000110
- Vuln IDs
-
- V-68181
- Rule IDs
-
- SV-82671r1_rule
Checks: C-68743r1_chk
If the Mainframe Product does not perform audit record aggregation, this is not applicable. Examine configuration settings. If the Mainframe Product settings do not use the operating system clock for time stamps, this is a finding.
Fix: F-74297r1_fix
Configure the Mainframe Product to use the operating system clock for time stamps.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-001914
- Version
- SRG-APP-000353-MFP-000112
- Vuln IDs
-
- V-68183
- Rule IDs
-
- SV-82673r1_rule
Checks: C-68745r1_chk
Examine the installation and configuration settings. If system programmers do not have the capability to change auditing settings in accordance with applicable access control policies, this is a finding. If an external security manager (ESM) is used, check the ESM rules and configuration. If there are no rules for these resources or the rules do not allow update and above access to system programmers in accordance with applicable access control policies, this is a finding.
Fix: F-74299r1_fix
Configure the Mainframe Product to allow system programmers the capability to change auditing settings. This can be accomplished by using the ESM. Configure the ESM to allow update and above access to system programmers.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-001914
- Version
- SRG-APP-000353-MFP-000113
- Vuln IDs
-
- V-68185
- Rule IDs
-
- SV-82675r1_rule
Checks: C-68747r1_chk
Examine the installation and configuration settings. If security administrators do not have the capability to change auditing settings, this is a finding. If an external security manager (ESM) is used, check the ESM rules and configuration. If there are no rules for these resources or the rules do not allow update and above access to security administrators in accordance with applicable access control policies, this is a finding.
Fix: F-74301r1_fix
Configure the Mainframe Product to allow security administrators the capability to change auditing settings. This can be accomplished by using the ESM. Configure the ESM to restrict update and above access to system and ESM audit settings to security administrators in accordance with applicable access control policies.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- SRG-APP-000089-MFP-000114
- Vuln IDs
-
- V-68187
- Rule IDs
-
- SV-82677r1_rule
Checks: C-68749r1_chk
Examine Mainframe Product documentation. Refer to NIST SP 800-53 AU-2 or the Risk Management Knowledge Service (RMKS) for DoD auditing events. Examine configuration settings. Compare available auditing events. If available auditing events do not include all DoD-defined auditing events, this is a finding. If auditing is not available for all components of the Mainframe Product, this is a finding.
Fix: F-74303r1_fix
Configure the Mainframe Product to audit all DoD-defined auditing events within all Mainframe Product components.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000171
- Version
- SRG-APP-000090-MFP-000115
- Vuln IDs
-
- V-68189
- Rule IDs
-
- SV-82679r2_rule
Checks: C-68751r2_chk
Examine the configuration settings. Verify the capability to select auditable events is restricted to security administrators (or individuals or roles appointed by the ISSM). If it is not, this is a finding.
Fix: F-74305r2_fix
Configure the Mainframe Product to restrict selection of auditable events to security administrators (or individuals or roles appointed by the ISSM).
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000091-MFP-000116
- Vuln IDs
-
- V-68191
- Rule IDs
-
- SV-82681r1_rule
Checks: C-68753r1_chk
Examine the installation and configuration settings. Verify that the Mainframe Product identifies privileged functions and writes to SMF and/or uses an external security manager to generate audit records when successful/unsuccessful attempts to access privileges occur. If it does not, this is a finding.
Fix: F-74307r1_fix
Configure the Mainframe Product to write to SMF and/or provide audit SAF call for the external security manager when successful/unsuccessful attempts to access privileges occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000492-MFP-000117
- Vuln IDs
-
- V-68193
- Rule IDs
-
- SV-82683r1_rule
Checks: C-68755r1_chk
Examine installation and configuration settings. Verify that the Mainframe Product identifies all security objects, writes to SMF, and/or uses an external security manager (ESM) to generate audit records when successful/unsuccessful attempts to access security objects. If it does not, this is a finding.
Fix: F-74309r1_fix
Configure the Mainframe Product to write to SMF and/or provide audit SAF to call when successful/unsuccessful attempts to access security objects.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000493-MFP-000118
- Vuln IDs
-
- V-68195
- Rule IDs
-
- SV-82685r1_rule
Checks: C-68757r1_chk
Examine installation and configuration settings. Verify that the Mainframe Product identifies all security levels and writes to SMF and/or uses an external security manager to generate audit records when successful/unsuccessful attempts to access security levels. If it does not, this is a finding.
Fix: F-74311r1_fix
Configure the Mainframe Product to write to SMF and/or provide audit SAF to call when successful/unsuccessful attempts to access security levels.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000494-MFP-000119
- Vuln IDs
-
- V-68197
- Rule IDs
-
- SV-82687r1_rule
Checks: C-68759r1_chk
Examine installation and configuration settings. Verify that the Mainframe Product identifies all security categories of information; writes to SMF and/or uses an external security manager to generate audit records when successful/unsuccessful attempts to access categories of information. If it does not, this is a finding.
Fix: F-74313r1_fix
Configure the Mainframe Product to write to SMF and/or provide audit SAF to call when successful/unsuccessful attempts to access categories of information occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000495-MFP-000120
- Vuln IDs
-
- V-68199
- Rule IDs
-
- SV-82689r1_rule
Checks: C-68761r1_chk
Examine installation and configuration settings. Verify that the Mainframe Product identifies all security privileges, writes to SMF, and/or uses an external security manager (ESM) to generate audit records successful/unsuccessful attempts to modify privileges occur. If it does not, this is a finding.
Fix: F-74315r1_fix
Configure the Mainframe Product to write to SMF and/or provide audit SAF to call when successful/unsuccessful attempts to modify privileges occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000496-MFP-000121
- Vuln IDs
-
- V-68201
- Rule IDs
-
- SV-82691r1_rule
Checks: C-68763r1_chk
Examine installation and configuration settings. Verify that the Mainframe Product identifies all security object; writes to SMF and/or uses an external security manager to generate audit records when successful/unsuccessful attempts to modify security objects. If it does not, this is a finding.
Fix: F-74317r1_fix
Configure the Mainframe Product to write to SMF and/or provide audit SAF to call when successful/unsuccessful attempts to modify security objects occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000497-MFP-000122
- Vuln IDs
-
- V-68205
- Rule IDs
-
- SV-82695r1_rule
Checks: C-68765r1_chk
Examine installation and configuration settings. Verify that the Mainframe Product identifies all security levels writes to SMF and/or uses an external security manager to generate audit records when successful/unsuccessful attempts to modify security levels. If it does not, this is a finding.
Fix: F-74319r1_fix
Configure the Mainframe Product to write to SMF and/or provide audit SAF to call when successful/unsuccessful attempts to modify security levels occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000498-MFP-000123
- Vuln IDs
-
- V-68207
- Rule IDs
-
- SV-82697r1_rule
Checks: C-68767r1_chk
Examine installation and configuration settings. Verify that the Mainframe Product identifies all security categories of information; writes to SMF and/or uses an external security manager to generate audit records when successful/unsuccessful attempts to modify categories of information. If it does not, this is a finding.
Fix: F-74321r1_fix
Configure the Mainframe Product to write to SMF and/or provide audit SAF to call when successful/unsuccessful attempts to modify categories of information (e.g., classification levels) occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000499-MFP-000124
- Vuln IDs
-
- V-68209
- Rule IDs
-
- SV-82699r1_rule
Checks: C-68769r1_chk
Examine installation and configuration settings. Verify that the Mainframe Product identifies privileged functions, writes to SMF, and/or uses an external security manager (ESM) to generate audit records when successful/unsuccessful attempts to delete privileges occur. If it does not, this is a finding.
Fix: F-74323r1_fix
Configure the Mainframe Product to write to SMF and/or provide audit SAF to call when successful/unsuccessful attempts to delete privileges occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000500-MFP-000125
- Vuln IDs
-
- V-68211
- Rule IDs
-
- SV-82701r1_rule
Checks: C-68771r1_chk
Examine installation and configuration settings. Verify that the Mainframe Product identifies all security levels writes to SMF and/or uses an external security manager to generate audit records when successful/unsuccessful attempts to delete security levels. If it does not, this is a finding.
Fix: F-74325r1_fix
Configure the Mainframe Product to write to SMF and/or provide audit SAF to call when successful/unsuccessful attempts to delete security levels occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000501-MFP-000126
- Vuln IDs
-
- V-68213
- Rule IDs
-
- SV-82703r1_rule
Checks: C-68773r1_chk
Examine installation and configuration settings. Verify that the Mainframe Product identifies all security object writes to SMF and/or uses an external security manager to generate audit records when successful/unsuccessful attempts to delete security objects. If it does not, this is a finding.
Fix: F-74327r1_fix
Configure the Mainframe Product to write to SMF and/or provide audit SAF to call when successful/unsuccessful attempts to delete security objects occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000502-MFP-000127
- Vuln IDs
-
- V-68215
- Rule IDs
-
- SV-82705r1_rule
Checks: C-68775r1_chk
Examine installation and configuration settings. Verify that the Mainframe Product identifies all security categories of information; writes to SMF and/or uses an external security manager to generate audit records when successful/unsuccessful attempts to delete categories of information. If it does not, this is a finding.
Fix: F-74329r1_fix
Configure the Mainframe Product to write to SMF and/or provide audit SAF to call when successful/unsuccessful attempts to delete categories of information occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000503-MFP-000128
- Vuln IDs
-
- V-68217
- Rule IDs
-
- SV-82707r1_rule
Checks: C-68777r1_chk
If the Mainframe Product does not have the function or capability for user logon, this is not applicable. Examine configuration settings. Determine if successful/unsuccessful logon attempts are audited. If they are not, this is a finding.
Fix: F-74331r1_fix
Configure the Mainframe Product to provide audit SAF to call when successful/unsuccessful logon attempts occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000504-MFP-000129
- Vuln IDs
-
- V-68219
- Rule IDs
-
- SV-82709r1_rule
Checks: C-68779r1_chk
Examine installation and configuration settings. Verify that the Mainframe Product identifies privileged functions, writes to SMF, and/or provides an SAF call to an external security manager (ESM) to generate audit records for all privilege activities or other system-level access. If it does not, this is a finding.
Fix: F-74333r1_fix
Configure the Mainframe Product to write to SMF and/or provide audit SAF to call for privileged activities or other system-level access.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000505-MFP-000130
- Vuln IDs
-
- V-68221
- Rule IDs
-
- SV-82711r1_rule
Checks: C-68781r1_chk
If the Mainframe Product has no function or capability for user access this is not applicable. Examine configuration settings. If the Mainframe Product does not identify and audit start and end times of access to the systems, this is a finding.
Fix: F-74335r1_fix
Configure the Mainframe Product to provide audit SAF call for starting and ending time for user access to the system.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000506-MFP-000131
- Vuln IDs
-
- V-68223
- Rule IDs
-
- SV-82713r1_rule
Checks: C-68783r1_chk
If the Mainframe Product has no function or capability for user logon, this is not applicable. Examine configuration settings. If the Mainframe Product does not generate audit records when concurrent logons from different workstations occur, this is a finding.
Fix: F-74337r1_fix
Configure the Mainframe Product to provide audit SAF call when concurrent logons from different workstations occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000507-MFP-000132
- Vuln IDs
-
- V-68225
- Rule IDs
-
- SV-82715r1_rule
Checks: C-68785r1_chk
Examine installation and configuration settings. Verify that the Mainframe Product identifies access to all objects; writes to SMF and/or and uses an external security manager to generate audit records for all access. If it does not, this is a finding
Fix: F-74339r1_fix
Configure the Mainframe Product to write to SMF and/or provide audit SAF call when successful/unsuccessful accesses to objects occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000508-MFP-000133
- Vuln IDs
-
- V-68227
- Rule IDs
-
- SV-82717r1_rule
Checks: C-68787r1_chk
Examine installation and configuration settings. Verify that the Mainframe Product identifies direct access to the Mainframe Product, writes to SMF, and/or uses an external security manager (ESM) to generate audit records for all direct access. If it does not, this is a finding.
Fix: F-74341r1_fix
Configure the Mainframe Product to write to SMF and/or provide audit SAF call for all direct access to the information system.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000509-MFP-000134
- Vuln IDs
-
- V-68229
- Rule IDs
-
- SV-82719r1_rule
Checks: C-68789r1_chk
If the Mainframe Product has no function or capability for account creations, this is not applicable. Examine installation and configuration settings. Verify that the Mainframe Product identifies account functions, writes to SMF, and/or uses an external security manager (ESM) to generate audit records for all account creations, modifications, disabling, and termination events. If it does not, this is a finding.
Fix: F-74343r1_fix
Configure the Mainframe Product to write to SMF and/or provide audit SAF call for all account creations, modifications, disabling, and termination events.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000510-MFP-000135
- Vuln IDs
-
- V-68231
- Rule IDs
-
- SV-82721r1_rule
Checks: C-68791r1_chk
Examine installation and configuration settings. Verify that the Mainframe Product identifies all Kernel module activities, writes to SMF, and/or uses an external security manager (ESM) to generate audit records for all kernel mode load, unload, and restart events, and for all program initiations. If it does not, this is a finding.
Fix: F-74345r1_fix
Configure the Mainframe Product to write to SMF and/or provide audit SAF call for all kernel module load, unload, and restart events, and for all program initiations.
- RMF Control
- AU-14
- Severity
- M
- CCI
- CCI-001919
- Version
- SRG-APP-000354-MFP-000136
- Vuln IDs
-
- V-68233
- Rule IDs
-
- SV-82723r1_rule
Checks: C-68793r1_chk
If the Mainframe Product has no function or capability for session operations, this is not applicable. Examine installation and configuration settings. Verify that the Mainframe Product has the capability to select user sessions for monitoring and allows system programmers and security administrators to select sessions to capture/record or view/hear in accordance with applicable access control policies. If it does not, this is a finding. If there is an external security manager (ESM) in use, verify that the ESM restricts the ability to select sessions to capture/record or view/hear in accordance with applicable access control policies to system programmers or security administrators. If it does not, this is a finding.
Fix: F-74347r1_fix
Configure the Mainframe Product to permit authorized users to select a user session to capture/record or view/hear. If there is an ESM in use, configure ESM to restrict the ability to select sessions to capture/record or view/hear in accordance with applicable access control policies to system programmers or security administrators.
- RMF Control
- AU-14
- Severity
- M
- CCI
- CCI-001464
- Version
- SRG-APP-000092-MFP-000137
- Vuln IDs
-
- V-68235
- Rule IDs
-
- SV-82725r1_rule
Checks: C-68795r1_chk
If the Mainframe Product has no function or capability for session operations, this is not applicable. Examine installation and configuration settings. Verify that session auditing is initiated at session startup. If it is not, this is a finding.
Fix: F-74349r1_fix
Configure the Mainframe Product to initiate session auditing upon startup.
- RMF Control
- AU-14
- Severity
- M
- CCI
- CCI-001462
- Version
- SRG-APP-000093-MFP-000138
- Vuln IDs
-
- V-68237
- Rule IDs
-
- SV-82727r1_rule
Checks: C-68797r1_chk
If the Mainframe Product has no function or capability for session operations, this is not applicable. Examine installation and configuration settings. If the Mainframe Product does not have the capability to capture, record, and audit user sessions, this is a finding. If the Mainframe Product does not restrict the ability to capture, record, and audit user sessions to system programmers or security administrators, this is a finding. If an external security manager (ESM) is in use, examine the configuration and rules to determine if the ability to capture, record, and audit user sessions is restricted to system programmers or security administrators. If it is not, this is a finding.
Fix: F-74351r1_fix
Configure the Mainframe Product to permit authorized users to capture, record, and log all content related to a user session. If an ESM is in use, configure the rules to restrict the ability to capture, record, and audit user sessions to system programmers and security administrators.
- RMF Control
- AU-14
- Severity
- M
- CCI
- CCI-001920
- Version
- SRG-APP-000355-MFP-000139
- Vuln IDs
-
- V-68239
- Rule IDs
-
- SV-82729r1_rule
Checks: C-68799r1_chk
If the Mainframe Product has no function or capability for session operations, this is not applicable. Examine installation and configuration settings. If the Mainframe Product does not have the capability to remotely view/hear, in real time, all content related to an established user session from a component separate from the Mainframe Product being monitored, this a finding. If the Mainframe Product does not restrict this capability to system programmers and security administrators, this is a finding. If an external security manager (ESM) is in use, verify that the ESM restricts the capability to remotely view/hear, in real time, all content related to an established user session from a component separate from the Mainframe Product being monitored to system programmers or security administrators. If it does not, this is a finding.
Fix: F-74353r1_fix
Configure the Mainframe Product to permit authorized users to remotely view/hear, in real time, all content related to an established user session from a component separate from the Mainframe Product being monitored. If an ESM is in use, configure rules to restrict the ability to remotely view/hear, in real time, all content related to an established user session from a component separate from the Mainframe Product being monitored to system programmers and security administrators.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- SRG-APP-000095-MFP-000140
- Vuln IDs
-
- V-68241
- Rule IDs
-
- SV-82731r1_rule
Checks: C-68801r1_chk
Examine installation and configuration settings. Verify data written to external security manager audit files and/or SMF records contain information that details what type of events occurred. If it does not, this is a finding.
Fix: F-74355r1_fix
Configure the Mainframe Product audit records written to external security manager audit files and/or SMF records to contain information that details what type of events occurred.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000131
- Version
- SRG-APP-000096-MFP-000141
- Vuln IDs
-
- V-68243
- Rule IDs
-
- SV-82733r1_rule
Checks: C-68803r1_chk
Examine installation and configuration settings. Ensure data written to external security manager audit files and/or SMF records contain information that details when events occurred. If it does not, this is a finding.
Fix: F-74357r1_fix
Configure the Mainframe Product audit records written to external security manager audit files and/or SMF records to contain information that details when (date and time) the events occurred.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000132
- Version
- SRG-APP-000097-MFP-000142
- Vuln IDs
-
- V-68245
- Rule IDs
-
- SV-82735r2_rule
Checks: C-68805r1_chk
Examine installation and configuration settings. Verify data written to external security manager audit files and/or SMF records contain information that details where events occurred. If it does not, this is a finding.
Fix: F-74359r2_fix
Configure the Mainframe Product audit records written to external security manager audit files and/or SMF records to contain information that details where the events occurred.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000133
- Version
- SRG-APP-000098-MFP-000143
- Vuln IDs
-
- V-68247
- Rule IDs
-
- SV-82737r1_rule
Checks: C-68807r1_chk
Examine installation and configuration settings. Verify data written to external security manager audit files and/or SMF records contain information that details the source of events. If it does not, this is a finding.
Fix: F-74361r1_fix
Configure the Mainframe Product audit records written to external security manager audit files and/or SMF records to contain information to establish the source of the events.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000134
- Version
- SRG-APP-000099-MFP-000144
- Vuln IDs
-
- V-68249
- Rule IDs
-
- SV-82739r1_rule
Checks: C-68809r1_chk
Examine installation and configuration settings. Verify data written to external security manager audit files and/or SMF records contain information that details the outcome of events. If it does not, this is a finding.
Fix: F-74363r1_fix
Configure the Mainframe Product audit records written to external security manager audit files and/or SMF records to contain information to establish the outcome of the events.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-001487
- Version
- SRG-APP-000100-MFP-000145
- Vuln IDs
-
- V-68251
- Rule IDs
-
- SV-82741r1_rule
Checks: C-68811r1_chk
Examine installation and configuration settings. Verify data written to external security manager audit files and/or SMF records contain information that details the identity of individuals or processes associated with the event. If it does not, this is a finding.
Fix: F-74365r1_fix
Configure the Mainframe Product audit records written to external security manager audit files and/or SMF records to contain information to establish the identity of any individual or process associated with the event.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000135
- Version
- SRG-APP-000101-MFP-000146
- Vuln IDs
-
- V-68253
- Rule IDs
-
- SV-82743r1_rule
Checks: C-68813r1_chk
Examine installation and configuration settings. Verify data written to external security manager audit files and/or SMF records contain information that details contain full-text recording of privileged commands or the individual identities of group account users associated with the event. If it does not, this is a finding.
Fix: F-74367r1_fix
Configure the Mainframe Product audit records written to external security manager audit files and/or SMF records to contain full-text recording of privileged commands or the individual identities of group account users.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-001844
- Version
- SRG-APP-000356-MFP-000147
- Vuln IDs
-
- V-68255
- Rule IDs
-
- SV-82745r1_rule
Checks: C-68815r1_chk
If the Mainframe Product does not perform audit data management or storage function this is not applicable. Examine configuration settings. Determine if the Mainframe Product provides centralized management of the capture content for all components. If it does not, this is a finding.
Fix: F-74369r1_fix
Configure the Mainframe Product to provide centralized management and configuration of the content to be captured in audit records generated by all application components.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001849
- Version
- SRG-APP-000357-MFP-000148
- Vuln IDs
-
- V-68257
- Rule IDs
-
- SV-82747r1_rule
Checks: C-68817r1_chk
If the Mainframe Product uses MVS System Management Facility (SMF) recording or ESM log files for auditing purposes, this is not applicable. Examine the Mainframe Product installation and configuration auditing settings. If the installation and/or configuration setting for auditing do not allocate audit record storage capacity in accordance with organization-defined audit record storage requirements, this is a finding.
Fix: F-74371r1_fix
Configure installation and/or configuration auditing settings to allocate audit record storage capacity in accordance with organization-defined audit record storage requirements.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- SRG-APP-000358-MFP-000149
- Vuln IDs
-
- V-68259
- Rule IDs
-
- SV-82749r1_rule
Checks: C-68819r1_chk
If the Mainframe Product uses MVS System Management Facility (SMF) recording or external security manager (ESM) log files for auditing purposes, this is not applicable. Examine the Mainframe Product installation and configuration auditing settings. If the installation and/or configuration setting for auditing do not require the off-loading of audit records onto a different system or media than the system being audited, this is a finding.
Fix: F-74373r1_fix
Configure the Mainframe Product installation and/or configurations settings to off-load audit records onto a different system or media than the system being audited.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-001855
- Version
- SRG-APP-000359-MFP-000151
- Vuln IDs
-
- V-68261
- Rule IDs
-
- SV-82751r1_rule
Checks: C-68821r1_chk
If the Mainframe Product uses MVS System Management Facility (SMF) recording or external security manager (ESM) log files for auditing purposes, this is not applicable. Examine the Mainframe Product installation and configuration auditing settings. If the installation and/or configuration setting for auditing do not provide an immediate warning to the system programmer and security administrator (at a minimum) when allocated audit record storage volume reaches 75 percent of repository maximum audit record storage capacity, this is a finding.
Fix: F-74375r1_fix
Configure the Mainframe Product installation and configuration settings for auditing to provide an immediate warning to the system programmer and security administrator (at a minimum) when allocated audit record storage volume reaches 75 percent of repository maximum audit record storage capacity.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-001858
- Version
- SRG-APP-000360-MFP-000152
- Vuln IDs
-
- V-68263
- Rule IDs
-
- SV-82753r1_rule
Checks: C-68823r1_chk
If the Mainframe Product does not perform audit data management or storage function, this is not applicable. Examine configuration settings. If the Mainframe Product does not provide for immediate real-time alerts to operations staff, system programmers, and/or security administrators for audit failures requiring real-time alerts, this is a finding.
Fix: F-74377r1_fix
Configure the Mainframe Product to provide for immediate real-time alerts to operations staff, system programmers, and/or security administrators for audit failures requiring real-time alerts.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-000139
- Version
- SRG-APP-000108-MFP-000154
- Vuln IDs
-
- V-68265
- Rule IDs
-
- SV-82755r2_rule
Checks: C-68825r1_chk
If the Mainframe Product does not perform audit data management or storage function, this is not applicable. Examine configuration settings. Determine if Mainframe Product alerts system programmers or security administrators in the event of audit processing failure. If it does not, this is a finding.
Fix: F-74379r1_fix
Configure the Mainframe Product to alert system programmers or security administrators in the event of audit processing failure.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-000140
- Version
- SRG-APP-000109-MFP-000155
- Vuln IDs
-
- V-68267
- Rule IDs
-
- SV-82757r1_rule
Checks: C-68827r1_chk
If the Mainframe Product does not perform audit data management or storage function, this is not applicable. Examine configuration settings for audit failure parameters. If Mainframe Product does not shut down by default in the event of audit processing failure, this is a finding. Note: This depends on whether availability is an overriding concern.
Fix: F-74381r1_fix
Configure the Mainframe Product to shut down by default upon audit failure (unless availability is an overriding concern).
- RMF Control
- AU-6
- Severity
- M
- CCI
- CCI-000154
- Version
- SRG-APP-000111-MFP-000156
- Vuln IDs
-
- V-68269
- Rule IDs
-
- SV-82759r1_rule
Checks: C-68829r1_chk
If the Mainframe Product does not perform audit data management or storage function, this is not applicable. Examine installation and configuration settings. Verify the Mainframe Product has the capability to centrally review and analyze audit records from multiple components in the system. If it does not, this is a finding.
Fix: F-74383r1_fix
Configure the Mainframe Product to centrally review and analyze audit records from multiple components in the system.
- RMF Control
- AU-7
- Severity
- M
- CCI
- CCI-000158
- Version
- SRG-APP-000115-MFP-000157
- Vuln IDs
-
- V-68271
- Rule IDs
-
- SV-82761r1_rule
Checks: C-68831r1_chk
If the Mainframe Product does not perform audit data management or storage function, this is not applicable. Examine installation and configuration settings. Refer to the site's auditing policies. Verify the Mainframe Product filters audit record events of interest based on Site defined criteria. If it does not, this is a finding.
Fix: F-74385r1_fix
Configure the Mainframe Product to filter audit record events of interest based on Site defined criteria
- RMF Control
- AU-7
- Severity
- M
- CCI
- CCI-001875
- Version
- SRG-APP-000364-MFP-000160
- Vuln IDs
-
- V-68273
- Rule IDs
-
- SV-82763r1_rule
Checks: C-68833r1_chk
If the Mainframe Product does not perform audit data management or storage functions, this is not applicable. Examine installation and configuration settings. Verify the Mainframe Product audit reduction capability supports on-demand review and analysis. If it does not, this is a finding.
Fix: F-74387r1_fix
Configure the Mainframe Product audit reduction capability to support on-demand review and analysis.
- RMF Control
- AU-7
- Severity
- M
- CCI
- CCI-001876
- Version
- SRG-APP-000181-MFP-000161
- Vuln IDs
-
- V-68275
- Rule IDs
-
- SV-82765r1_rule
Checks: C-68835r1_chk
If the Mainframe Product does not perform audit data management or storage functions, this is not applicable. Examine installation and configuration settings. Verify the Mainframe Product audit reduction capability supports on-demand reporting. If it does not, this is a finding.
Fix: F-74389r1_fix
Configure the Mainframe Product audit reduction capability to support on-demand reporting.
- RMF Control
- AU-7
- Severity
- M
- CCI
- CCI-001877
- Version
- SRG-APP-000365-MFP-000162
- Vuln IDs
-
- V-68277
- Rule IDs
-
- SV-82767r1_rule
Checks: C-68837r1_chk
If the Mainframe Product does not perform audit data management or storage function this is not applicable. Examine installation and configuration settings. Verify the Mainframe Product audit reduction capability supports after-the-fact investigations of security incidents. If it does not, this is a finding.
Fix: F-74391r1_fix
Configure the Mainframe Product audit reduction capability to support after-the-fact investigations of security incidents.
- RMF Control
- AU-7
- Severity
- M
- CCI
- CCI-001878
- Version
- SRG-APP-000366-MFP-000163
- Vuln IDs
-
- V-68279
- Rule IDs
-
- SV-82769r1_rule
Checks: C-68839r1_chk
If the Mainframe Product does not perform audit data management or storage function, this is not applicable. Examine installation and configuration settings. Verify the Mainframe Product audit report generations support on-demand review and analysis. If it does not, this is a finding.
Fix: F-74393r1_fix
Configure the Mainframe Product audit report generations to support on-demand review and analysis.
- RMF Control
- AU-7
- Severity
- M
- CCI
- CCI-001879
- Version
- SRG-APP-000367-MFP-000164
- Vuln IDs
-
- V-68281
- Rule IDs
-
- SV-82771r1_rule
Checks: C-68841r1_chk
If the Mainframe Product does not perform audit data management or storage function, this is not applicable. Examine installation and configuration settings. Verify the Mainframe Product report generation capability supports on-demand reporting. If it does not, this is a finding.
Fix: F-74395r1_fix
Configure the Mainframe Product report generation capability to support on-demand reporting.
- RMF Control
- AU-7
- Severity
- M
- CCI
- CCI-001880
- Version
- SRG-APP-000368-MFP-000165
- Vuln IDs
-
- V-68283
- Rule IDs
-
- SV-82773r1_rule
Checks: C-68843r1_chk
If the Mainframe Product does not perform audit data management or storage function, this is not applicable. Examine installation and configuration settings. Verify the Mainframe Product report generation capability supports after-the-fact investigations of security incidents. If it does not, this is a finding.
Fix: F-74397r1_fix
Configure the Mainframe Product report generation capability to support after-the-fact investigations of security incidents.
- RMF Control
- AU-7
- Severity
- M
- CCI
- CCI-001881
- Version
- SRG-APP-000369-MFP-000166
- Vuln IDs
-
- V-68285
- Rule IDs
-
- SV-82775r1_rule
Checks: C-68845r1_chk
If the Mainframe Product does not perform audit data management or storage function, this is not applicable. Examine installation and configuration settings. Verify the Mainframe Product audit reduction capability does not alter original content or time ordering of audit records. If it does, this is a finding.
Fix: F-74399r1_fix
Configure the Mainframe Product audit reduction capability to not alter original content or time ordering of audit records.
- RMF Control
- AU-7
- Severity
- M
- CCI
- CCI-001882
- Version
- SRG-APP-000370-MFP-000167
- Vuln IDs
-
- V-68287
- Rule IDs
-
- SV-82777r1_rule
Checks: C-68847r1_chk
If the Mainframe Product does not perform audit data management or storage function, this is not applicable. Examine installation and configuration settings. Verify the Mainframe Product report generation does not alter original content or time ordering of audit records. If it does, this is a finding.
Fix: F-74401r1_fix
Configure the Mainframe Product report generation to not alter original content or time ordering of audit records.
- RMF Control
- AU-8
- Severity
- M
- CCI
- CCI-000159
- Version
- SRG-APP-000116-MFP-000171
- Vuln IDs
-
- V-68289
- Rule IDs
-
- SV-82779r1_rule
Checks: C-68849r1_chk
Examine installation and configuration settings. If the Mainframe Product does not use the z/OS system clock for audit time stamps, this is a finding.
Fix: F-74403r1_fix
Configure the Mainframe Product to use the z/OS system clock for audit time stamps.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- SRG-APP-000118-MFP-000174
- Vuln IDs
-
- V-68291
- Rule IDs
-
- SV-82781r1_rule
Checks: C-68851r1_chk
Examine installation and configuration settings. Verify the Mainframe Product restricts audit information read access to system programmers, security administrators, and audit personnel. If access is not restricted, this is a finding. If an external security manager (ESM) is being used, examine external security configuration and rules. If the rules do not restrict read access to system programmers, security managers, and audit personnel, this is a finding.
Fix: F-74405r1_fix
Verify the Mainframe Product restricts read access to system programmers, security administrators, and audit personnel. This can be accomplished using an ESM. Configure the Mainframe Product to provide a SAF call for audit information access. Verify ESM rules restrict read access to system programmers, security administrators, and audit personnel.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000163
- Version
- SRG-APP-000119-MFP-000175
- Vuln IDs
-
- V-68293
- Rule IDs
-
- SV-82783r1_rule
Checks: C-68853r1_chk
Examine installation and configuration settings. Verify that the Mainframe Product restricts audit information update access to system programmers, security administrators, and audit personnel. If access is not restricted, this is a finding. If an external security manager (ESM) is being used, examine the external security configuration and rules. If the rules do not restrict update access to system programmers, security managers, and audit personnel, this is a finding.
Fix: F-74407r1_fix
Verify the Mainframe Product restricts update or greater access to system programmers, security administrators, and audit personnel. This can be accomplished using an ESM. Configure the Mainframe Product to provide an SAF call for audit information access. Verify ESM rules restrict update or greater access to system programmers, security administrators, and audit personnel.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000164
- Version
- SRG-APP-000120-MFP-000176
- Vuln IDs
-
- V-68295
- Rule IDs
-
- SV-82785r1_rule
Checks: C-68855r1_chk
Examine installation and configuration settings. Verify the Mainframe Product restricts audit information delete access to system programmers, security administrators, and audit personnel. If access is not restricted, this is a finding. If an external security manager (ESM) is being used, examine external security configuration and rules. If the rules do not restrict update or greater access to system programmers, security managers, and audit personnel, this is a finding.
Fix: F-74409r1_fix
Verify the Mainframe Product restricts update or greater access to the system's programmers, security administrators, and audit personnel. This can be accomplished using an ESM. Configure the Mainframe Product to provide SAF call for audit information access. Ensure external security manager restricts update or greater access to the system's programmers, security administrators, and audit personnel.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001493
- Version
- SRG-APP-000121-MFP-000177
- Vuln IDs
-
- V-68297
- Rule IDs
-
- SV-82787r1_rule
Checks: C-68857r1_chk
If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine installation and configuration settings. Verify the Mainframe Product restricts audit tool access to system programmers, security administrator, and audit personnel. If access is not restricted, this is a finding.
Fix: F-74411r1_fix
Configure the Mainframe Product to restrict audit tool access to system programmers, security administrators, and audit personnel.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001494
- Version
- SRG-APP-000122-MFP-000178
- Vuln IDs
-
- V-68299
- Rule IDs
-
- SV-82789r1_rule
Checks: C-68859r1_chk
If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine installation and configuration settings. Verify the Mainframe Product restricts audit tool modification to system programmers, security administrator, and audit personnel. If access is not restricted, this is a finding.
Fix: F-74413r1_fix
Configure the Mainframe Product to restrict audit tool modification to system programmers, security administrators, and audit personnel.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001495
- Version
- SRG-APP-000123-MFP-000179
- Vuln IDs
-
- V-68301
- Rule IDs
-
- SV-82791r1_rule
Checks: C-68861r1_chk
If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine installation and configuration settings. Verify the Mainframe Product restricts the ability to delete audit tool to system programmers, security administrators, and audit personnel. If access is not restricted, this is a finding.
Fix: F-74415r1_fix
Configure the Mainframe Product to restrict audit tool deletion to system programmers, security administrators, and audit personnel.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001496
- Version
- SRG-APP-000290-MFP-000182
- Vuln IDs
-
- V-68303
- Rule IDs
-
- SV-82793r1_rule
Checks: C-68863r1_chk
If the Mainframe Product does not perform audit data management or storage functions, this is not applicable. Examine the Mainframe Product Installation settings. If the Mainframe Product does not use cryptographic mechanisms to protect the integrity of audit tools, this is a finding.
Fix: F-74417r1_fix
Configure the Mainframe Product to use cryptographic mechanisms to protect the integrity of audit tools.
- RMF Control
- CM-11
- Severity
- M
- CCI
- CCI-001812
- Version
- SRG-APP-000378-MFP-000185
- Vuln IDs
-
- V-68305
- Rule IDs
-
- SV-82795r1_rule
Checks: C-68865r1_chk
Examine installation and configuration settings for change management. If the Mainframe Product does not identify installation privilege roles and prohibit user installation of software without explicit privileged status, this is a finding. If the Mainframe Product uses an external security manager (ESM) and there are no rules for the identified roles and access is not restricted to appropriate privileged users according to site security plan, this is a finding.
Fix: F-74419r1_fix
Configure the Mainframe Product to prohibit user installation of software without explicit privileged status. If the Mainframe Product uses an ESM, configure the ESM to include rules for installation of software-privileged roles. Configure the roles to restrict access for software installation to the user with privilege status.
- RMF Control
- CM-3
- Severity
- M
- CCI
- CCI-001744
- Version
- SRG-APP-000379-MFP-000186
- Vuln IDs
-
- V-68307
- Rule IDs
-
- SV-82797r1_rule
Checks: C-68867r1_chk
Examine Installation configuration settings. If the Mainframe Product does not implement organization-defined automated security responses if baseline configurations are changed in an unauthorized manner, this is a finding.
Fix: F-74421r1_fix
Configure installation and/or configuration auditing settings to implement organization-defined automated security responses if baseline configurations are changed in an unauthorized manner.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001813
- Version
- SRG-APP-000380-MFP-000187
- Vuln IDs
-
- V-68309
- Rule IDs
-
- SV-82799r1_rule
Checks: C-68869r1_chk
Examine Configuration settings. Examine organization change management policies. If the Mainframe Product does not enforce access restriction associated with changes to the application in accordance with change management policies, this is a finding. If the Mainframe Product uses an external security manager (ESM), examine rules for change management access. If there are no rules for this access or access is not restricted to users in accordance with change management policies, this is a finding.
Fix: F-74423r1_fix
Configure Mainframe Product change management settings to enforce access restrictions associated with changes to application configuration to appropriate users according to organizational change policies. If the Mainframe Product uses an ESM, configure rules to restrict access associated with application configuration change to appropriate users according to organizational change policies.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001814
- Version
- SRG-APP-000381-MFP-000188
- Vuln IDs
-
- V-68311
- Rule IDs
-
- SV-82801r1_rule
Checks: C-68871r1_chk
Examine Configuration settings. Examine organization change management policies. If the Mainframe Product does not audit the enforcement actions used to access restriction associated with changes to the application in accordance with change management policies using System Management Facility (SMF) or an external security manager audit, this is a finding.
Fix: F-74425r1_fix
Configure Mainframe Product change management settings to audit the enforcement actions used to restrict access associated with changes to application configuration to appropriate users according to organizational change policies.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- SRG-APP-000131-MFP-000189
- Vuln IDs
-
- V-68313
- Rule IDs
-
- SV-82803r1_rule
Checks: C-68873r1_chk
Examine installation and configuration settings for change management. If the Mainframe Product does not prevent the installation of patches, service packs, or application components without verification that the software component has been digitally signed using a certificate that is recognized and approved by the organization, this is a finding.
Fix: F-74427r1_fix
Configure installation and configuration settings for change management to prevent the installation of patches, service packs, or application components without verification that the software component has been digitally signed using a certificate that is recognized and approved by the organization.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001499
- Version
- SRG-APP-000133-MFP-000192
- Vuln IDs
-
- V-68315
- Rule IDs
-
- SV-82805r1_rule
Checks: C-68875r1_chk
If an external security manager (ESM) is in use, examine the ESM configurations and rules. If the ESM does not restrict update or greater access to installation datasets to system programmers or security managers or other authorized users as directed by applicable access control policies, this is a finding. If an ESM is NOT in use, examine the Mainframe Product installation and configuration settings. If the Mainframe Product does not restrict update or greater access to Installation datasets to system programmers or security managers or other authorized users as directed by applicable access control policies, this is a finding.
Fix: F-74429r1_fix
Configure the Mainframe Product to limit privileges to changing Mainframe Product installation datasets to system programmers or security managers or other authorized users as directed by applicable access control policies. This can be accomplished with an ESM. Configure the ESM to restrict update and greater access to Mainframe Product installation datasets to system programmers or security managers or other authorized users in accordance with applicable access control policies.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001499
- Version
- SRG-APP-000133-MFP-000193
- Vuln IDs
-
- V-68317
- Rule IDs
-
- SV-82807r1_rule
Checks: C-68877r1_chk
If an external security manager (ESM) is in use, examine the ESM configurations and rules. If the ESM does not restrict update or greater access to started task and job datasets to system programmers or security managers or other authorized users as directed by applicable access control policies, this is a finding. If an ESM is NOT in use, examine the Mainframe Product installation and configuration settings. If the Mainframe Product does not restrict update or greater access to installation and job datasets to system programmers or security managers or other authorized users as directed by applicable access control policies, this is a finding.
Fix: F-74431r1_fix
Configure the Mainframe Product to limit privileges to Mainframe Products started tasks and sob datasets to system programmers or other authorized users in accordance with applicable access control policies. This can be accomplished with an ESM. Configure the ESM to restrict update and greater access to Mainframe Product started tasks and job datasets to system programmers or other authorized users in accordance with applicable access control policies.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001499
- Version
- SRG-APP-000133-MFP-000194
- Vuln IDs
-
- V-68319
- Rule IDs
-
- SV-82809r1_rule
Checks: C-68879r1_chk
If an external security manager (ESM) is in use, check the ESM rules and configuration. If there are no rules for Mainframe Product user datasets or the rules do not restrict access to Mainframe Product user datasets to authorized users as directed by applicable access control policies, this is a finding. If an ESM is NOT in use, examine installation and configuration settings. If the Mainframe Product does not restrict access to Mainframe Product user datasets to authorized users as directed by applicable access control policies, this is a finding.
Fix: F-74433r1_fix
Configure the Mainframe Product to limit privileges to changing the software resident within software libraries. This can be accomplished with an ESM. Configure the ESM to restrict update and greater access to Mainframe Product started tasks and job datasets to security administrators in accordance with applicable access control policies.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-MFP-000195
- Vuln IDs
-
- V-68321
- Rule IDs
-
- SV-82811r1_rule
Checks: C-68881r1_chk
Refer to site security configuration policies. Refer to Mainframe Product security documentation. Examine configuration settings. If configuration settings do not adhere to site policies, this is a finding.
Fix: F-74435r1_fix
Configure the Mainframe Product to adhere to site policies.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- SRG-APP-000141-MFP-000200
- Vuln IDs
-
- V-68325
- Rule IDs
-
- SV-82815r1_rule
Checks: C-68885r1_chk
Refer to Mainframe Product installation documentation to determine sample and default demonstrative components. Examine installation settings. If there are any sample or default demonstrative components in the installation, this is a finding.
Fix: F-74439r1_fix
Configure the Mainframe Product installation and/or configurations to remove sample and demonstrative components.
- RMF Control
- IA-11
- Severity
- M
- CCI
- CCI-002038
- Version
- SRG-APP-000389-MFP-000204
- Vuln IDs
-
- V-68327
- Rule IDs
-
- SV-82817r1_rule
Checks: C-68887r1_chk
If the Mainframe Product has no function or capability for user logon, this is not applicable. If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine user account management configurations. If the Mainframe Product is configured to require user reauthentication when circumstances or situations require reauthentication as defined in site security plan, this is not a finding.
Fix: F-74441r1_fix
Configure the Mainframe Product to require user reauthentication when circumstances or situations require reauthentication as defined in site security plan.
- RMF Control
- IA-11
- Severity
- M
- CCI
- CCI-002039
- Version
- SRG-APP-000390-MFP-000205
- Vuln IDs
-
- V-68329
- Rule IDs
-
- SV-82819r1_rule
Checks: C-68889r1_chk
If the Mainframe Product has no function or capability for device logon, this is not applicable. If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine user account management configurations. If the Mainframe Product is configured to require devices to reauthenticate when circumstances or situations require reauthentication as defined in site security plan, this is not a finding.
Fix: F-74443r1_fix
Configure the Mainframe Product to require devices to reauthenticate when circumstances or situations require reauthentication as defined in site security plan.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000764
- Version
- SRG-APP-000148-MFP-000206
- Vuln IDs
-
- V-68331
- Rule IDs
-
- SV-82821r1_rule
Checks: C-68891r1_chk
If the Mainframe Product has no function or capability for user logon, this is not applicable. If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine user account configurations. If the Mainframe Product does not uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users), this is a finding.
Fix: F-74445r1_fix
Configure the Mainframe Product account management settings to uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000765
- Version
- SRG-APP-000149-MFP-000207
- Vuln IDs
-
- V-68333
- Rule IDs
-
- SV-82823r1_rule
Checks: C-68893r1_chk
If the Mainframe Product has no function or capability for user logon, this is not applicable. If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine user account management configurations. If the Mainframe Product is configured to require multifactor authentication for network access to privileged accounts, this is not a finding
Fix: F-74447r1_fix
Configure the Mainframe Product account management settings to require multifactor authentication for network access to privileged accounts.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001953
- Version
- SRG-APP-000391-MFP-000208
- Vuln IDs
-
- V-68335
- Rule IDs
-
- SV-82825r1_rule
Checks: C-68895r1_chk
If the Mainframe Product uses an external security manager for all account management, this is not applicable. Examine user account management configurations. If the Mainframe Product account management is not configured to accept PIV credentials, this is a finding.
Fix: F-74449r1_fix
Configure the Mainframe Product account management settings to accept PIV credentials.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001954
- Version
- SRG-APP-000392-MFP-000209
- Vuln IDs
-
- V-68337
- Rule IDs
-
- SV-82827r1_rule
Checks: C-68897r1_chk
If the Mainframe Product uses an external security manager (ESM) for all account management, this is not applicable. Examine user account management configurations. If the Mainframe Product account management settings are not configured to electronically verify PIV credentials, this is a finding.
Fix: F-74451r1_fix
Configure the Mainframe Product account management settings to electronically verify PIV credentials.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000766
- Version
- SRG-APP-000150-MFP-000211
- Vuln IDs
-
- V-68339
- Rule IDs
-
- SV-82829r1_rule
Checks: C-68899r1_chk
If the Mainframe Product has no function or capability for user logon, this is not applicable. If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine user account management configurations. If the Mainframe Product is configured to require multifactor authentication for network access to non-privileged accounts, this is not a finding
Fix: F-74453r1_fix
Configure the Mainframe Product account management settings to require multifactor authentication for network access to non-privileged accounts.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000770
- Version
- SRG-APP-000153-MFP-000214
- Vuln IDs
-
- V-68369
- Rule IDs
-
- SV-82859r1_rule
Checks: C-68901r1_chk
If the Mainframe Product has no function or capability for user logon, this is not applicable. If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine user account management configurations. If the Mainframe Product is configured to require users to authenticate with an individual authenticator prior to using a group authenticator, this is not a finding
Fix: F-74483r1_fix
Configure the Mainframe Product account management settings to require users to authenticate with an individual authenticator prior to using a group authenticator.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000205
- Version
- SRG-APP-000164-MFP-000227
- Vuln IDs
-
- V-68371
- Rule IDs
-
- SV-82861r1_rule
Checks: C-68903r1_chk
If the Mainframe Product employs an external security manager (ESM) for all account management functions, this is not applicable. Examine user account management configurations. If the Mainframe Product account management configuration does not enforce a minimum 15-character password length, this is a finding.
Fix: F-74485r1_fix
Configure the Mainframe Product account management to enforce a minimum 15-character password length.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000192
- Version
- SRG-APP-000166-MFP-000228
- Vuln IDs
-
- V-68373
- Rule IDs
-
- SV-82863r1_rule
Checks: C-68905r1_chk
If the Mainframe Product employs an external security manager (ESM) for all account management functions, this is not applicable. Examine user account management configurations. If the Mainframe Product does not require at least one uppercase character be used in passwords, this is a finding.
Fix: F-74487r1_fix
Configure the Mainframe Product account management settings to require the use of at least one uppercase character in passwords.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000193
- Version
- SRG-APP-000167-MFP-000229
- Vuln IDs
-
- V-68375
- Rule IDs
-
- SV-82865r1_rule
Checks: C-68907r1_chk
If the Mainframe Product employs an external security manager (ESM) for all account management functions, this is not applicable. Examine user account management configurations. If the Mainframe Product account management configurations do not require at least one lowercase character be used in passwords, this is a finding.
Fix: F-74489r1_fix
Configure the Mainframe Product account management settings to require the use of at least one lowercase character in passwords.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000194
- Version
- SRG-APP-000168-MFP-000230
- Vuln IDs
-
- V-68377
- Rule IDs
-
- SV-82867r1_rule
Checks: C-68909r1_chk
If the Mainframe Product employs an external security manager (ESM) for all account management functions, this is not applicable. Examine user account management configurations. If the Mainframe Product account management configurations do not require at least one numeric character be used in passwords, this is a finding.
Fix: F-74491r1_fix
Configure the Mainframe Product account management settings to require the use of at least one numeric character in passwords.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-001619
- Version
- SRG-APP-000169-MFP-000231
- Vuln IDs
-
- V-68381
- Rule IDs
-
- SV-82871r1_rule
Checks: C-68911r1_chk
If the Mainframe Product employs an external security manager (ESM) for all account management functions, this is not applicable. Examine user account management configurations. If the Mainframe Product does not enforce password complexity by requiring at least one special character be used, this is a finding.
Fix: F-74495r1_fix
Configure the Mainframe Product to enforce password complexity by requiring the use of at least one special character in passwords.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000195
- Version
- SRG-APP-000170-MFP-000232
- Vuln IDs
-
- V-68383
- Rule IDs
-
- SV-82873r1_rule
Checks: C-68913r1_chk
If the Mainframe Product employs an external security manager (ESM) for all account management functions, this is not applicable. Examine user account management configurations. If the Mainframe Product account management settings do not require the change of at least 8 of the total characters when passwords are changed, this is a finding.
Fix: F-74497r1_fix
Configure the Mainframe Product account management settings to require the change of at least 8 of the total characters when passwords are changed.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000196
- Version
- SRG-APP-000171-MFP-000233
- Vuln IDs
-
- V-68385
- Rule IDs
-
- SV-82875r1_rule
Checks: C-68915r1_chk
If the Mainframe Product employs an external security manager (ESM) for all account management functions, this is not applicable. Examine user account management configurations. If the Mainframe Product account management configuration does not require that only cryptographically protected passwords are stored, this is a finding.
Fix: F-74499r1_fix
Configure the Mainframe Product account management to store only cryptographically protected passwords.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000197
- Version
- SRG-APP-000172-MFP-000234
- Vuln IDs
-
- V-68387
- Rule IDs
-
- SV-82877r1_rule
Checks: C-68917r1_chk
If the Mainframe Product employs an external security manager (ESM) for all account management functions, this is not applicable. Examine user account management configurations. If the Mainframe Product account management configuration does not require transmittal of only cryptographically protected passwords, this is a finding.
Fix: F-74501r1_fix
Configure the Mainframe Product account management to transmit only cryptographically protected passwords.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000198
- Version
- SRG-APP-000173-MFP-000235
- Vuln IDs
-
- V-68389
- Rule IDs
-
- SV-82879r1_rule
Checks: C-68919r1_chk
If the Mainframe Product employs an external security manager (ESM) for all account management functions, this is not applicable. Examine user account management configurations. If the Mainframe Product account management configuration does not enforce 24 hours/1 day as the minimum password lifetime, this is a finding.
Fix: F-74503r1_fix
Configure the Mainframe Product account management to enforce 24 hours/1 day as the minimum password lifetime.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000199
- Version
- SRG-APP-000174-MFP-000236
- Vuln IDs
-
- V-68391
- Rule IDs
-
- SV-82881r1_rule
Checks: C-68921r1_chk
If the Mainframe Product employs an external security manager (ESM) for all account management functions, this is not applicable. Examine user account management configurations. If the Mainframe Product account management configuration does not enforce a 60-day maximum password lifetime restriction, this is a finding.
Fix: F-74505r1_fix
Configure the Mainframe Product account management settings to enforce a 60-day maximum password lifetime restriction.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000200
- Version
- SRG-APP-000165-MFP-000237
- Vuln IDs
-
- V-68393
- Rule IDs
-
- SV-82883r1_rule
Checks: C-68923r1_chk
If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine user account management configurations. If the Mainframe Product account management configuration does not prohibit password reuse for a minimum of five generations, this is a finding.
Fix: F-74507r1_fix
Configure the Mainframe Product account management to prohibit password reuse for a minimum of five generations.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-002041
- Version
- SRG-APP-000397-MFP-000238
- Vuln IDs
-
- V-68395
- Rule IDs
-
- SV-82885r1_rule
Checks: C-68927r1_chk
If the mainframe product uses an external security manager for all account management functions, this is not applicable. Examine Mainframe Product account management settings. If the Mainframe Product account management settings do not allow for the use of a temporary password for system logons with an immediate change to a permanent password, this is a finding.
Fix: F-74511r1_fix
Configure the Mainframe Product account management settings to allow the use of a temporary password for system logons with an immediate change to a permanent password.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-002007
- Version
- SRG-APP-000400-MFP-000241
- Vuln IDs
-
- V-68397
- Rule IDs
-
- SV-82887r1_rule
Checks: C-68929r1_chk
If the Mainframe Product has no function or capability for user logon, this is not applicable. If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine user account management configurations. If the Mainframe Product is configured to prohibit the use of cached authenticators after one hour, this is not a finding.
Fix: F-74513r1_fix
Configure the Mainframe Product account management settings to prohibit the use of cached authenticators after one hour.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000185
- Version
- SRG-APP-000175-MFP-000242
- Vuln IDs
-
- V-68399
- Rule IDs
-
- SV-82889r1_rule
Checks: C-68931r1_chk
If the Mainframe Product uses an external security manager (ESM) for all account management, this is not applicable. Examine user account management configurations. If the Mainframe Product account management is not configured to validate certificates by constructing a certification path (which includes status information) to an accepted trust anchor when using PKI-based authentication, this is a finding.
Fix: F-74515r1_fix
Configure the Mainframe Product account management settings to validate certificates by constructing a certification path (which includes status information) to an accepted trust anchor when using PKI-based authentication.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000186
- Version
- SRG-APP-000176-MFP-000243
- Vuln IDs
-
- V-68401
- Rule IDs
-
- SV-82891r1_rule
Checks: C-68933r1_chk
If the Mainframe Product employs an external security manager (ESM) for all account management functions, this is not applicable. Examine user account management configurations. If the Mainframe Product account management configurations do not enforce authorized access to the corresponding private key when using PKI-based authentication, this is a finding.
Fix: F-74517r1_fix
Configure the Mainframe Product account management settings to enforce authorized access to the corresponding private key when using PKI-based authentication.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000187
- Version
- SRG-APP-000177-MFP-000244
- Vuln IDs
-
- V-68403
- Rule IDs
-
- SV-82893r1_rule
Checks: C-68935r1_chk
If the Mainframe Product has no function or capability for user logon, this is not applicable. If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine user account configurations. If the Mainframe Product is not configured to map the authenticated identity to the individual user or group account for PKI-based authentication, this is a finding.
Fix: F-74519r1_fix
Configure the Mainframe Product account management settings to map the authenticated identity to the individual user or group account for PKI-based authentication.
- RMF Control
- IA-6
- Severity
- M
- CCI
- CCI-000206
- Version
- SRG-APP-000178-MFP-000246
- Vuln IDs
-
- V-68405
- Rule IDs
-
- SV-82895r1_rule
Checks: C-68937r1_chk
If the Mainframe Product has no function or capability for user logon, this is not applicable. If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine Mainframe Product installation settings; examine user account configurations. If the Mainframe Product is not configured to obscure feedback of authentication information during the authentication process, this is a finding.
Fix: F-74521r1_fix
Configure the Mainframe Product account management settings to obscure feedback of authentication information during the authentication process.
- RMF Control
- IA-7
- Severity
- M
- CCI
- CCI-000803
- Version
- SRG-APP-000179-MFP-000247
- Vuln IDs
-
- V-68407
- Rule IDs
-
- SV-82897r1_rule
Checks: C-68939r1_chk
If the Mainframe Product has no function or capability for user logon, this is not applicable. If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine user account configurations. If the Mainframe Product is configured to be FIPS 140 compliant, this is not a finding.
Fix: F-74523r1_fix
Configure the Mainframe Product account management settings to be FIPS 140 compliant.
- RMF Control
- IA-8
- Severity
- M
- CCI
- CCI-000804
- Version
- SRG-APP-000180-MFP-000248
- Vuln IDs
-
- V-68409
- Rule IDs
-
- SV-82899r1_rule
Checks: C-68941r3_chk
If the Mainframe Product has no function or capability for user logon, this is not applicable. If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine installation and configuration settings. Examine user account configurations. If the Mainframe Product does not uniquely identify and authenticate non-organizational users, this is a finding.
Fix: F-74525r1_fix
Configure the Mainframe Product account management settings to uniquely identify and authenticate non-organizational users
- RMF Control
- IA-8
- Severity
- M
- CCI
- CCI-002009
- Version
- SRG-APP-000402-MFP-000249
- Vuln IDs
-
- V-68411
- Rule IDs
-
- SV-82901r1_rule
Checks: C-68943r1_chk
If the Mainframe Product has no function or capability for user logon, this is not applicable. If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine user account configurations. If the Mainframe Product is not configured to accept PIV credentials from other federal agencies, this is a finding.
Fix: F-74527r1_fix
Configure the Mainframe Product account management settings to accept PIV credentials from other federal agencies.
- RMF Control
- IA-8
- Severity
- M
- CCI
- CCI-002010
- Version
- SRG-APP-000403-MFP-000250
- Vuln IDs
-
- V-68413
- Rule IDs
-
- SV-82903r1_rule
Checks: C-68945r1_chk
If the Mainframe Product has no function or capability for user logon, this is not applicable. If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine user account configurations. If the Mainframe Product is not configured to electronically verify PIV credentials from other federal agencies, this is a finding.
Fix: F-74529r1_fix
Configure the Mainframe Product account management settings to electronically verify PIV credentials from other federal agencies.
- RMF Control
- IA-8
- Severity
- M
- CCI
- CCI-002011
- Version
- SRG-APP-000404-MFP-000251
- Vuln IDs
-
- V-68415
- Rule IDs
-
- SV-82905r1_rule
Checks: C-68947r1_chk
If the Mainframe Product has no function or capability for user logon, this is not applicable. If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine user account configurations. If the Mainframe Product is not configured to accept FICAM-approved third-party credentials, this is a finding.
Fix: F-74531r1_fix
Configure the Mainframe Product account management settings to accept FICAM-approved third-party credentials.
- RMF Control
- IA-8
- Severity
- M
- CCI
- CCI-002014
- Version
- SRG-APP-000405-MFP-000252
- Vuln IDs
-
- V-68417
- Rule IDs
-
- SV-82907r1_rule
Checks: C-68949r1_chk
If the Mainframe Product has no function or capability for user logon, this is not applicable. If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine user account configurations. If the Mainframe Product is not configured to conform to FICAM-issued profiles, this is a finding.
Fix: F-74533r1_fix
Configure the Mainframe Product account management settings to conform to FICAM-issued profiles.
- RMF Control
- MA-3
- Severity
- M
- CCI
- CCI-000870
- Version
- SRG-APP-000073-MFP-000255
- Vuln IDs
-
- V-68419
- Rule IDs
-
- SV-82909r1_rule
Checks: C-68951r1_chk
If the Mainframe Product has no function or capability for scanning activity, this is not applicable. Examine installation and configuration settings. If the Mainframe Product is not configured to scan all media brought into the organization for diagnostic and testing purposes for intentional or unintentionally included malicious code prior to use, this is a finding.
Fix: F-74535r1_fix
Configure the Mainframe Product to scan all media used in maintenance prior to use.
- RMF Control
- MA-4
- Severity
- M
- CCI
- CCI-002884
- Version
- SRG-APP-000409-MFP-000257
- Vuln IDs
-
- V-68421
- Rule IDs
-
- SV-82911r1_rule
Checks: C-68953r1_chk
If the Mainframe Product has no function or capability for nonlocal maintenance this is not applicable. Examine installation and configuration settings. If the Mainframe Product does not audit the nonlocal maintenance and diagnostic sessions audit events defined in site security plan using external security manager files and/or SMF records, this is a finding.
Fix: F-74537r1_fix
Configure the Mainframe Product to audit the nonlocal maintenance and diagnostic sessions audit events defined in site security plan using external security manager files and/or SMF records.
- RMF Control
- MA-4
- Severity
- M
- CCI
- CCI-002890
- Version
- SRG-APP-000411-MFP-000260
- Vuln IDs
-
- V-68423
- Rule IDs
-
- SV-82913r1_rule
Checks: C-68955r1_chk
If the Mainframe Product has no function or capability for nonlocal maintenance, this is not applicable. Examine installation and configuration settings. If the Mainframe Product does not use FIPS 140 compliant modules to protect the integrity of nonlocal maintenance and diagnostic communications, this is a finding.
Fix: F-74539r1_fix
Configure the Mainframe Product to use FIPS 140 compliant modules to protect the integrity of nonlocal maintenance and diagnostic communications.
- RMF Control
- MA-4
- Severity
- M
- CCI
- CCI-003123
- Version
- SRG-APP-000412-MFP-000261
- Vuln IDs
-
- V-68425
- Rule IDs
-
- SV-82915r1_rule
Checks: C-68957r1_chk
If the Mainframe Product has no function or capability for nonlocal maintenance, this is not applicable. Examine installation and configuration settings. If the Mainframe Product does not use FIPS 140 compliant modules to protect the confidentiality of nonlocal maintenance and diagnostic communications, this is a finding.
Fix: F-74541r1_fix
Configure the Mainframe Product to use FIPS 140 compliant modules to protect the confidentiality of nonlocal maintenance and diagnostic communications.
- RMF Control
- MA-4
- Severity
- M
- CCI
- CCI-002891
- Version
- SRG-APP-000413-MFP-000262
- Vuln IDs
-
- V-68427
- Rule IDs
-
- SV-82917r1_rule
Checks: C-68959r1_chk
If the Mainframe Product has no function or capability for nonlocal maintenance, this is not applicable. Examine installation and configuration settings. If the Mainframe Product does not verify remote disconnection at the termination of nonlocal maintenance and diagnostic sessions, this is a finding.
Fix: F-74543r1_fix
Configure the Mainframe Product to verify remote disconnection at the termination of nonlocal maintenance and diagnostic sessions.
- RMF Control
- MA-4
- Severity
- M
- CCI
- CCI-000879
- Version
- SRG-APP-000186-MFP-000264
- Vuln IDs
-
- V-68429
- Rule IDs
-
- SV-82919r1_rule
Checks: C-68961r1_chk
If the Mainframe Product has no function or capability for nonlocal maintenance this is not applicable. Examine installation and configuration settings. If the Mainframe Product does not terminate all sessions and network connections when nonlocal maintenance is completed, this is a finding.
Fix: F-74545r1_fix
Configure the Mainframe Product to terminate all sessions and network connections when nonlocal maintenance is completed.
- RMF Control
- RA-5
- Severity
- M
- CCI
- CCI-001067
- Version
- SRG-APP-000414-MFP-000265
- Vuln IDs
-
- V-68431
- Rule IDs
-
- SV-82921r1_rule
Checks: C-68963r1_chk
If the Mainframe Product has no function or capability to perform vulnerability scanning function this is not applicable. Examine installation and configuration settings. If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. If the Mainframe Product does not restrict privilege access to all information system infrastructure components to appropriate personnel, this is a finding.
Fix: F-74547r1_fix
Configure the Mainframe Product account management settings to restrict privilege access to all information system infrastructure components to appropriate personnel.
- RMF Control
- SC-13
- Severity
- M
- CCI
- CCI-002450
- Version
- SRG-APP-000416-MFP-000269
- Vuln IDs
-
- V-68433
- Rule IDs
-
- SV-82923r1_rule
Checks: C-68965r1_chk
If the Mainframe Product is deployed in an unclassified environment, this is not applicable. Examine installation and configuration settings. If the Mainframe Product does not implement NSA-approved cryptography to protect classified information using an external security manager (ESM), this is a finding.
Fix: F-74549r1_fix
Configure the Mainframe Product to implement NSA-approved cryptography to protect classified information using an external security manager.
- RMF Control
- SC-13
- Severity
- M
- CCI
- CCI-002450
- Version
- SRG-APP-000514-MFP-000270
- Vuln IDs
-
- V-68435
- Rule IDs
-
- SV-82925r1_rule
Checks: C-68967r1_chk
Examine installation and configuration settings. If the Mainframe Product does not implement FIPS 140 cryptography to provision digital signatures in accordance with applicable federal laws, Executive orders, directives, policies, regulations, and standards, this is a finding.
Fix: F-74551r1_fix
Configure the Mainframe Product settings to implement FIPS 140 cryptography to provision digital signatures in accordance with applicable federal laws, Executive orders, directives, policies, regulations, and standards.
- RMF Control
- SC-13
- Severity
- M
- CCI
- CCI-002450
- Version
- SRG-APP-000514-MFP-000272
- Vuln IDs
-
- V-68437
- Rule IDs
-
- SV-82927r1_rule
Checks: C-68969r1_chk
Examine installation and configuration settings. If the Mainframe Product does not implement FIPS 140 cryptography to generate and validate cryptographic hashes in accordance with applicable federal laws, Executive orders, directives, policies, regulations, and standards, this is a finding.
Fix: F-74553r1_fix
Configure the Mainframe Product settings to implement FIPS 140 cryptography to generate and validate cryptographic hashes in accordance with applicable federal laws, Executive orders, directives, policies, regulations, and standards.
- RMF Control
- SC-13
- Severity
- M
- CCI
- CCI-002450
- Version
- SRG-APP-000514-MFP-000274
- Vuln IDs
-
- V-68439
- Rule IDs
-
- SV-82929r1_rule
Checks: C-68971r1_chk
Examine installation and configuration settings. If the Mainframe Product does not implement FIPS 140 cryptography to protect unclassified information requiring confidentiality and cryptographic protection in accordance with applicable federal laws, Executive orders, directives, policies, regulations, and standards, this is a finding.
Fix: F-74555r1_fix
Configure the Mainframe Product settings to implement FIPS 140 cryptography to protect unclassified information requiring confidentiality and cryptographic protection in accordance with applicable federal laws, Executive orders, directives, policies, regulations, and standards.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001166
- Version
- SRG-APP-000206-MFP-000277
- Vuln IDs
-
- V-68445
- Rule IDs
-
- SV-82935r1_rule
Checks: C-68977r1_chk
If the Mainframe Product has no function for the use of mobile code, this is not applicable. Examine installation and configuration settings. If the Mainframe Product does not identify mobile code in the installation, this is a finding.
Fix: F-74561r1_fix
Configure the Mainframe Product to identify mobile code in the installation.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- SRG-APP-000207-MFP-000278
- Vuln IDs
-
- V-68447
- Rule IDs
-
- SV-82937r1_rule
Checks: C-68979r1_chk
If the Mainframe Product has no function for the use of mobile code, this is not applicable. Examine installation and configuration settings. If the Mainframe Product does not block and/or alert system programmers and security administrators when prohibited mobile code is identified, this is a finding.
Fix: F-74563r1_fix
Configure the Mainframe Product to block and/or alert system programmers and security administrators when prohibited mobile code is identified.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001169
- Version
- SRG-APP-000209-MFP-000279
- Vuln IDs
-
- V-68449
- Rule IDs
-
- SV-82939r1_rule
Checks: C-68981r1_chk
If the Mainframe Product has no function or capability for mobile code use, this is not applicable. Examine installation and configuration settings. If the Mainframe Product is not configured to prevent the download of prohibited mobile code, this is a finding.
Fix: F-74565r1_fix
Configure the Mainframe Product to prevent the download of prohibited mobile code.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- SRG-APP-000112-MFP-000280
- Vuln IDs
-
- V-68451
- Rule IDs
-
- SV-82941r1_rule
Checks: C-68983r1_chk
If the Mainframe Product has no function or capability for mobile code use, this is not applicable. Examine installation and configuration settings. If the Mainframe Product is not configured to prevent the execution of prohibited mobile code, this is a finding.
Fix: F-74567r1_fix
Configure the Mainframe Product to prevent the execution of prohibited mobile code.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- SRG-APP-000210-MFP-000281
- Vuln IDs
-
- V-68453
- Rule IDs
-
- SV-82943r1_rule
Checks: C-68985r1_chk
If the Mainframe Product has no function or capability for mobile code use, this is not applicable. Examine installation and configuration settings. If the Mainframe Product is not configured to prevent the automatic execution of mobile code in all applications, this is a finding.
Fix: F-74569r1_fix
Configure the Mainframe Product to prevent the automatic execution of mobile code in all applications.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-002460
- Version
- SRG-APP-000488-MFP-000282
- Vuln IDs
-
- V-68455
- Rule IDs
-
- SV-82945r1_rule
Checks: C-68987r1_chk
If the Mainframe Product has no function or capability for mobile code use, this is not applicable. Examine installation and configuration settings. If the Mainframe Product is not configured to prompt user for action before executing mobile code, this is a finding.
Fix: F-74571r1_fix
Configure the Mainframe Product to prompt the user for action before executing mobile code.
- RMF Control
- SC-2
- Severity
- M
- CCI
- CCI-001082
- Version
- SRG-APP-000211-MFP-000283
- Vuln IDs
-
- V-68457
- Rule IDs
-
- SV-82947r1_rule
Checks: C-68989r1_chk
Examine installation and configuration settings. User module should be loaded into a separate dataset than system management modules. If the Mainframe Product does not differentiate user functionality from product management functionality, this is a finding.
Fix: F-74573r1_fix
Configure the Mainframe Product to load user modules into a separate dataset than system management modules.
- RMF Control
- SC-24
- Severity
- M
- CCI
- CCI-001190
- Version
- SRG-APP-000225-MFP-000300
- Vuln IDs
-
- V-68459
- Rule IDs
-
- SV-82949r1_rule
Checks: C-68991r1_chk
Examine installation and configuration settings. If the Mainframe Product is not configured to secure all processes to a secure state (i.e., not allowing access to protected privileges and procedures in the event of failure), this is a finding.
Fix: F-74575r1_fix
Configure the Mainframe Product to secure all processes to a secure state (i.e., not allowing access to protected privileges and procedures in the event of failure).
- RMF Control
- SC-24
- Severity
- M
- CCI
- CCI-001665
- Version
- SRG-APP-000226-MFP-000301
- Vuln IDs
-
- V-68461
- Rule IDs
-
- SV-82951r1_rule
Checks: C-68993r1_chk
Examine installation and configuration settings. If the Mainframe Product is not configured to preserve information necessary to determine cause of failure and to assist in the return to normal operation, this is a finding.
Fix: F-74577r1_fix
Configure the Mainframe Product to preserve information necessary to determine cause of failure and to assist in the return to normal operation.
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-001199
- Version
- SRG-APP-000231-MFP-000302
- Vuln IDs
-
- V-68463
- Rule IDs
-
- SV-82953r1_rule
Checks: C-68995r1_chk
Examine installation and configuration settings. Verify that the Mainframe Product identifies product system-related files and user files for dataset/resource protection. If the Mainframe Product is not configured to protect product system and user files for dataset/resources from unauthorized access, this is a finding. If an external security manager (ESM) is in use, examine ESM configuration and rules. If the configuration and rules do not protect product system-related files and user files for dataset resources from unauthorized access, this is a finding.
Fix: F-74579r1_fix
Configure the Mainframe Product to protect the product system and user files for dataset/resources from unauthorized access in accordance with applicable access control policies. This can be accomplished using an ESM. Configure the ESM to restrict access to authorized users only in accordance with applicable access control policies.
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-002475
- Version
- SRG-APP-000428-MFP-000303
- Vuln IDs
-
- V-68465
- Rule IDs
-
- SV-82955r1_rule
Checks: C-68997r1_chk
Examine installation and configuration settings. Review requirements for relevant organizational or site-defined information. If the Mainframe Product does not have cryptographic mechanisms implemented to prevent unauthorized modification of all information not cleared for public release at rest on system components outside of organization facilities, this is a finding.
Fix: F-74581r1_fix
Configure the Mainframe Product to implement cryptographic mechanisms to prevent unauthorized modification of all information not cleared for public release at rest on system components outside of organization facilities.
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-002476
- Version
- SRG-APP-000429-MFP-000304
- Vuln IDs
-
- V-68467
- Rule IDs
-
- SV-82957r1_rule
Checks: C-68999r1_chk
Examine installation and configuration settings. Review requirements for relevant organization or site-defined information. If the Mainframe Product does not have cryptographic mechanisms implemented to prevent unauthorized disclosure of all information not cleared for public release at rest on system components outside of organization facilities, this is a finding.
Fix: F-74583r1_fix
Configure the Mainframe Product to implement cryptographic mechanisms to prevent unauthorized disclosure of all information not cleared for public release at rest on system components outside of organization facilities.
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- SRG-APP-000233-MFP-000305
- Vuln IDs
-
- V-68469
- Rule IDs
-
- SV-82959r1_rule
Checks: C-69001r1_chk
Examine installation and configuration settings. Security modules should be loaded into different datasets than nonsecurity modules. If the Mainframe Product does not differentiate between security and nonsecurity functions and provide procedure to isolate the functions, this is a finding.
Fix: F-74585r1_fix
Configure the Mainframe Product to load security modules into a separate dataset than nonsecurity modules.
- RMF Control
- SC-39
- Severity
- M
- CCI
- CCI-002530
- Version
- SRG-APP-000431-MFP-000312
- Vuln IDs
-
- V-68471
- Rule IDs
-
- SV-82961r1_rule
Checks: C-69003r1_chk
If the Mainframe Product has no function or capability for multi-session operation, this is not applicable. If the Mainframe Product is not configured to uniquely define and engineer each session to execute independently of any other session, this is a finding.
Fix: F-74587r1_fix
Configure the Mainframe Product to uniquely define and engineer each session to execute independently of any other session.
- RMF Control
- SI-10
- Severity
- M
- CCI
- CCI-001310
- Version
- SRG-APP-000251-MFP-000328
- Vuln IDs
-
- V-68473
- Rule IDs
-
- SV-82963r1_rule
Checks: C-69005r1_chk
If the Mainframe Product has no function or capability for user/data input, this is not applicable. Examine installation and configuration settings. If the Mainframe Product is not configured to validate input, this is a finding.
Fix: F-74589r1_fix
Configure the Mainframe Product to validate input.
- RMF Control
- SI-10
- Severity
- M
- CCI
- CCI-002754
- Version
- SRG-APP-000447-MFP-000332
- Vuln IDs
-
- V-68475
- Rule IDs
-
- SV-82965r1_rule
Checks: C-69007r1_chk
If the Mainframe Product has no function or capability for user/data input, this is not applicable. Examine installation and configuration settings. If the Mainframe Product is not configured to behave in a predictable and documented manner that reflects organizational and system objectives when invalid inputs are received, this is a finding.
Fix: F-74591r1_fix
Configure the Mainframe Product to behave in a predictable and documented manner that reflects organizational and system objectives when invalid inputs are received.
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- SRG-APP-000266-MFP-000334
- Vuln IDs
-
- V-68477
- Rule IDs
-
- SV-82967r1_rule
Checks: C-69009r1_chk
Examine product documentation and code. If error messages do not limit information provided to only that which is necessary for corrective actions, this is a finding.
Fix: F-74593r1_fix
Configure the Mainframe Product to limit information provided to only that which is necessary for corrective actions.
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001314
- Version
- SRG-APP-000267-MFP-000335
- Vuln IDs
-
- V-68479
- Rule IDs
-
- SV-82969r1_rule
Checks: C-69011r1_chk
Examine product documentation and code. If full text detailed error message are not restricted to system programmers and/or security administrators, this is a finding.
Fix: F-74595r1_fix
Configure the Mainframe Product to restrict full text detailed error message to system programmers and/or security administrators only.
- RMF Control
- SI-16
- Severity
- M
- CCI
- CCI-002824
- Version
- SRG-APP-000450-MFP-000338
- Vuln IDs
-
- V-68481
- Rule IDs
-
- SV-82971r1_rule
Checks: C-69013r1_chk
Examine installation and configuration settings. Determine if critical core programs to the operating system are identified. If the Mainframe Product does not protect critical core programs, this is a finding. If an external security manager (ESM) is in use verify that the ESM is configured and/or has rules to protect critical core programs. If it does not, this is a finding.
Fix: F-74597r1_fix
Configure the Mainframe Product to identify critical core programs to the operating system for protection in accordance with applicable access control policies. This can be accomplished by an external security manager (ESM). Configure the ESM to restrict access to these critical core programs to appropriate users in accordance with applicable access control policies.
- RMF Control
- SI-2
- Severity
- M
- CCI
- CCI-002617
- Version
- SRG-APP-000454-MFP-000343
- Vuln IDs
-
- V-68483
- Rule IDs
-
- SV-82973r1_rule
Checks: C-69015r1_chk
Examine inventory of installed software components for the Mainframe Product. If the Mainframe Product does not remove all upgraded/replaced software components that are no longer required for operation, this is a finding.
Fix: F-74599r1_fix
Configure the Mainframe Product to remove all upgraded/replaced software components that are no longer required for operation.
- RMF Control
- SI-2
- Severity
- M
- CCI
- CCI-002605
- Version
- SRG-APP-000456-MFP-000345
- Vuln IDs
-
- V-68485
- Rule IDs
-
- SV-82975r1_rule
Checks: C-69017r1_chk
Review Mainframe Product published Version release information. Review authoritative sources. If security relevant updates are not installed as required, this is a finding.
Fix: F-74601r1_fix
Install security relevant updates as required.
- RMF Control
- SI-3
- Severity
- M
- CCI
- CCI-001247
- Version
- SRG-APP-000272-MFP-000347
- Vuln IDs
-
- V-68487
- Rule IDs
-
- SV-82977r1_rule
Checks: C-69019r1_chk
If the Mainframe Product has no function or capability for providing malicious code scanning or protection, this is not applicable. Refer to organizational-defined update procedures. Examine installation and configuration settings. If the Mainframe Product is not configured to receive automatic updates using organizational-defined procedures, this is a finding.
Fix: F-74603r1_fix
Configure the Mainframe Product to receive automatic updates using organizational-defined procedures.
- RMF Control
- SI-3
- Severity
- M
- CCI
- CCI-001240
- Version
- SRG-APP-000276-MFP-000353
- Vuln IDs
-
- V-68489
- Rule IDs
-
- SV-82979r1_rule
Checks: C-69021r1_chk
If the Mainframe Product has no function or capability for providing malicious code scanning or protection, this is not applicable. Refer to organizational configuration management policy and procedures. Examine installation and configuration settings. If the Mainframe Product is not configured to install new releases using organizational configuration management policy and procedure, this is a finding.
Fix: F-74605r1_fix
Configure the Mainframe Product to install new releases using organizational configuration management policy and procedures.
- RMF Control
- SI-3
- Severity
- M
- CCI
- CCI-001241
- Version
- SRG-APP-000277-MFP-000354
- Vuln IDs
-
- V-68491
- Rule IDs
-
- SV-82981r1_rule
Checks: C-69023r1_chk
If the Mainframe Product has no function or capability for providing malicious code scanning or protection, this is not applicable. Examine installation and configuration settings. If the Mainframe Product is not configured to perform periodic scans of information system every seven days, this is a finding.
Fix: F-74607r1_fix
Configure the Mainframe Product to perform periodic scans of information system every seven days.
- RMF Control
- SI-6
- Severity
- M
- CCI
- CCI-002696
- Version
- SRG-APP-000472-MFP-000370
- Vuln IDs
-
- V-68493
- Rule IDs
-
- SV-82983r1_rule
Checks: C-69025r1_chk
Examine the installation, configuration, and product documentation. If the Mainframe Product verification of the correct operation of security functions, which may include the valid connection to an external security manager (ESM), is not performed, this is a finding.
Fix: F-74609r1_fix
If necessary, configure the Mainframe Product configuration and installation settings to perform verification of the correct operation of security functions.
- RMF Control
- SI-6
- Severity
- M
- CCI
- CCI-002699
- Version
- SRG-APP-000473-MFP-000371
- Vuln IDs
-
- V-68495
- Rule IDs
-
- SV-82985r1_rule
Checks: C-69027r1_chk
Examine the installation, configuration, and product documentation. If the Mainframe Product verification of the correct operation of security functions, which may include the valid connection to an external security manager (ESM), is not performed upon product startup/restart, or by a user with privileged access, and/or every 30 days, this is a finding.
Fix: F-74611r1_fix
If necessary, configure the Mainframe Product configuration and installation settings to perform verification of the correct operation of security functions, which may include the valid connection to an ESM, upon product startup/restart, or by a user with privileged access, and/or every 30 days.
- RMF Control
- SI-6
- Severity
- M
- CCI
- CCI-001294
- Version
- SRG-APP-000275-MFP-000372
- Vuln IDs
-
- V-68497
- Rule IDs
-
- SV-82987r1_rule
Checks: C-69029r1_chk
Review Mainframe Product Installation instructions and settings. If the Mainframe Product does not provide a message to the system programmer and security administrator to notify of failed security verification tests, this is a finding.
Fix: F-74613r1_fix
Configure the Mainframe Product to notify the system programmer and security administrator of failed security verification tests.
- RMF Control
- SI-6
- Severity
- M
- CCI
- CCI-002702
- Version
- SRG-APP-000474-MFP-000373
- Vuln IDs
-
- V-68499
- Rule IDs
-
- SV-82989r1_rule
Checks: C-69031r1_chk
Examine installation and configuration setting If the Mainframe Product is not configured to shut down; and/or restart and notify system programmer and operation staff when anomalies in the operation of security functions as defined by site security plan are discovered, this is a finding.
Fix: F-74615r1_fix
Configure the Mainframe Product to shut down; and/or restart and notify system programmer and operation staff when anomalies in the operation of the security functions as defined in site security plan are discovered.
- RMF Control
- SI-7
- Severity
- M
- CCI
- CCI-002710
- Version
- SRG-APP-000475-MFP-000374
- Vuln IDs
-
- V-68501
- Rule IDs
-
- SV-82991r1_rule
Checks: C-69033r1_chk
If the Mainframe Product has no function or capability for integrity verification, this is not applicable. Examine installation and configuration settings. If the Mainframe Product is not configured to perform an integrity check of all software from vendors/sources that provide cryptographic mechanisms to enable the validation of code authenticity and integrity at startup, at transitional states as defined in site security plan or security-relevant events, or annually, this is a finding.
Fix: F-74617r1_fix
Configure the Mainframe Product to perform an integrity check of all software from vendors/sources that provide cryptographic mechanisms to enable the validation of code authenticity and integrity at startup, at transitional states as defined in site security plan or security-relevant events, or annually.
- RMF Control
- SI-7
- Severity
- M
- CCI
- CCI-002712
- Version
- SRG-APP-000477-MFP-000376
- Vuln IDs
-
- V-68503
- Rule IDs
-
- SV-82993r1_rule
Checks: C-69035r1_chk
If the Mainframe Product has no function or capability for integrity verification, this is not applicable. Examine installation and configuration settings. If the Mainframe Product is not configured to perform an integrity check of information as defined in site security plan at startup, at transitional states as defined in site security plan or security-relevant events, or annually, this is a finding.
Fix: F-74619r1_fix
Configure the Mainframe Product to perform integrity check of inform as defined in site security plan at startup, at transitional states as defined in site security plan or security-relevant events, or annually.
- RMF Control
- SI-7
- Severity
- M
- CCI
- CCI-002715
- Version
- SRG-APP-000480-MFP-000379
- Vuln IDs
-
- V-68505
- Rule IDs
-
- SV-82995r1_rule
Checks: C-69037r1_chk
If the Mainframe Product has no function or capability for integrity verification, this is not applicable. Examine installation and configuration settings. If the Mainframe Product is not configured to automatically shut down the information system, restart the information system, and/or implement security safeguards as conditions as defined in site security plan when integrity violations are discovered, this is a finding.
Fix: F-74621r1_fix
Configure the Mainframe Product to automatically shut down the information system, restart the information system, and/or implement security safeguards as conditions as defined in site security plan when integrity violations are discovered.
- RMF Control
- SI-7
- Severity
- M
- CCI
- CCI-002723
- Version
- SRG-APP-000484-MFP-000383
- Vuln IDs
-
- V-68507
- Rule IDs
-
- SV-82997r1_rule
Checks: C-69039r1_chk
If the Mainframe Product has no function or capability for integrity verification, this is not applicable. Examine installation and configuration settings. If the Mainframe Product is not configured to audit detected potential integrity violations, this is a finding.
Fix: F-74623r1_fix
Configure the Mainframe Product to audit detected potential integrity violations.
- RMF Control
- SI-7
- Severity
- M
- CCI
- CCI-002724
- Version
- SRG-APP-000485-MFP-000384
- Vuln IDs
-
- V-68509
- Rule IDs
-
- SV-82999r1_rule
Checks: C-69041r1_chk
If the Mainframe Product has no function or capability for integrity verification, this is not applicable. Examine installation and configuration settings. If the Mainframe Product is not configured to generate an audit record, alert the current user, alert personnel or roles as defined in site security plan, and/or perform other actions as defined in site security plan, this is a finding.
Fix: F-74625r1_fix
Configure the Mainframe Product to alert the current user, alert personnel or roles as defined in site security plan, and/or perform other actions as defined in site security plan.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000767
- Version
- SRG-APP-000151-MFP-000212
- Vuln IDs
-
- V-68511
- Rule IDs
-
- SV-83001r1_rule
Checks: C-69043r1_chk
If the Mainframe Product has no function or capability for user logon, this is not applicable. If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine user account management configurations. If the Mainframe Product is configured to require multifactor authentication for local access to privileged accounts, this is not a finding
Fix: F-74627r1_fix
Configure the Mainframe Product account management settings to require multifactor authentication for local access to privileged accounts.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000768
- Version
- SRG-APP-000152-MFP-000213
- Vuln IDs
-
- V-68513
- Rule IDs
-
- SV-83003r2_rule
Checks: C-69045r1_chk
If the Mainframe Product has no function or capability for user logon, this is not applicable. If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine user account management configurations. If the Mainframe Product is configured to require multifactor authentication for local access to non-privileged accounts, this is not a finding
Fix: F-74629r1_fix
Configure the Mainframe Product account management settings to require multifactor authentication for local access to non-privileged accounts.