Mainframe Product Security Requirements Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates +181 −184
Comparison against the immediately-prior release (V1R4). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Added rules 181
- V-205439 Medium The Mainframe Product must limit the number of concurrent sessions to three for all accounts and/or account types.
- V-205440 Medium The Mainframe Product must conceal, via the session lock, information previously visible on the display with a publicly viewable image.
- V-205441 Medium The Mainframe Product must initiate a session lock after a 15-minute period of inactivity.
- V-205442 Medium The Mainframe Product must provide the capability for users to directly initiate a session lock.
- V-205443 Medium The Mainframe Product must retain the session lock until the user reestablishes access using established identification and authentication procedures.
- V-205444 Medium The Mainframe Product must use an external security manager for all account management functions.
- V-205445 Medium The Mainframe Product must automatically remove or disable temporary user accounts after 72 hours.
- V-205446 Medium The Mainframe Product must automatically disable accounts after 35 days of account inactivity.
- V-205447 Medium The Mainframe Product must automatically audit account creation.
- V-205448 Medium The Mainframe Product must automatically audit account modification.
- V-205449 Medium The Mainframe Product must automatically audit account disabling actions.
- V-205450 Medium The Mainframe Product must automatically audit account removal actions.
- V-205451 Medium The Mainframe Product must enforce approved authorizations for logical access to sensitive information and system resources in accordance with applicable access control policies.
- V-205452 Medium The Mainframe Product must enforce approved authorizations for security administrator access to sensitive information and system resources in accordance with applicable access control policies.
- V-205453 Medium The Mainframe Product must enforce approved authorizations for system programmer access to sensitive information and system resources in accordance with applicable access control policies.
- V-205454 Medium The Mainframe Product must enforce approved authorizations for controlling the flow of information within the system based on site security plan information flow control policies.
- V-205455 Medium The Mainframe Product must enforce the limit of three consecutive invalid logon attempts by a user during a 15 minute time period.
- V-205456 Medium Mainframe Products scanning for malicious code must scan all media used for system maintenance prior to use.
- V-205457 Medium The Mainframe Product must protect against an individual (or process acting on behalf of an individual) falsely denying having performed actions defined in the site security plan to be covered by non-repudiation.
- V-205458 Medium For Mainframe Products providing audit record aggregation, the Mainframe Product must compile audit records from mainframe components into a system-wide audit trail that is time-correlated with a tolerance for the relationship between time stamps of individual records in the audit trail in accordance with the site security plan.
- V-205459 Medium The Mainframe Product must provide audit record generation capability for DoD-defined auditable events within all application components.
- V-205460 Medium The Mainframe Product must allow only the information system security manager (ISSM) or individuals or roles appointed by the ISSM to select which auditable events are to be audited.
- V-205461 Medium The Mainframe Product must generate audit records when successful/unsuccessful attempts to access privileges occur.
- V-205462 Medium The Mainframe Product must initiate session auditing upon startup.
- V-205464 Medium The Mainframe Product must produce audit records containing information to establish what type of events occurred.
- V-205465 Medium The Mainframe Product must produce audit records containing information to establish when (date and time) the events occurred.
- V-205466 Medium The Mainframe Product must produce audit records containing information to establish where the events occurred.
- V-205467 Medium The Mainframe Product must produce audit records containing information to establish the source of the events.
- V-205468 Medium The Mainframe Product must produce audit records containing information to establish the outcome of the events.
- V-205469 Medium The Mainframe Product must generate audit records containing information to establish the identity of any individual or process associated with the event.
- V-205470 Medium The Mainframe Product must generate audit records containing the full-text recording of privileged commands or the individual identities of group account users.
- V-205471 Medium The Mainframe Product must alert the system administrator (SA) and information system security officer (ISSO) (at a minimum) in the event of an audit processing failure.
- V-205472 Medium The Mainframe Product must shut down by default upon audit failure (unless availability is an overriding concern).
- V-205473 Medium The Mainframe Product must provide the capability to centrally review and analyze audit records from multiple components within the system.
- V-205474 Medium The Mainframe Product must prevent the execution of prohibited mobile code.
- V-205475 Medium The Mainframe Products must provide the capability to filter audit records for events of interest as defined in site security plan.
- V-205476 Medium The Mainframe Products must use internal system clocks to generate time stamps for audit records.
- V-205477 Medium The Mainframe Product must protect audit information from any type of unauthorized read access.
- V-205478 Medium The Mainframe Product must protect audit information from unauthorized modification.
- V-205479 Medium The Mainframe Product must protect audit information from unauthorized deletion.
- V-205480 Medium The Mainframe Product must protect audit tools from unauthorized access.
- V-205481 Medium The Mainframe Product must protect audit tools from unauthorized modification.
- V-205482 Medium The Mainframe Product must protect audit tools from unauthorized deletion.
- V-205483 Medium The Mainframe Product must prevent the installation of patches, service packs, or application components without verification that the software component has been digitally signed using a certificate that is recognized and approved by the organization.
- V-205484 Medium The Mainframe Product must limit privileges to change the Mainframe Product installation datasets to system programmers and authorized users in accordance with applicable access control policies.
- V-205485 Medium The Mainframe Product must limit privileges to change Mainframe Product started task and job datasets to system programmers and authorized users in accordance with applicable access control policies.
- V-205486 Medium The Mainframe Product must limit privileges to change Mainframe Product user datasets to authorized individuals.
- V-205487 Medium The Mainframe Product must be configured to disable non-essential capabilities.
- V-205488 Medium The Mainframe Product must uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).
- V-205489 Medium The Mainframe Product must use multifactor authentication for network access to privileged accounts.
- V-205490 Medium The Mainframe Product must use multifactor authentication for network access to non-privileged accounts.
- V-205491 Medium The Mainframe Product must use multifactor authentication for local access to privileged accounts.
- V-205492 Medium The Mainframe Product must use multifactor authentication for local access to non-privileged accounts.
- V-205493 Medium The Mainframe Product must verify users are authenticated with an individual authenticator prior to using a group authenticator.
- V-205494 Medium The Mainframe Product must enforce a minimum 15-character password length.
- V-205495 Medium The Mainframe Product must prohibit password reuse for a minimum of five generations.
- V-205496 Medium The Mainframe Product must enforce password complexity by requiring that at least one uppercase character be used.
- V-205497 Medium The Mainframe Product must enforce password complexity by requiring that at least one lowercase character be used.
- V-205498 Medium The Mainframe Product must enforce password complexity by requiring that at least one numeric character be used.
- V-205499 Medium The Mainframe Product must enforce password complexity by requiring that at least one special character be used.
- V-205500 Medium The Mainframe Product must require the change of at least 8 of the total number of characters when passwords are changed.
- V-205501 Medium The Mainframe Product must store only cryptographically protected passwords.
- V-205502 Medium The Mainframe Product must transmit only cryptographically protected passwords.
- V-205503 Medium The Mainframe Product must enforce 24 hours/1 day as the minimum password lifetime.
- V-205504 Medium The Mainframe Product must enforce a 60-day maximum password lifetime restriction.
- V-205505 Medium The Mainframe Product, when using PKI-based authentication, must validate certificates by constructing a certification path (which includes status information) to an accepted trust anchor.
- V-205506 Medium The Mainframe Product, when using PKI-based authentication, must enforce authorized access to the corresponding private key.
- V-205507 Medium The Mainframe Product must map the authenticated identity to the individual user or group account for PKI-based authentication.
- V-205508 Medium The Mainframe Product must obscure feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals.
- V-205509 Medium The Mainframe Product must use mechanisms meeting the requirements of applicable federal laws, Executive orders, directives, policies, regulations, standards, and guidance for authentication to a cryptographic module.
- V-205510 Medium The Mainframe Product must uniquely identify and authenticate non-organizational users (or processes acting on behalf of non-organizational users).
- V-205511 Medium The Mainframe Product must provide an audit reduction capability that supports on-demand reporting requirements.
- V-205512 Medium The Mainframe Product must terminate all sessions and network connections when nonlocal maintenance is completed.
- V-205513 Medium The Mainframe Product must identify prohibited mobile code.
- V-205514 Medium The Mainframe Product must block, quarantine, and/or alert system administrators when prohibited mobile code is identified.
- V-205515 Medium The Mainframe Product must prevent the download of prohibited mobile code.
- V-205516 Medium The Mainframe Product must prevent the automatic execution of mobile code in, at a minimum, office applications, browsers, email clients, mobile code run-time environments, and mobile agent systems.
- V-205517 Medium The Mainframe Product must separate user functionality (including user interface services) from information system management functionality.
- V-205518 Medium The Mainframe Product must fail to a secure state if system initialization fails, shutdown fails, or aborts fail.
- V-205519 Medium In the event of application failure, Mainframe Products must preserve any information necessary to determine the cause of failure and any information necessary to return to operations with the least disruption to mission processes.
- V-205520 Medium The Mainframe Product must protect the confidentiality and integrity of all information at rest.
- V-205521 Medium The Mainframe Product must isolate security functions from nonsecurity functions.
- V-205522 Medium The Mainframe Product must be configured such that emergency accounts are never automatically removed or disabled.
- V-205523 Medium The Mainframe Product must check the validity of all data inputs except those specifically identified by the organization.
- V-205524 Medium The Mainframe Product must generate error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries.
- V-205525 Medium The Mainframe Product must reveal full-text detail error messages only to system programmers and/or security administrators.
- V-205526 Medium The Mainframe Product must automatically update malicious code protection mechanisms.
- V-205527 Medium The Mainframe product must notify the system programmer and security administrator of failed security verification tests.
- V-205528 Medium The Mainframe Product must update malicious code protection mechanisms whenever new releases are available in accordance with organizational configuration management policy and procedures.
- V-205529 Medium The Mainframe Product must configure malicious code protection mechanisms to perform periodic scans of the information system every seven days.
- V-205530 Medium The Mainframe Product must use cryptographic mechanisms to protect the integrity of audit tools.
- V-205531 Medium The Mainframe Product must notify system programmers and security administrators when accounts are created.
- V-205532 Medium The Mainframe Product must notify system programmers and security administrators when accounts are modified.
- V-205533 Medium The Mainframe Product must notify system programmers and security administrators for account disabling actions.
- V-205534 Medium The Mainframe Product must notify system programmers and security administrators for account removal actions.
- V-205535 Medium The Mainframe Product must automatically terminate a user session after conditions, as defined in site security plan, are met or trigger events requiring session disconnect.
- V-205536 Medium Mainframe Products requiring user access authentication must provide a logoff capability for a user-initiated communication session.
- V-205537 Medium The Mainframe Product must display an explicit logoff message to users indicating the reliable termination of authenticated communications sessions.
- V-205538 Medium The Mainframe Product must associate types of security attributes having security attribute values as defined in site security plan with information in storage.
- V-205539 Medium The Mainframe Product must associate types of security attributes having security attribute values as defined in site security plan with information in process.
- V-205540 Medium The Mainframe Product must terminate shared/group account credentials when members leave the group.
- V-205541 Medium The Mainframe Product must automatically audit account enabling actions.
- V-205542 Medium The Mainframe Product must notify system programmers and security administrators of account enabling actions.
- V-205543 Medium The Mainframe Product must enforce organization-defined discretionary access control policies over defined subjects and objects.
- V-205544 Medium The Mainframe Product must prevent non-privileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures.
- V-205545 Medium The Mainframe Product must prevent software as identified in the site security plan from executing at higher privilege levels than users executing the software.
- V-205546 Medium The Mainframe Product must audit the execution of privileged functions.
- V-205547 Medium The Mainframe Product must automatically lock the account until the locked account is released by an administrator when three unsuccessful logon attempts in 15 minutes are exceeded.
- V-205552 Medium The Mainframe Product must provide centralized management and configuration of the content to be captured in audit records generated by all application components.
- V-205553 Medium The mainframe product must allocate audit record storage capacity in accordance with organization-defined audit record storage requirements.
- V-205554 Medium The Mainframe Product must off-load audit records onto a different system or media than the system being audited.
- V-205555 Medium The Mainframe Product must provide an immediate warning to the system programmer and security administrator (at a minimum) when allocated audit record storage volume reaches 75 percent of repository maximum audit record storage capacity.
- V-205556 Medium The Mainframe Product must provide an immediate real-time alert to the operations staff, system programmers, and/or security administrators, at a minimum, of all audit failure events requiring real-time alerts.
- V-205557 Medium The Mainframe Product must provide an audit reduction capability that supports on-demand audit review and analysis.
- V-205558 Medium The Mainframe Product must provide an audit reduction capability that supports after-the-fact investigations of security incidents.
- V-205559 Medium The Mainframe Product must provide a report generation capability that supports on-demand audit review and analysis.
- V-205560 Medium The Mainframe Product must provide a report generation capability that supports on-demand reporting requirements.
- V-205561 Medium The Mainframe Product must provide a report generation capability that supports after-the-fact investigations of security incidents.
- V-205562 Medium The Mainframe Product must provide an audit reduction capability that does not alter original content or time ordering of audit records.
- V-205563 Medium The Mainframe Product must provide a report generation capability that does not alter original content or time ordering of audit records.
- V-205564 Medium The Mainframe product must prohibit user installation of software without explicit privileged status.
- V-205565 Medium The Mainframe Product must implement organization-defined automated security responses if baseline configurations are changed in an unauthorized manner.
- V-205566 Medium The Mainframe Product must enforce access restrictions associated with changes to application configuration.
- V-205567 Medium The Mainframe Product must audit the enforcement actions used to restrict access associated with changes to the application.
- V-205568 Medium The Mainframe Product must require users to reauthenticate when circumstances or situations require reauthentication as defined in site security plan.
- V-205569 Medium The Mainframe Product must require devices to reauthenticate when circumstances or situations require reauthentication as defined in site security plan.
- V-205570 Medium The Mainframe Product must accept Personal Identity Verification (PIV) credentials.
- V-205571 Medium The Mainframe Product must electronically verify Personal Identity Verification (PIV) credentials.
- V-205572 Medium The Mainframe Product must allow the use of a temporary password for system logons with an immediate change to a permanent password.
- V-205573 Medium The Mainframe Product must prohibit the use of cached authenticators after one hour.
- V-205574 Medium The Mainframe Product must accept Personal Identity Verification (PIV) credentials from other federal agencies.
- V-205575 Medium The Mainframe Product must electronically verify Personal Identity Verification (PIV) credentials from other federal agencies.
- V-205576 Medium The Mainframe Product must accept FICAM-approved third-party credentials.
- V-205577 Medium The Mainframe Product must conform to FICAM-issued profiles.
- V-205578 Medium Mainframe Products must audit nonlocal maintenance and diagnostic sessions audit events as defined in site security plan.
- V-205579 Medium Mainframe Products must implement cryptographic mechanisms to protect the integrity of nonlocal maintenance and diagnostic communications.
- V-205580 Medium Mainframe Products must implement cryptographic mechanisms to protect the confidentiality of nonlocal maintenance and diagnostic communications.
- V-205581 Medium Mainframe Products must verify remote disconnection at the termination of nonlocal maintenance and diagnostic sessions.
- V-205582 Medium The Mainframe Product must implement privileged access authorization to all information systems and infrastructure components for selected vulnerability scanning activities as defined in the site security plan.
- V-205584 Medium The Mainframe Product must implement cryptographic mechanisms to prevent unauthorized modification of all information not cleared for public release at rest on system components outside of organization facilities.
- V-205585 Medium The Mainframe Product must implement cryptographic mechanisms to prevent unauthorized disclosure of all information not cleared for public release at rest on system components outside of organization facilities.
- V-205586 Medium The Mainframe Product must maintain a separate execution domain for each executing process.
- V-205587 Medium The Mainframe Product must behave in a predictable and documented manner that reflects organizational and system objectives when invalid inputs are received.
- V-205588 Medium The Mainframe Product must implement security safeguards to protect its memory from unauthorized code execution.
- V-205589 Medium The Mainframe Product must remove all upgraded/replaced software components that are no longer required for operation after updated versions have been installed.
- V-205590 Medium The Mainframe Product must install security-relevant software updates within the time period directed by an authoritative source (e.g., IAVMs, CTOs, DTMs, and STIGs).
- V-205591 Medium The Mainframe Product performing organization-defined security functions must verify correct operation of security functions.
- V-205592 Medium The Mainframe Product must perform verification of the correct operation of security functions upon system startup and/or restart; upon command by a user with privileged access; and/or every 30 days.
- V-205593 Medium The Mainframe Product must either shut down, restart, and/or notify the appropriate personnel when anomalies in the operation of the security functions as defined in site security plan are discovered.
- V-205594 Medium The Mainframe product must perform an integrity check of all software from vendors/sources that provide cryptographic mechanisms to enable the validation of code authenticity and integrity at startup, at transitional states as defined in site security plan or security-relevant events, or annually.
- V-205595 Medium The Mainframe Product must perform an integrity check of information as defined in site security plan at startup, at transitional states as defined in site security plan or security-relevant events, or annually.
- V-205596 Medium The Mainframe Product must automatically shut down the information system, restart the information system, and/or implement security safeguards as conditions as defined in site security plan when integrity violations are discovered.
- V-205597 Medium The Mainframe Product must audit detected potential integrity violations.
- V-205598 Medium The Mainframe Product, upon detection of a potential integrity violation, must initiate one or more of the following actions: generate an audit record, alert the current user, alert personnel or roles as defined in the site security plan, and/or perform other actions as defined in the SSP.
- V-205599 Medium The Mainframe Product must prompt the user for action prior to executing mobile code.
- V-205600 Medium The Mainframe Product must generate audit records when successful/unsuccessful attempts to access security objects occur.
- V-205601 Medium The Mainframe Product must generate audit records when successful/unsuccessful attempts to access security levels occur.
- V-205602 Medium The Mainframe Product must generate audit records when successful/unsuccessful attempts to access categories of information (e.g., classification levels) occur.
- V-205603 Medium The Mainframe Product must generate audit records when successful/unsuccessful attempts to modify privileges occur.
- V-205604 Medium The Mainframe Product must generate audit records when successful/unsuccessful attempts to modify security objects occur.
- V-205605 Medium The Mainframe Product must generate audit records when successful/unsuccessful attempts to modify security levels occur.
- V-205606 Medium The Mainframe Product must generate audit records when successful/unsuccessful attempts to modify categories of information (e.g., classification levels) occur.
- V-205607 Medium The Mainframe Product must generate audit records when successful/unsuccessful attempts to delete privileges occur.
- V-205608 Medium The Mainframe Product must generate audit records when successful/unsuccessful attempts to delete security levels occur.
- V-205609 Medium The Mainframe Product must generate audit records when successful/unsuccessful attempts to delete security objects occur.
- V-205610 Medium The Mainframe Product must generate audit records when successful/unsuccessful attempts to delete categories of information (e.g., classification levels) occur.
- V-205611 Medium The Mainframe Product must generate audit records when successful/unsuccessful logon attempts occur.
- V-205612 Medium The Mainframe Product must generate audit records for privileged activities or other system-level access.
- V-205613 Medium The Mainframe Product must generate audit records showing starting and ending time for user access to the system.
- V-205614 Medium The Mainframe Product must generate audit records when concurrent logons from different workstations occur.
- V-205615 Medium The Mainframe Product must generate audit records when successful/unsuccessful accesses to objects occur.
- V-205616 Medium The Mainframe Product must generate audit records for all direct access to the information system.
- V-205617 Medium The Mainframe Product must generate audit records for all account creations, modifications, disabling, and termination events.
- V-205618 Medium The Mainframe Product must generate audit records for all kernel module load, unload, and restart events, and for all program initiations.
- V-205619 Medium The Mainframe Product must implement NIST FIPS-validated cryptography to provision digital signatures in accordance with applicable federal laws, Executive orders, directives, policies, regulations, and standards.
- V-205620 Medium The Mainframe Product must implement NIST FIPS-validated cryptography to generate and validate cryptographic hashes in accordance with applicable federal laws, Executive orders, directives, policies, regulations, and standards.
- V-205621 Medium The Mainframe Product must implement NIST FIPS-validated cryptography to protect unclassified information requiring confidentiality and cryptographic protection in accordance with applicable federal laws, Executive orders, directives, policies, regulations, and standards.
- V-205622 Medium The Mainframe Product must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.
- V-219060 Medium The Mainframe Product must provide the capability for authorized users to select a user session to capture/record or view/hear.
- V-219061 Medium The Mainframe Product must provide the capability for authorized users to remotely view/hear, in real time, all content related to an established user session from a component separate from the Mainframe Product being monitored.
- V-253508 Medium The Mainframe Product must implement NSA-approved cryptography to protect classified information in accordance with applicable federal laws, Executive orders, directives, policies, regulations, and standards.
Removed rules 184
- V-67801 Medium The Mainframe Product must limit the number of concurrent sessions to three for all accounts and/or account types.
- V-68109 Medium The Mainframe Product must conceal, via the session lock, information previously visible on the display with a publicly viewable image.
- V-68111 Medium The Mainframe Product must initiate a session lock after a 15-minute period of inactivity.
- V-68113 Medium The Mainframe Product must provide the capability for users to directly initiate a session lock.
- V-68115 Medium The Mainframe Product must retain the session lock until the user reestablishes access using established identification and authentication procedures.
- V-68117 Medium The Mainframe Product must automatically terminate a user session after conditions, as defined in site security plan, are met or trigger events requiring session disconnect.
- V-68119 Medium Mainframe Products requiring user access authentication must provide a logoff capability for a user-initiated communication session.
- V-68121 Medium The Mainframe Product must display an explicit logoff message to users indicating the reliable termination of authenticated communications sessions.
- V-68123 Medium The Mainframe Product must associate types of security attributes having security attribute values as defined in site security plan with information in storage.
- V-68125 Medium The Mainframe Product must associate types of security attributes having security attribute values as defined in site security plan with information in process.
- V-68127 Medium The Mainframe Product must use an external security manager for all account management functions.
- V-68129 Medium The Mainframe Product must terminate shared/group account credentials when members leave the group.
- V-68131 Medium The Mainframe Product must automatically remove or disable temporary user accounts after 72 hours.
- V-68133 Medium The Mainframe Product must be configured such that emergency accounts are never automatically removed or disabled.
- V-68135 Medium The Mainframe Product must automatically disable accounts after 35 days of account inactivity.
- V-68137 Medium The Mainframe Product must automatically audit account creation.
- V-68139 Medium The Mainframe Product must automatically audit account modification.
- V-68141 Medium The Mainframe Product must automatically audit account disabling actions.
- V-68143 Medium The Mainframe Product must automatically audit account removal actions.
- V-68145 Medium The Mainframe Product must notify system programmers and security administrators when accounts are created.
- V-68147 Medium The Mainframe Product must notify system programmers and security administrators when accounts are modified.
- V-68149 Medium The Mainframe Product must notify system programmers and security administrators for account disabling actions.
- V-68151 Medium The Mainframe Product must notify system programmers and security administrators for account removal actions.
- V-68153 Medium The Mainframe Product must automatically audit account enabling actions.
- V-68157 Medium The Mainframe Product must notify system programmers and security administrators of account enabling actions.
- V-68159 Medium The Mainframe Product must enforce approved authorizations for logical access to sensitive information and system resources in accordance with applicable access control policies.
- V-68161 Medium The Mainframe Product must enforce approved authorizations for security administrator access to sensitive information and system resources in accordance with applicable access control policies.
- V-68163 Medium The Mainframe Product must enforce organization-defined discretionary access control policies over defined subjects and objects.
- V-68165 Medium The Mainframe Product must enforce approved authorizations for system programmer access to sensitive information and system resources in accordance with applicable access control policies.
- V-68167 Medium The Mainframe Product must enforce approved authorizations for controlling the flow of information within the system based on site security plan information flow control policies.
- V-68169 Medium The Mainframe Product must prevent non-privileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures.
- V-68171 Medium The Mainframe Product must prevent software as identified in the site security plan from executing at higher privilege levels than users executing the software.
- V-68173 Medium The Mainframe Product must audit the execution of privileged functions.
- V-68175 Medium The Mainframe Product must enforce the limit of three consecutive invalid logon attempts by a user during a 15 minute time period.
- V-68177 Medium The Mainframe Product must automatically lock the account until the locked account is released by an administrator when three unsuccessful logon attempts in 15 minutes are exceeded.
- V-68179 Medium The Mainframe Product must protect against an individual (or process acting on behalf of an individual) falsely denying having performed actions defined in the site security plan to be covered by non-repudiation.
- V-68181 Medium For Mainframe Products providing audit record aggregation, the Mainframe Product must compile audit records from mainframe components into a system-wide audit trail that is time-correlated with a tolerance for the relationship between time stamps of individual records in the audit trail in accordance with the sites security plan.
- V-68183 Medium The Mainframe Product must provide the capability for system programmers to change the auditing to be performed on all application components based on all selectable event criteria within time thresholds defined in the site security plan.
- V-68185 Medium The Mainframe Product must provide the capability for security administrators to change the auditing to be performed on all application components based on all selectable event criteria within time thresholds defined in site security plan.
- V-68187 Medium The Mainframe Product must provide audit record generation capability for DoD-defined auditable events within all application components.
- V-68189 Medium The Mainframe Product must allow only the information system security manager (ISSM) or individuals or roles appointed by the ISSM to select which auditable events are to be audited.
- V-68191 Medium The Mainframe Product must generate audit records when successful/unsuccessful attempts to access privileges occur.
- V-68193 Medium The Mainframe Product must generate audit records when successful/unsuccessful attempts to access security objects occur.
- V-68195 Medium The Mainframe Product must generate audit records when successful/unsuccessful attempts to access security levels occur.
- V-68197 Medium The Mainframe Product must generate audit records when successful/unsuccessful attempts to access categories of information (e.g., classification levels) occur.
- V-68199 Medium The Mainframe Product must generate audit records when successful/unsuccessful attempts to modify privileges occur.
- V-68201 Medium The Mainframe Product must generate audit records when successful/unsuccessful attempts to modify security objects occur.
- V-68205 Medium The Mainframe Product must generate audit records when successful/unsuccessful attempts to modify security levels occur.
- V-68207 Medium The Mainframe Product must generate audit records when successful/unsuccessful attempts to modify categories of information (e.g., classification levels) occur.
- V-68209 Medium The Mainframe Product must generate audit records when successful/unsuccessful attempts to delete privileges occur.
- V-68211 Medium The Mainframe Product must generate audit records when successful/unsuccessful attempts to delete security levels occur.
- V-68213 Medium The Mainframe Product must generate audit records when successful/unsuccessful attempts to delete security objects occur.
- V-68215 Medium The Mainframe Product must generate audit records when successful/unsuccessful attempts to delete categories of information (e.g., classification levels) occur.
- V-68217 Medium The Mainframe Product must generate audit records when successful/unsuccessful logon attempts occur.
- V-68219 Medium The Mainframe Product must generate audit records for privileged activities or other system-level access.
- V-68221 Medium The Mainframe Product must generate audit records showing starting and ending time for user access to the system.
- V-68223 Medium The Mainframe Product must generate audit records when concurrent logons from different workstations occur.
- V-68225 Medium The Mainframe Product must generate audit records when successful/unsuccessful accesses to objects occur.
- V-68227 Medium The Mainframe Product must generate audit records for all direct access to the information system.
- V-68229 Medium The Mainframe Product must generate audit records for all account creations, modifications, disabling, and termination events.
- V-68231 Medium The Mainframe Product must generate audit records for all kernel module load, unload, and restart events, and for all program initiations.
- V-68233 Medium The Mainframe Product must provide the capability for authorized users to select a user session to capture/record or view/hear.
- V-68235 Medium The Mainframe Product must initiate session auditing upon startup.
- V-68237 Medium The Mainframe Product must provide the capability for authorized users to capture, record, and log all content related to a user session.
- V-68239 Medium The Mainframe Product must provide the capability for authorized users to remotely view/hear, in real time, all content related to an established user session from a component separate from the Mainframe Product being monitored.
- V-68241 Medium The Mainframe Product must produce audit records containing information to establish what type of events occurred.
- V-68243 Medium The Mainframe Product must produce audit records containing information to establish when (date and time) the events occurred.
- V-68245 Medium The Mainframe Product must produce audit records containing information to establish where the events occurred.
- V-68247 Medium The Mainframe Product must produce audit records containing information to establish the source of the events.
- V-68249 Medium The Mainframe Product must produce audit records containing information to establish the outcome of the events.
- V-68251 Medium The Mainframe Product must generate audit records containing information to establish the identity of any individual or process associated with the event.
- V-68253 Medium The Mainframe Product must generate audit records containing the full-text recording of privileged commands or the individual identities of group account users.
- V-68255 Medium The Mainframe Product must provide centralized management and configuration of the content to be captured in audit records generated by all application components.
- V-68257 Medium The mainframe product must allocate audit record storage capacity in accordance with organization-defined audit record storage requirements.
- V-68259 Medium The Mainframe Product must off-load audit records onto a different system or media than the system being audited.
- V-68261 Medium The Mainframe Product must provide an immediate warning to the system programmer and security administrator (at a minimum) when allocated audit record storage volume reaches 75 percent of repository maximum audit record storage capacity.
- V-68263 Medium The Mainframe Product must provide an immediate real-time alert to the operations staff, system programmers, and/or security administrators, at a minimum, of all audit failure events requiring real-time alerts.
- V-68265 Medium The Mainframe Product must alert the system administrator (SA) and information system security officer (ISSO) (at a minimum) in the event of an audit processing failure.
- V-68267 Medium The Mainframe Product must shut down by default upon audit failure (unless availability is an overriding concern).
- V-68269 Medium The Mainframe Product must provide the capability to centrally review and analyze audit records from multiple components within the system.
- V-68271 Medium The Mainframe Products must provide the capability to filter audit records for events of interest as defined in site security plan.
- V-68273 Medium The Mainframe Product must provide an audit reduction capability that supports on-demand audit review and analysis.
- V-68275 Medium The Mainframe Product must provide an audit reduction capability that supports on-demand reporting requirements.
- V-68277 Medium The Mainframe Product must provide an audit reduction capability that supports after-the-fact investigations of security incidents.
- V-68279 Medium The Mainframe Product must provide a report generation capability that supports on-demand audit review and analysis.
- V-68281 Medium The Mainframe Product must provide a report generation capability that supports on-demand reporting requirements.
- V-68283 Medium The Mainframe Product must provide a report generation capability that supports after-the-fact investigations of security incidents.
- V-68285 Medium The Mainframe Product must provide an audit reduction capability that does not alter original content or time ordering of audit records.
- V-68287 Medium The Mainframe Product must provide a report generation capability that does not alter original content or time ordering of audit records.
- V-68289 Medium The Mainframe Products must use internal system clocks to generate time stamps for audit records.
- V-68291 Medium The Mainframe Product must protect audit information from any type of unauthorized read access.
- V-68293 Medium The Mainframe Product must protect audit information from unauthorized modification.
- V-68295 Medium The Mainframe Product must protect audit information from unauthorized deletion.
- V-68297 Medium The Mainframe Product must protect audit tools from unauthorized access.
- V-68299 Medium The Mainframe Product must protect audit tools from unauthorized modification.
- V-68301 Medium The Mainframe Product must protect audit tools from unauthorized deletion.
- V-68303 Medium The Mainframe Product must use cryptographic mechanisms to protect the integrity of audit tools.
- V-68305 Medium The Mainframe product must prohibit user installation of software without explicit privileged status.
- V-68307 Medium The Mainframe Product must implement organization-defined automated security responses if baseline configurations are changed in an unauthorized manner.
- V-68309 Medium The Mainframe Product must enforce access restrictions associated with changes to application configuration.
- V-68311 Medium The Mainframe Product must audit the enforcement actions used to restrict access associated with changes to the application.
- V-68313 Medium The Mainframe Product must prevent the installation of patches, service packs, or application components without verification that the software component has been digitally signed using a certificate that is recognized and approved by the organization.
- V-68315 Medium The Mainframe Product must limit privileges to change the Mainframe Product installation datasets to system programmers and authorized users in accordance with applicable access control policies.
- V-68317 Medium The Mainframe Product must limit privileges to change Mainframe Product started task and job datasets to system programmers and authorized users in accordance with applicable access control policies.
- V-68319 Medium The Mainframe Product must limit privileges to change Mainframe Product user datasets to authorized individuals.
- V-68321 Medium The Mainframe Product must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.
- V-68325 Medium The Mainframe Product must be configured to disable non-essential capabilities.
- V-68327 Medium The Mainframe Product must require users to reauthenticate when circumstances or situations require reauthentication as defined in site security plan.
- V-68329 Medium The Mainframe Product must require devices to reauthenticate when circumstances or situations require reauthentication as defined in site security plan.
- V-68331 Medium The Mainframe Product must uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).
- V-68333 Medium The Mainframe Product must use multifactor authentication for network access to privileged accounts.
- V-68335 Medium The Mainframe Product must accept Personal Identity Verification (PIV) credentials.
- V-68337 Medium The Mainframe Product must electronically verify Personal Identity Verification (PIV) credentials.
- V-68339 Medium The Mainframe Product must use multifactor authentication for network access to non-privileged accounts.
- V-68369 Medium The Mainframe Product must verify users are authenticated with an individual authenticator prior to using a group authenticator.
- V-68371 Medium The Mainframe Product must enforce a minimum 15-character password length.
- V-68373 Medium The Mainframe Product must enforce password complexity by requiring that at least one uppercase character be used.
- V-68375 Medium The Mainframe Product must enforce password complexity by requiring that at least one lowercase character be used.
- V-68377 Medium The Mainframe Product must enforce password complexity by requiring that at least one numeric character be used.
- V-68381 Medium The Mainframe Product must enforce password complexity by requiring that at least one special character be used.
- V-68383 Medium The Mainframe Product must require the change of at least 8 of the total number of characters when passwords are changed.
- V-68385 Medium The Mainframe Product must store only cryptographically protected passwords.
- V-68387 Medium The Mainframe Product must transmit only cryptographically protected passwords.
- V-68389 Medium The Mainframe Product must enforce 24 hours/1 day as the minimum password lifetime.
- V-68391 Medium The Mainframe Product must enforce a 60-day maximum password lifetime restriction.
- V-68393 Medium The Mainframe Product must prohibit password reuse for a minimum of five generations.
- V-68395 Medium The Mainframe Product must allow the use of a temporary password for system logons with an immediate change to a permanent password.
- V-68397 Medium The Mainframe Product must prohibit the use of cached authenticators after one hour.
- V-68399 Medium The Mainframe Product, when using PKI-based authentication, must validate certificates by constructing a certification path (which includes status information) to an accepted trust anchor.
- V-68401 Medium The Mainframe Product, when using PKI-based authentication, must enforce authorized access to the corresponding private key.
- V-68403 Medium The Mainframe Product must map the authenticated identity to the individual user or group account for PKI-based authentication.
- V-68405 Medium The Mainframe Product must obscure feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals.
- V-68407 Medium The Mainframe Product must use mechanisms meeting the requirements of applicable federal laws, Executive orders, directives, policies, regulations, standards, and guidance for authentication to a cryptographic module.
- V-68409 Medium The Mainframe Product must uniquely identify and authenticate non-organizational users (or processes acting on behalf of non-organizational users).
- V-68411 Medium The Mainframe Product must accept Personal Identity Verification (PIV) credentials from other federal agencies.
- V-68413 Medium The Mainframe Product must electronically verify Personal Identity Verification (PIV) credentials from other federal agencies.
- V-68415 Medium The Mainframe Product must accept FICAM-approved third-party credentials.
- V-68417 Medium The Mainframe Product must conform to FICAM-issued profiles.
- V-68419 Medium Mainframe Products scanning for malicious code must scan all media used for system maintenance prior to use.
- V-68421 Medium Mainframe Products must audit nonlocal maintenance and diagnostic sessions audit events as defined in site security plan.
- V-68423 Medium Mainframe Products must implement cryptographic mechanisms to protect the integrity of nonlocal maintenance and diagnostic communications.
- V-68425 Medium Mainframe Products must implement cryptographic mechanisms to protect the confidentiality of nonlocal maintenance and diagnostic communications.
- V-68427 Medium Mainframe Products must verify remote disconnection at the termination of nonlocal maintenance and diagnostic sessions.
- V-68429 Medium The Mainframe Product must terminate all sessions and network connections when nonlocal maintenance is completed.
- V-68431 Medium The Mainframe Product must implement privileged access authorization to all information systems and infrastructure components for selected vulnerability scanning activities as defined in the site security plan.
- V-68433 Medium The Mainframe Product must implement NSA-approved cryptography to protect classified information in accordance with applicable federal laws, Executive orders, directives, policies, regulations, and standards.
- V-68435 Medium The Mainframe Product must implement NIST FIPS-validated cryptography to provision digital signatures in accordance with applicable federal laws, Executive orders, directives, policies, regulations, and standards.
- V-68437 Medium The Mainframe Product must implement NIST FIPS-validated cryptography to generate and validate cryptographic hashes in accordance with applicable federal laws, Executive orders, directives, policies, regulations, and standards.
- V-68439 Medium The Mainframe Product must implement NIST FIPS-validated cryptography to protect unclassified information requiring confidentiality and cryptographic protection in accordance with applicable federal laws, Executive orders, directives, policies, regulations, and standards.
- V-68445 Medium The Mainframe Product must identify prohibited mobile code.
- V-68447 Medium The Mainframe Product must block, quarantine, and/or alert system administrators when prohibited mobile code is identified.
- V-68449 Medium The Mainframe Product must prevent the download of prohibited mobile code.
- V-68451 Medium The Mainframe Product must prevent the execution of prohibited mobile code.
- V-68453 Medium The Mainframe Product must prevent the automatic execution of mobile code in, at a minimum, office applications, browsers, email clients, mobile code run-time environments, and mobile agent systems.
- V-68455 Medium The Mainframe Product must prompt the user for action prior to executing mobile code.
- V-68457 Medium The Mainframe Product must separate user functionality (including user interface services) from information system management functionality.
- V-68459 Medium The Mainframe Product must fail to a secure state if system initialization fails, shutdown fails, or aborts fail.
- V-68461 Medium In the event of application failure, Mainframe Products must preserve any information necessary to determine the cause of failure and any information necessary to return to operations with the least disruption to mission processes.
- V-68463 Medium The Mainframe Product must protect the confidentiality and integrity of all information at rest.
- V-68465 Medium The Mainframe Product must implement cryptographic mechanisms to prevent unauthorized modification of all information not cleared for public release at rest on system components outside of organization facilities.
- V-68467 Medium The Mainframe Product must implement cryptographic mechanisms to prevent unauthorized disclosure of all information not cleared for public release at rest on system components outside of organization facilities.
- V-68469 Medium The Mainframe Product must isolate security functions from nonsecurity functions.
- V-68471 Medium The Mainframe Product must maintain a separate execution domain for each executing process.
- V-68473 Medium The Mainframe Product must check the validity of all data inputs except those specifically identified by the organization.
- V-68475 Medium The Mainframe Product must behave in a predictable and documented manner that reflects organizational and system objectives when invalid inputs are received.
- V-68477 Medium The Mainframe Product must generate error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries.
- V-68479 Medium The Mainframe Product must reveal full-text detail error messages only to system programmers and/or security administrators.
- V-68481 Medium The Mainframe Product must implement security safeguards to protect its memory from unauthorized code execution.
- V-68483 Medium The Mainframe Product must remove all upgraded/replaced software components that are no longer required for operation after updated versions have been installed.
- V-68485 Medium The Mainframe Product must install security-relevant software updates within the time period directed by an authoritative source (e.g., IAVMs, CTOs, DTMs, and STIGs).
- V-68487 Medium The Mainframe Product must automatically update malicious code protection mechanisms.
- V-68489 Medium The Mainframe Product must update malicious code protection mechanisms whenever new releases are available in accordance with organizational configuration management policy and procedures.
- V-68491 Medium The Mainframe Product must configure malicious code protection mechanisms to perform periodic scans of the information system every seven days.
- V-68493 Medium The Mainframe Product performing organization-defined security functions must verify correct operation of security functions.
- V-68495 Medium The Mainframe Product must perform verification of the correct operation of security functions upon system startup and/or restart; upon command by a user with privileged access; and/or every 30 days.
- V-68497 Medium The Mainframe product must notify the system programmer and security administrator of failed security verification tests.
- V-68499 Medium The Mainframe Product must either shut down, restart, and/or notify the appropriate personnel when anomalies in the operation of the security functions as defined in site security plan are discovered.
- V-68501 Medium The Mainframe product must perform an integrity check of all software from vendors/sources that provide cryptographic mechanisms to enable the validation of code authenticity and integrity at startup, at transitional states as defined in site security plan or security-relevant events, or annually.
- V-68503 Medium The Mainframe Product must perform an integrity check of information as defined in site security plan at startup, at transitional states as defined in site security plan or security-relevant events, or annually.
- V-68505 Medium The Mainframe Product must automatically shut down the information system, restart the information system, and/or implement security safeguards as conditions as defined in site security plan when integrity violations are discovered.
- V-68507 Medium The Mainframe Product must audit detected potential integrity violations.
- V-68509 Medium The Mainframe Product, upon detection of a potential integrity violation, must initiate one or more of the following actions: generate an audit record, alert the current user, alert personnel or roles as defined in the site security plan, and/or perform other actions as defined in site security plan.
- V-68511 Medium The Mainframe Product must use multifactor authentication for local access to privileged accounts.
- V-68513 Medium The Mainframe Product must use multifactor authentication for local access to non-privileged accounts.
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- SRG-APP-000001-MFP-000001
- Vuln IDs
-
- V-205439
- V-67801
- Rule IDs
-
- SV-205439r395442_rule
- SV-82291
Checks: C-5705r299550_chk
If the Mainframe Product has no log on capability, this requirement is not applicable. Examine installation and configuration settings. If concurrent sessions are not limited to three per account by type of user, this is a finding.
Fix: F-5705r299551_fix
Configure the Mainframe Product to limit current sessions to three per account by type of user.
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000060
- Version
- SRG-APP-000002-MFP-000002
- Vuln IDs
-
- V-205440
- V-68109
- Rule IDs
-
- SV-205440r395445_rule
- SV-82599
Checks: C-5706r299553_chk
If the Mainframe Product has no data screen capability, this requirement is not applicable. Examine configuration parameters to determine whether information previously displayed on the screen is concealed at a session lock. If information is not concealed, this is a finding.
Fix: F-5706r299554_fix
Configure the Mainframe Product to conceal previously displayed information at a session lock.
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000057
- Version
- SRG-APP-000003-MFP-000003
- Vuln IDs
-
- V-205441
- V-68111
- Rule IDs
-
- SV-205441r395448_rule
- SV-82601
Checks: C-5707r299556_chk
If the Mainframe Product has no data screen capability, this requirement is not applicable. Examine configuration parameters to determine whether the Mainframe Product performs a session lock after 15 minutes of inactivity. If it does not, this is a finding.
Fix: F-5707r299557_fix
Configure the Mainframe Product to perform a session lock after 15 minutes of inactivity.
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000058
- Version
- SRG-APP-000004-MFP-000004
- Vuln IDs
-
- V-205442
- V-68113
- Rule IDs
-
- SV-205442r859061_rule
- SV-82603
Checks: C-5708r299559_chk
If the Mainframe Product has no data screen capability, this requirement is not applicable. Determine whether the Mainframe Product allows users to directly initiate a session lock. If it does not this is a finding. Examine the Mainframe Product configuration parameters and user attributes to determine whether user can initiate a session lock. If the parameters are not properly set and/or user is not permitted, this is a finding.
Fix: F-5708r859060_fix
Configure the Mainframe Product user's attributes to enable ability to initiate a session lock. Verify the external security manager permits it.
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000056
- Version
- SRG-APP-000005-MFP-000005
- Vuln IDs
-
- V-205443
- V-68115
- Rule IDs
-
- SV-205443r395454_rule
- SV-82605
Checks: C-5709r299562_chk
If the Mainframe Product has no data screen capability, this requirement is not applicable. Determine whether the Mainframe Product has the capability to retain the session lock until user reestablishes access using established Identification and authentication procedures. If it does not, this is a finding. Examine configuration settings to determine if sessions locks are held until the user reestablishes access. If they are not properly set, this is a finding.
Fix: F-5709r299563_fix
Configure the Mainframe Product setting to retain session locks until user reestablishes access using established identification and authentication procedures.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000015
- Version
- SRG-APP-000023-MFP-000033
- Vuln IDs
-
- V-205444
- V-68127
- Rule IDs
-
- SV-205444r395475_rule
- SV-82617
Checks: C-5710r299565_chk
Examine installation and configuration settings. If the Mainframe Product does not use an external security manager to support all account management functions, this is a finding.
Fix: F-5710r299566_fix
Configure the Mainframe Product to use an external security manager for all account management functions.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000016
- Version
- SRG-APP-000024-MFP-000036
- Vuln IDs
-
- V-205445
- V-68131
- Rule IDs
-
- SV-205445r395478_rule
- SV-82621
Checks: C-5711r299568_chk
If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine account management settings. If temporary users are not removed or disabled after 72 hours, this is a finding.
Fix: F-5711r299569_fix
Configure the Mainframe Product account management settings to automatically remove or disable temporary user accounts after 72 hours.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000017
- Version
- SRG-APP-000025-MFP-000038
- Vuln IDs
-
- V-205446
- V-68135
- Rule IDs
-
- SV-205446r395481_rule
- SV-82625
Checks: C-5712r299571_chk
If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine account management settings. If the Mainframe Product automatically disables accounts after 35 days of inactivity, this is not a finding.
Fix: F-5712r299572_fix
Configure the Mainframe Product account management settings to automatically disable accounts after 35 days of account inactivity.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000018
- Version
- SRG-APP-000026-MFP-000039
- Vuln IDs
-
- V-205447
- V-68137
- Rule IDs
-
- SV-205447r395484_rule
- SV-82627
Checks: C-5713r299574_chk
If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine account management settings. If the Mainframe Product does not automatically audit account creation, this is a finding.
Fix: F-5713r299575_fix
Configure the Mainframe Product account management settings to automatically audit account creation.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001403
- Version
- SRG-APP-000027-MFP-000040
- Vuln IDs
-
- V-205448
- V-68139
- Rule IDs
-
- SV-205448r395487_rule
- SV-82629
Checks: C-5714r299577_chk
If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine account management settings. If the Mainframe Product does not automatically audit account modification, this is a finding.
Fix: F-5714r299578_fix
Configure the Mainframe Product account management settings to automatically audit account modification.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001404
- Version
- SRG-APP-000028-MFP-000041
- Vuln IDs
-
- V-205449
- V-68141
- Rule IDs
-
- SV-205449r395490_rule
- SV-82631
Checks: C-5715r299580_chk
If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine account management settings. If the Mainframe Product does not automatically audit account disabling actions, this is a finding.
Fix: F-5715r299581_fix
Configure the Mainframe Product account management settings to automatically audit account disabling actions.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001405
- Version
- SRG-APP-000029-MFP-000042
- Vuln IDs
-
- V-205450
- V-68143
- Rule IDs
-
- SV-205450r395493_rule
- SV-82633
Checks: C-5716r299583_chk
If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine account management settings. If the Mainframe Product does not automatically audit account removal actions, this is a finding.
Fix: F-5716r299584_fix
Configure the Mainframe Product account management settings to automatically audit account removal actions.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- SRG-APP-000033-MFP-000056
- Vuln IDs
-
- V-205451
- V-68159
- Rule IDs
-
- SV-205451r539573_rule
- SV-82649
Checks: C-5717r299586_chk
If an external security manager is used, check the external security manager rules and configuration. If there are no rules for these resources or the rules do not restrict user access in accordance with applicable access control policies, this is a finding. Examine mainframe product installation and configuration settings. Verify that the Mainframe Product enforces role and/or resource access in accordance with applicable access control policies. If it does not, this is a finding.
Fix: F-5717r539572_fix
Configure the Mainframe Product to enforce role and/or resource access in accordance with applicable access control policies. This can be accomplished using an external security manager. Configure the external security manager to restrict user access according to applicable access control policies.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- SRG-APP-000033-MFP-000057
- Vuln IDs
-
- V-205452
- V-68161
- Rule IDs
-
- SV-205452r539575_rule
- SV-82651
Checks: C-5718r299589_chk
If an external security manager is used, check the external security manager rules and configuration. If there are no rules for these resources or the rules do not restrict security administrator access in accordance with applicable access control policies, this is a finding. Examine installation and configuration settings. Verify that the Mainframe Product enforces security administrator access to information and system resources in accordance with applicable access control policies. If it does not, this is a finding.
Fix: F-5718r539574_fix
Configure the Mainframe Product to enforce role and/or resource access in accordance with applicable access control policies. This can be accomplished using an external security manager. Configure the external security manager to restrict security administrator access according to applicable access control policies.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- SRG-APP-000033-MFP-000066
- Vuln IDs
-
- V-205453
- V-68165
- Rule IDs
-
- SV-205453r539577_rule
- SV-82655
Checks: C-5719r299592_chk
If an external security manager (ESM) is used, check the ESM rules and configuration. If there are no rules for these resources or the rules do not restrict system programmer access in accordance with applicable access control policies, this is a finding. If an ESM is not in use, examine installation and configuration settings. Verify that the Mainframe Product enforces system programmer access to information and system resources in accordance with applicable access control policies. If it does not, this is a finding.
Fix: F-5719r539576_fix
Configure the Mainframe Product to enforce role and/or resource access in accordance with applicable access control policies. This can be accomplished using an ESM. Configure the ESM to restrict system programmer access according to applicable access control policies.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001368
- Version
- SRG-APP-000038-MFP-000067
- Vuln IDs
-
- V-205454
- V-68167
- Rule IDs
-
- SV-205454r395568_rule
- SV-82657
Checks: C-5720r299595_chk
Examine installation and configuration settings. Verify that the Mainframe Product enforces approved authorizations for controlling the flow of information within the system with applicable access control policies. If it does not, this is a finding.
Fix: F-5720r299596_fix
Configure the Mainframe Product to enforce approved authorizations for controlling the flow of information within the system with applicable access control policies.
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-000044
- Version
- SRG-APP-000065-MFP-000093
- Vuln IDs
-
- V-205455
- V-68175
- Rule IDs
-
- SV-205455r395607_rule
- SV-82665
Checks: C-5721r299598_chk
If the Mainframe Product has no function or capability for user logon, this is not applicable. If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine Mainframe Product configuration settings. Verify that the Mainframe Product account management settings enforce a limit of three consecutive invalid logon attempts by a user during a 15 minute time period. If it does not, this is a finding.
Fix: F-5721r299599_fix
Configure the Mainframe Product account management settings to enforce a limit of three consecutive invalid logon attempts by a user during a 15 minute time period.
- RMF Control
- MA-3
- Severity
- M
- CCI
- CCI-000870
- Version
- SRG-APP-000073-MFP-000255
- Vuln IDs
-
- V-205456
- V-68419
- Rule IDs
-
- SV-205456r395619_rule
- SV-82909
Checks: C-5722r299601_chk
If the Mainframe Product has no function or capability for scanning activity, this is not applicable. Examine installation and configuration settings. If the Mainframe Product is not configured to scan all media brought into the organization for diagnostic and testing purposes for intentional or unintentionally included malicious code prior to use, this is a finding.
Fix: F-5722r299602_fix
Configure the Mainframe Product to scan all media used in maintenance prior to use.
- RMF Control
- AU-10
- Severity
- M
- CCI
- CCI-000166
- Version
- SRG-APP-000080-MFP-000102
- Vuln IDs
-
- V-205457
- V-68179
- Rule IDs
-
- SV-205457r395691_rule
- SV-82669
Checks: C-5723r299604_chk
If the Mainframe Product does not perform tasks on the behalf of other users, this is not applicable. Examine configuration settings. Determine whether settings identify initiating user for authentication. If it does not, this is a finding.
Fix: F-5723r299605_fix
Configure the Mainframe Product to identify initiating user for authentication for all tasks.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000174
- Version
- SRG-APP-000086-MFP-000110
- Vuln IDs
-
- V-205458
- V-68181
- Rule IDs
-
- SV-205458r864585_rule
- SV-82671
Checks: C-5724r299607_chk
If the Mainframe Product does not perform audit record aggregation, this is not applicable. Examine configuration settings. If the Mainframe Product settings do not use the operating system clock for time stamps, this is a finding.
Fix: F-5724r299608_fix
Configure the Mainframe Product to use the operating system clock for time stamps.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- SRG-APP-000089-MFP-000114
- Vuln IDs
-
- V-205459
- V-68187
- Rule IDs
-
- SV-205459r395706_rule
- SV-82677
Checks: C-5725r299610_chk
Examine Mainframe Product documentation. Refer to NIST SP 800-53 AU-2 or the Risk Management Knowledge Service (RMKS) for DoD auditing events. Examine configuration settings. Compare available auditing events. If available auditing events do not include all DoD-defined auditing events, this is a finding. If auditing is not available for all components of the Mainframe Product, this is a finding.
Fix: F-5725r299611_fix
Configure the Mainframe Product to audit all DoD-defined auditing events within all Mainframe Product components.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000171
- Version
- SRG-APP-000090-MFP-000115
- Vuln IDs
-
- V-205460
- V-68189
- Rule IDs
-
- SV-205460r395709_rule
- SV-82679
Checks: C-5726r299613_chk
Examine the configuration settings. Verify the capability to select auditable events is restricted to security administrators (or individuals or roles appointed by the ISSM). If it is not, this is a finding.
Fix: F-5726r299614_fix
Configure the Mainframe Product to restrict selection of auditable events to security administrators (or individuals or roles appointed by the ISSM).
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000091-MFP-000116
- Vuln IDs
-
- V-205461
- V-68191
- Rule IDs
-
- SV-205461r395712_rule
- SV-82681
Checks: C-5727r299616_chk
Examine the installation and configuration settings. Verify that the Mainframe Product identifies privileged functions and writes to SMF and/or uses an external security manager to generate audit records when successful/unsuccessful attempts to access privileges occur. If it does not, this is a finding.
Fix: F-5727r299617_fix
Configure the Mainframe Product to write to SMF and/or provide audit SAF call for the external security manager when successful/unsuccessful attempts to access privileges occur.
- RMF Control
- AU-14
- Severity
- M
- CCI
- CCI-001464
- Version
- SRG-APP-000092-MFP-000137
- Vuln IDs
-
- V-205462
- V-68235
- Rule IDs
-
- SV-205462r395715_rule
- SV-82725
Checks: C-5728r299619_chk
If the Mainframe Product has no function or capability for session operations, this is not applicable. Examine installation and configuration settings. Verify that session auditing is initiated at session startup. If it is not, this is a finding.
Fix: F-5728r299620_fix
Configure the Mainframe Product to initiate session auditing upon startup.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- SRG-APP-000095-MFP-000140
- Vuln IDs
-
- V-205464
- V-68241
- Rule IDs
-
- SV-205464r395721_rule
- SV-82731
Checks: C-5730r299625_chk
Examine installation and configuration settings. Verify data written to external security manager audit files and/or SMF records contain information that details what type of events occurred. If it does not, this is a finding.
Fix: F-5730r299626_fix
Configure the Mainframe Product audit records written to external security manager audit files and/or SMF records to contain information that details what type of events occurred.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000131
- Version
- SRG-APP-000096-MFP-000141
- Vuln IDs
-
- V-205465
- V-68243
- Rule IDs
-
- SV-205465r395724_rule
- SV-82733
Checks: C-5731r299628_chk
Examine installation and configuration settings. Ensure data written to external security manager audit files and/or SMF records contain information that details when events occurred. If it does not, this is a finding.
Fix: F-5731r299629_fix
Configure the Mainframe Product audit records written to external security manager audit files and/or SMF records to contain information that details when (date and time) the events occurred.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000132
- Version
- SRG-APP-000097-MFP-000142
- Vuln IDs
-
- V-205466
- V-68245
- Rule IDs
-
- SV-205466r395727_rule
- SV-82735
Checks: C-5732r299631_chk
Examine installation and configuration settings. Verify data written to external security manager audit files and/or SMF records contain information that details where events occurred. If it does not, this is a finding.
Fix: F-5732r299632_fix
Configure the Mainframe Product audit records written to external security manager audit files and/or SMF records to contain information that details where the events occurred.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000133
- Version
- SRG-APP-000098-MFP-000143
- Vuln IDs
-
- V-205467
- V-68247
- Rule IDs
-
- SV-205467r395730_rule
- SV-82737
Checks: C-5733r299634_chk
Examine installation and configuration settings. Verify data written to external security manager audit files and/or SMF records contain information that details the source of events. If it does not, this is a finding.
Fix: F-5733r299635_fix
Configure the Mainframe Product audit records written to external security manager audit files and/or SMF records to contain information to establish the source of the events.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000134
- Version
- SRG-APP-000099-MFP-000144
- Vuln IDs
-
- V-205468
- V-68249
- Rule IDs
-
- SV-205468r395733_rule
- SV-82739
Checks: C-5734r299637_chk
Examine installation and configuration settings. Verify data written to external security manager audit files and/or SMF records contain information that details the outcome of events. If it does not, this is a finding.
Fix: F-5734r299638_fix
Configure the Mainframe Product audit records written to external security manager audit files and/or SMF records to contain information to establish the outcome of the events.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-001487
- Version
- SRG-APP-000100-MFP-000145
- Vuln IDs
-
- V-205469
- V-68251
- Rule IDs
-
- SV-205469r395736_rule
- SV-82741
Checks: C-5735r299640_chk
Examine installation and configuration settings. Verify data written to external security manager audit files and/or SMF records contain information that details the identity of individuals or processes associated with the event. If it does not, this is a finding.
Fix: F-5735r299641_fix
Configure the Mainframe Product audit records written to external security manager audit files and/or SMF records to contain information to establish the identity of any individual or process associated with the event.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000135
- Version
- SRG-APP-000101-MFP-000146
- Vuln IDs
-
- V-205470
- V-68253
- Rule IDs
-
- SV-205470r395739_rule
- SV-82743
Checks: C-5736r299643_chk
Examine installation and configuration settings. Verify data written to external security manager audit files and/or SMF records contain information that details contain full-text recording of privileged commands or the individual identities of group account users associated with the event. If it does not, this is a finding.
Fix: F-5736r299644_fix
Configure the Mainframe Product audit records written to external security manager audit files and/or SMF records to contain full-text recording of privileged commands or the individual identities of group account users.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-000139
- Version
- SRG-APP-000108-MFP-000154
- Vuln IDs
-
- V-205471
- V-68265
- Rule IDs
-
- SV-205471r395802_rule
- SV-82755
Checks: C-5737r299646_chk
If the Mainframe Product does not perform audit data management or storage function, this is not applicable. Examine configuration settings. Determine if Mainframe Product alerts system programmers or security administrators in the event of audit processing failure. If it does not, this is a finding.
Fix: F-5737r299647_fix
Configure the Mainframe Product to alert system programmers or security administrators in the event of audit processing failure.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-000140
- Version
- SRG-APP-000109-MFP-000155
- Vuln IDs
-
- V-205472
- V-68267
- Rule IDs
-
- SV-205472r395805_rule
- SV-82757
Checks: C-5738r299649_chk
If the Mainframe Product does not perform audit data management or storage function, this is not applicable. Examine configuration settings for audit failure parameters. If Mainframe Product does not shut down by default in the event of audit processing failure, this is a finding. Note: This depends on whether availability is an overriding concern.
Fix: F-5738r299650_fix
Configure the Mainframe Product to shut down by default upon audit failure (unless availability is an overriding concern).
- RMF Control
- AU-6
- Severity
- M
- CCI
- CCI-000154
- Version
- SRG-APP-000111-MFP-000156
- Vuln IDs
-
- V-205473
- V-68269
- Rule IDs
-
- SV-205473r395808_rule
- SV-82759
Checks: C-5739r299652_chk
If the Mainframe Product does not perform audit data management or storage function, this is not applicable. Examine installation and configuration settings. Verify the Mainframe Product has the capability to centrally review and analyze audit records from multiple components in the system. If it does not, this is a finding.
Fix: F-5739r299653_fix
Configure the Mainframe Product to centrally review and analyze audit records from multiple components in the system.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- SRG-APP-000112-MFP-000280
- Vuln IDs
-
- V-205474
- V-68451
- Rule IDs
-
- SV-205474r395811_rule
- SV-82941
Checks: C-5740r299655_chk
If the Mainframe Product has no function or capability for mobile code use, this is not applicable. Examine installation and configuration settings. If the Mainframe Product is not configured to prevent the execution of prohibited mobile code, this is a finding.
Fix: F-5740r299656_fix
Configure the Mainframe Product to prevent the execution of prohibited mobile code.
- RMF Control
- AU-7
- Severity
- M
- CCI
- CCI-000158
- Version
- SRG-APP-000115-MFP-000157
- Vuln IDs
-
- V-205475
- V-68271
- Rule IDs
-
- SV-205475r395814_rule
- SV-82761
Checks: C-5741r299658_chk
If the Mainframe Product does not perform audit data management or storage function, this is not applicable. Examine installation and configuration settings. Refer to the site's auditing policies. Verify the Mainframe Product filters audit record events of interest based on Site defined criteria. If it does not, this is a finding.
Fix: F-5741r299659_fix
Configure the Mainframe Product to filter audit record events of interest based on Site defined criteria
- RMF Control
- AU-8
- Severity
- M
- CCI
- CCI-000159
- Version
- SRG-APP-000116-MFP-000171
- Vuln IDs
-
- V-205476
- V-68289
- Rule IDs
-
- SV-205476r395817_rule
- SV-82779
Checks: C-5742r299661_chk
Examine installation and configuration settings. If the Mainframe Product does not use the z/OS system clock for audit time stamps, this is a finding.
Fix: F-5742r299662_fix
Configure the Mainframe Product to use the z/OS system clock for audit time stamps.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- SRG-APP-000118-MFP-000174
- Vuln IDs
-
- V-205477
- V-68291
- Rule IDs
-
- SV-205477r539590_rule
- SV-82781
Checks: C-5743r299664_chk
Examine installation and configuration settings. Verify the Mainframe Product restricts audit information read access to system programmers, security administrators, and audit personnel. If access is not restricted, this is a finding. If an external security manager (ESM) is being used, examine external security configuration and rules. If the rules do not restrict read access to system programmers, security managers, and audit personnel, this is a finding.
Fix: F-5743r539589_fix
Verify the Mainframe Product restricts read access to system programmers, security administrators, and audit personnel. This can be accomplished using an ESM. Configure the Mainframe Product to provide a SAF call for audit information access. Verify ESM rules restrict read access to system programmers, security administrators, and audit personnel.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000163
- Version
- SRG-APP-000119-MFP-000175
- Vuln IDs
-
- V-205478
- V-68293
- Rule IDs
-
- SV-205478r539592_rule
- SV-82783
Checks: C-5744r299667_chk
Examine installation and configuration settings. Verify that the Mainframe Product restricts audit information update access to system programmers, security administrators, and audit personnel. If access is not restricted, this is a finding. If an external security manager (ESM) is being used, examine the external security configuration and rules. If the rules do not restrict update access to system programmers, security managers, and audit personnel, this is a finding.
Fix: F-5744r539591_fix
Verify the Mainframe Product restricts update or greater access to system programmers, security administrators, and audit personnel. This can be accomplished using an ESM. Configure the Mainframe Product to provide an SAF call for audit information access. Verify ESM rules restrict update or greater access to system programmers, security administrators, and audit personnel.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000164
- Version
- SRG-APP-000120-MFP-000176
- Vuln IDs
-
- V-205479
- V-68295
- Rule IDs
-
- SV-205479r539594_rule
- SV-82785
Checks: C-5745r299670_chk
Examine installation and configuration settings. Verify the Mainframe Product restricts audit information delete access to system programmers, security administrators, and audit personnel. If access is not restricted, this is a finding. If an external security manager (ESM) is being used, examine external security configuration and rules. If the rules do not restrict update or greater access to system programmers, security managers, and audit personnel, this is a finding.
Fix: F-5745r539593_fix
Verify the Mainframe Product restricts update or greater access to the system's programmers, security administrators, and audit personnel. This can be accomplished using an ESM. Configure the Mainframe Product to provide SAF call for audit information access. Ensure external security manager restricts update or greater access to the system's programmers, security administrators, and audit personnel.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001493
- Version
- SRG-APP-000121-MFP-000177
- Vuln IDs
-
- V-205480
- V-68297
- Rule IDs
-
- SV-205480r395829_rule
- SV-82787
Checks: C-5746r299673_chk
If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine installation and configuration settings. Verify the Mainframe Product restricts audit tool access to system programmers, security administrator, and audit personnel. If access is not restricted, this is a finding.
Fix: F-5746r299674_fix
Configure the Mainframe Product to restrict audit tool access to system programmers, security administrators, and audit personnel.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001494
- Version
- SRG-APP-000122-MFP-000178
- Vuln IDs
-
- V-205481
- V-68299
- Rule IDs
-
- SV-205481r395832_rule
- SV-82789
Checks: C-5747r299676_chk
If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine installation and configuration settings. Verify the Mainframe Product restricts audit tool modification to system programmers, security administrator, and audit personnel. If access is not restricted, this is a finding.
Fix: F-5747r299677_fix
Configure the Mainframe Product to restrict audit tool modification to system programmers, security administrators, and audit personnel.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001495
- Version
- SRG-APP-000123-MFP-000179
- Vuln IDs
-
- V-205482
- V-68301
- Rule IDs
-
- SV-205482r395835_rule
- SV-82791
Checks: C-5748r299679_chk
If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine installation and configuration settings. Verify the Mainframe Product restricts the ability to delete audit tool to system programmers, security administrators, and audit personnel. If access is not restricted, this is a finding.
Fix: F-5748r299680_fix
Configure the Mainframe Product to restrict audit tool deletion to system programmers, security administrators, and audit personnel.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- SRG-APP-000131-MFP-000189
- Vuln IDs
-
- V-205483
- V-68313
- Rule IDs
-
- SV-205483r851301_rule
- SV-82803
Checks: C-5749r299682_chk
Examine installation and configuration settings for change management. If the Mainframe Product does not prevent the installation of patches, service packs, or application components without verification that the software component has been digitally signed using a certificate that is recognized and approved by the organization, this is a finding.
Fix: F-5749r539599_fix
Configure installation and configuration settings for change management to prevent the installation of patches, service packs, or application components without verification that the software component has been digitally signed using a certificate that is recognized and approved by the organization.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001499
- Version
- SRG-APP-000133-MFP-000192
- Vuln IDs
-
- V-205484
- V-68315
- Rule IDs
-
- SV-205484r539602_rule
- SV-82805
Checks: C-5750r299685_chk
If an external security manager (ESM) is in use, examine the ESM configurations and rules. If the ESM does not restrict update or greater access to installation datasets to system programmers or security managers or other authorized users as directed by applicable access control policies, this is a finding. If an ESM is NOT in use, examine the Mainframe Product installation and configuration settings. If the Mainframe Product does not restrict update or greater access to Installation datasets to system programmers or security managers or other authorized users as directed by applicable access control policies, this is a finding.
Fix: F-5750r539601_fix
Configure the Mainframe Product to limit privileges to changing Mainframe Product installation datasets to system programmers or security managers or other authorized users as directed by applicable access control policies. This can be accomplished with an ESM. Configure the ESM to restrict update and greater access to Mainframe Product installation datasets to system programmers or security managers or other authorized users in accordance with applicable access control policies.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001499
- Version
- SRG-APP-000133-MFP-000193
- Vuln IDs
-
- V-205485
- V-68317
- Rule IDs
-
- SV-205485r539604_rule
- SV-82807
Checks: C-5751r299688_chk
If an external security manager (ESM) is in use, examine the ESM configurations and rules. If the ESM does not restrict update or greater access to started task and job datasets to system programmers or security managers or other authorized users as directed by applicable access control policies, this is a finding. If an ESM is NOT in use, examine the Mainframe Product installation and configuration settings. If the Mainframe Product does not restrict update or greater access to installation and job datasets to system programmers or security managers or other authorized users as directed by applicable access control policies, this is a finding.
Fix: F-5751r539603_fix
Configure the Mainframe Product to limit privileges to Mainframe Products started tasks and sob datasets to system programmers or other authorized users in accordance with applicable access control policies. This can be accomplished with an ESM. Configure the ESM to restrict update and greater access to Mainframe Product started tasks and job datasets to system programmers or other authorized users in accordance with applicable access control policies.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001499
- Version
- SRG-APP-000133-MFP-000194
- Vuln IDs
-
- V-205486
- V-68319
- Rule IDs
-
- SV-205486r539606_rule
- SV-82809
Checks: C-5752r299691_chk
If an external security manager (ESM) is in use, check the ESM rules and configuration. If there are no rules for Mainframe Product user datasets or the rules do not restrict access to Mainframe Product user datasets to authorized users as directed by applicable access control policies, this is a finding. If an ESM is NOT in use, examine installation and configuration settings. If the Mainframe Product does not restrict access to Mainframe Product user datasets to authorized users as directed by applicable access control policies, this is a finding.
Fix: F-5752r539605_fix
Configure the Mainframe Product to limit privileges to changing the software resident within software libraries. This can be accomplished with an ESM. Configure the ESM to restrict update and greater access to Mainframe Product started tasks and job datasets to security administrators in accordance with applicable access control policies.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- SRG-APP-000141-MFP-000200
- Vuln IDs
-
- V-205487
- V-68325
- Rule IDs
-
- SV-205487r395853_rule
- SV-82815
Checks: C-5753r299694_chk
Refer to Mainframe Product installation documentation to determine sample and default demonstrative components. Examine installation settings. If there are any sample or default demonstrative components in the installation, this is a finding.
Fix: F-5753r299695_fix
Configure the Mainframe Product installation and/or configurations to remove sample and demonstrative components.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000764
- Version
- SRG-APP-000148-MFP-000206
- Vuln IDs
-
- V-205488
- V-68331
- Rule IDs
-
- SV-205488r395859_rule
- SV-82821
Checks: C-5754r299697_chk
If the Mainframe Product has no function or capability for user logon, this is not applicable. If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine user account configurations. If the Mainframe Product does not uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users), this is a finding.
Fix: F-5754r299698_fix
Configure the Mainframe Product account management settings to uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000765
- Version
- SRG-APP-000149-MFP-000207
- Vuln IDs
-
- V-205489
- V-68333
- Rule IDs
-
- SV-205489r397438_rule
- SV-82823
Checks: C-5755r299700_chk
If the Mainframe Product has no function or capability for user logon, this is not applicable. If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine user account management configurations. If the Mainframe Product is configured to require multifactor authentication for network access to privileged accounts, this is not a finding
Fix: F-5755r299701_fix
Configure the Mainframe Product account management settings to require multifactor authentication for network access to privileged accounts.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000766
- Version
- SRG-APP-000150-MFP-000211
- Vuln IDs
-
- V-205490
- V-68339
- Rule IDs
-
- SV-205490r397441_rule
- SV-82829
Checks: C-5756r299703_chk
If the Mainframe Product has no function or capability for user logon, this is not applicable. If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine user account management configurations. If the Mainframe Product is configured to require multifactor authentication for network access to non-privileged accounts, this is not a finding
Fix: F-5756r299704_fix
Configure the Mainframe Product account management settings to require multifactor authentication for network access to non-privileged accounts.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000767
- Version
- SRG-APP-000151-MFP-000212
- Vuln IDs
-
- V-205491
- V-68511
- Rule IDs
-
- SV-205491r397444_rule
- SV-83001
Checks: C-5757r299706_chk
If the Mainframe Product has no function or capability for user logon, this is not applicable. If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine user account management configurations. If the Mainframe Product is configured to require multifactor authentication for local access to privileged accounts, this is not a finding
Fix: F-5757r299707_fix
Configure the Mainframe Product account management settings to require multifactor authentication for local access to privileged accounts.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000768
- Version
- SRG-APP-000152-MFP-000213
- Vuln IDs
-
- V-205492
- V-68513
- Rule IDs
-
- SV-205492r397447_rule
- SV-83003
Checks: C-5758r299709_chk
If the Mainframe Product has no function or capability for user logon, this is not applicable. If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine user account management configurations. If the Mainframe Product is configured to require multifactor authentication for local access to non-privileged accounts, this is not a finding
Fix: F-5758r299710_fix
Configure the Mainframe Product account management settings to require multifactor authentication for local access to non-privileged accounts.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000770
- Version
- SRG-APP-000153-MFP-000214
- Vuln IDs
-
- V-205493
- V-68369
- Rule IDs
-
- SV-205493r397450_rule
- SV-82859
Checks: C-5759r299712_chk
If the Mainframe Product has no function or capability for user logon, this is not applicable. If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine user account management configurations. If the Mainframe Product is configured to require users to authenticate with an individual authenticator prior to using a group authenticator, this is not a finding
Fix: F-5759r299713_fix
Configure the Mainframe Product account management settings to require users to authenticate with an individual authenticator prior to using a group authenticator.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000205
- Version
- SRG-APP-000164-MFP-000227
- Vuln IDs
-
- V-205494
- V-68371
- Rule IDs
-
- SV-205494r397501_rule
- SV-82861
Checks: C-5760r299715_chk
If the Mainframe Product employs an external security manager (ESM) for all account management functions, this is not applicable. Examine user account management configurations. If the Mainframe Product account management configuration does not enforce a minimum 15-character password length, this is a finding.
Fix: F-5760r299716_fix
Configure the Mainframe Product account management to enforce a minimum 15-character password length.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000200
- Version
- SRG-APP-000165-MFP-000237
- Vuln IDs
-
- V-205495
- V-68393
- Rule IDs
-
- SV-205495r397504_rule
- SV-82883
Checks: C-5761r299718_chk
If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine user account management configurations. If the Mainframe Product account management configuration does not prohibit password reuse for a minimum of five generations, this is a finding.
Fix: F-5761r299719_fix
Configure the Mainframe Product account management to prohibit password reuse for a minimum of five generations.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000192
- Version
- SRG-APP-000166-MFP-000228
- Vuln IDs
-
- V-205496
- V-68373
- Rule IDs
-
- SV-205496r397507_rule
- SV-82863
Checks: C-5762r299721_chk
If the Mainframe Product employs an external security manager (ESM) for all account management functions, this is not applicable. Examine user account management configurations. If the Mainframe Product does not require at least one uppercase character be used in passwords, this is a finding.
Fix: F-5762r299722_fix
Configure the Mainframe Product account management settings to require the use of at least one uppercase character in passwords.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000193
- Version
- SRG-APP-000167-MFP-000229
- Vuln IDs
-
- V-205497
- V-68375
- Rule IDs
-
- SV-205497r397510_rule
- SV-82865
Checks: C-5763r299724_chk
If the Mainframe Product employs an external security manager (ESM) for all account management functions, this is not applicable. Examine user account management configurations. If the Mainframe Product account management configurations do not require at least one lowercase character be used in passwords, this is a finding.
Fix: F-5763r299725_fix
Configure the Mainframe Product account management settings to require the use of at least one lowercase character in passwords.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000194
- Version
- SRG-APP-000168-MFP-000230
- Vuln IDs
-
- V-205498
- V-68377
- Rule IDs
-
- SV-205498r397513_rule
- SV-82867
Checks: C-5764r299727_chk
If the Mainframe Product employs an external security manager (ESM) for all account management functions, this is not applicable. Examine user account management configurations. If the Mainframe Product account management configurations do not require at least one numeric character be used in passwords, this is a finding.
Fix: F-5764r299728_fix
Configure the Mainframe Product account management settings to require the use of at least one numeric character in passwords.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-001619
- Version
- SRG-APP-000169-MFP-000231
- Vuln IDs
-
- V-205499
- V-68381
- Rule IDs
-
- SV-205499r397516_rule
- SV-82871
Checks: C-5765r299730_chk
If the Mainframe Product employs an external security manager (ESM) for all account management functions, this is not applicable. Examine user account management configurations. If the Mainframe Product does not enforce password complexity by requiring at least one special character be used, this is a finding.
Fix: F-5765r299731_fix
Configure the Mainframe Product to enforce password complexity by requiring the use of at least one special character in passwords.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000195
- Version
- SRG-APP-000170-MFP-000232
- Vuln IDs
-
- V-205500
- V-68383
- Rule IDs
-
- SV-205500r397519_rule
- SV-82873
Checks: C-5766r299733_chk
If the Mainframe Product employs an external security manager (ESM) for all account management functions, this is not applicable. Examine user account management configurations. If the Mainframe Product account management settings do not require the change of at least 8 of the total characters when passwords are changed, this is a finding.
Fix: F-5766r299734_fix
Configure the Mainframe Product account management settings to require the change of at least 8 of the total characters when passwords are changed.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000196
- Version
- SRG-APP-000171-MFP-000233
- Vuln IDs
-
- V-205501
- V-68385
- Rule IDs
-
- SV-205501r397522_rule
- SV-82875
Checks: C-5767r299736_chk
If the Mainframe Product employs an external security manager (ESM) for all account management functions, this is not applicable. Examine user account management configurations. If the Mainframe Product account management configuration does not require that only cryptographically protected passwords are stored, this is a finding.
Fix: F-5767r299737_fix
Configure the Mainframe Product account management to store only cryptographically protected passwords.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000197
- Version
- SRG-APP-000172-MFP-000234
- Vuln IDs
-
- V-205502
- V-68387
- Rule IDs
-
- SV-205502r397525_rule
- SV-82877
Checks: C-5768r299739_chk
If the Mainframe Product employs an external security manager (ESM) for all account management functions, this is not applicable. Examine user account management configurations. If the Mainframe Product account management configuration does not require transmittal of only cryptographically protected passwords, this is a finding.
Fix: F-5768r299740_fix
Configure the Mainframe Product account management to transmit only cryptographically protected passwords.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000198
- Version
- SRG-APP-000173-MFP-000235
- Vuln IDs
-
- V-205503
- V-68389
- Rule IDs
-
- SV-205503r397588_rule
- SV-82879
Checks: C-5769r299742_chk
If the Mainframe Product employs an external security manager (ESM) for all account management functions, this is not applicable. Examine user account management configurations. If the Mainframe Product account management configuration does not enforce 24 hours/1 day as the minimum password lifetime, this is a finding.
Fix: F-5769r299743_fix
Configure the Mainframe Product account management to enforce 24 hours/1 day as the minimum password lifetime.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000199
- Version
- SRG-APP-000174-MFP-000236
- Vuln IDs
-
- V-205504
- V-68391
- Rule IDs
-
- SV-205504r397591_rule
- SV-82881
Checks: C-5770r299745_chk
If the Mainframe Product employs an external security manager (ESM) for all account management functions, this is not applicable. Examine user account management configurations. If the Mainframe Product account management configuration does not enforce a 60-day maximum password lifetime restriction, this is a finding.
Fix: F-5770r299746_fix
Configure the Mainframe Product account management settings to enforce a 60-day maximum password lifetime restriction.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000185
- Version
- SRG-APP-000175-MFP-000242
- Vuln IDs
-
- V-205505
- V-68399
- Rule IDs
-
- SV-205505r397594_rule
- SV-82889
Checks: C-5771r299748_chk
If the Mainframe Product uses an external security manager (ESM) for all account management, this is not applicable. Examine user account management configurations. If the Mainframe Product account management is not configured to validate certificates by constructing a certification path (which includes status information) to an accepted trust anchor when using PKI-based authentication, this is a finding.
Fix: F-5771r299749_fix
Configure the Mainframe Product account management settings to validate certificates by constructing a certification path (which includes status information) to an accepted trust anchor when using PKI-based authentication.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000186
- Version
- SRG-APP-000176-MFP-000243
- Vuln IDs
-
- V-205506
- V-68401
- Rule IDs
-
- SV-205506r397597_rule
- SV-82891
Checks: C-5772r299751_chk
If the Mainframe Product employs an external security manager (ESM) for all account management functions, this is not applicable. Examine user account management configurations. If the Mainframe Product account management configurations do not enforce authorized access to the corresponding private key when using PKI-based authentication, this is a finding.
Fix: F-5772r299752_fix
Configure the Mainframe Product account management settings to enforce authorized access to the corresponding private key when using PKI-based authentication.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000187
- Version
- SRG-APP-000177-MFP-000244
- Vuln IDs
-
- V-205507
- V-68403
- Rule IDs
-
- SV-205507r397600_rule
- SV-82893
Checks: C-5773r299754_chk
If the Mainframe Product has no function or capability for user logon, this is not applicable. If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine user account configurations. If the Mainframe Product is not configured to map the authenticated identity to the individual user or group account for PKI-based authentication, this is a finding.
Fix: F-5773r299755_fix
Configure the Mainframe Product account management settings to map the authenticated identity to the individual user or group account for PKI-based authentication.
- RMF Control
- IA-6
- Severity
- M
- CCI
- CCI-000206
- Version
- SRG-APP-000178-MFP-000246
- Vuln IDs
-
- V-205508
- V-68405
- Rule IDs
-
- SV-205508r397603_rule
- SV-82895
Checks: C-5774r299757_chk
If the Mainframe Product has no function or capability for user logon, this is not applicable. If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine Mainframe Product installation settings; examine user account configurations. If the Mainframe Product is not configured to obscure feedback of authentication information during the authentication process, this is a finding.
Fix: F-5774r299758_fix
Configure the Mainframe Product account management settings to obscure feedback of authentication information during the authentication process.
- RMF Control
- IA-7
- Severity
- M
- CCI
- CCI-000803
- Version
- SRG-APP-000179-MFP-000247
- Vuln IDs
-
- V-205509
- V-68407
- Rule IDs
-
- SV-205509r397606_rule
- SV-82897
Checks: C-5775r299760_chk
If the Mainframe Product has no function or capability for user logon, this is not applicable. If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine user account configurations. If the Mainframe Product is configured to be FIPS 140 compliant, this is not a finding.
Fix: F-5775r299761_fix
Configure the Mainframe Product account management settings to be FIPS 140 compliant.
- RMF Control
- IA-8
- Severity
- M
- CCI
- CCI-000804
- Version
- SRG-APP-000180-MFP-000248
- Vuln IDs
-
- V-205510
- V-68409
- Rule IDs
-
- SV-205510r397609_rule
- SV-82899
Checks: C-5776r299763_chk
If the Mainframe Product has no function or capability for user logon, this is not applicable. If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine installation and configuration settings. Examine user account configurations. If the Mainframe Product does not uniquely identify and authenticate non-organizational users, this is a finding.
Fix: F-5776r299764_fix
Configure the Mainframe Product account management settings to uniquely identify and authenticate non-organizational users
- RMF Control
- AU-7
- Severity
- M
- CCI
- CCI-001876
- Version
- SRG-APP-000181-MFP-000161
- Vuln IDs
-
- V-205511
- V-68275
- Rule IDs
-
- SV-205511r851302_rule
- SV-82765
Checks: C-5777r299766_chk
If the Mainframe Product does not perform audit data management or storage functions, this is not applicable. Examine installation and configuration settings. Verify the Mainframe Product audit reduction capability supports on-demand reporting. If it does not, this is a finding.
Fix: F-5777r299767_fix
Configure the Mainframe Product audit reduction capability to support on-demand reporting.
- RMF Control
- MA-4
- Severity
- M
- CCI
- CCI-000879
- Version
- SRG-APP-000186-MFP-000264
- Vuln IDs
-
- V-205512
- V-68429
- Rule IDs
-
- SV-205512r397621_rule
- SV-82919
Checks: C-5778r299769_chk
If the Mainframe Product has no function or capability for nonlocal maintenance this is not applicable. Examine installation and configuration settings. If the Mainframe Product does not terminate all sessions and network connections when nonlocal maintenance is completed, this is a finding.
Fix: F-5778r299770_fix
Configure the Mainframe Product to terminate all sessions and network connections when nonlocal maintenance is completed.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001166
- Version
- SRG-APP-000206-MFP-000277
- Vuln IDs
-
- V-205513
- V-68445
- Rule IDs
-
- SV-205513r397639_rule
- SV-82935
Checks: C-5779r299772_chk
If the Mainframe Product has no function for the use of mobile code, this is not applicable. Examine installation and configuration settings. If the Mainframe Product does not identify mobile code in the installation, this is a finding.
Fix: F-5779r299773_fix
Configure the Mainframe Product to identify mobile code in the installation.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- SRG-APP-000207-MFP-000278
- Vuln IDs
-
- V-205514
- V-68447
- Rule IDs
-
- SV-205514r397642_rule
- SV-82937
Checks: C-5780r299775_chk
If the Mainframe Product has no function for the use of mobile code, this is not applicable. Examine installation and configuration settings. If the Mainframe Product does not block and/or alert system programmers and security administrators when prohibited mobile code is identified, this is a finding.
Fix: F-5780r299776_fix
Configure the Mainframe Product to block and/or alert system programmers and security administrators when prohibited mobile code is identified.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001169
- Version
- SRG-APP-000209-MFP-000279
- Vuln IDs
-
- V-205515
- V-68449
- Rule IDs
-
- SV-205515r397645_rule
- SV-82939
Checks: C-5781r299778_chk
If the Mainframe Product has no function or capability for mobile code use, this is not applicable. Examine installation and configuration settings. If the Mainframe Product is not configured to prevent the download of prohibited mobile code, this is a finding.
Fix: F-5781r299779_fix
Configure the Mainframe Product to prevent the download of prohibited mobile code.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- SRG-APP-000210-MFP-000281
- Vuln IDs
-
- V-205516
- V-68453
- Rule IDs
-
- SV-205516r397708_rule
- SV-82943
Checks: C-5782r299781_chk
If the Mainframe Product has no function or capability for mobile code use, this is not applicable. Examine installation and configuration settings. If the Mainframe Product is not configured to prevent the automatic execution of mobile code in all applications, this is a finding.
Fix: F-5782r299782_fix
Configure the Mainframe Product to prevent the automatic execution of mobile code in all applications.
- RMF Control
- SC-2
- Severity
- M
- CCI
- CCI-001082
- Version
- SRG-APP-000211-MFP-000283
- Vuln IDs
-
- V-205517
- V-68457
- Rule IDs
-
- SV-205517r397711_rule
- SV-82947
Checks: C-5783r299784_chk
Examine installation and configuration settings. User module should be loaded into a separate dataset than system management modules. If the Mainframe Product does not differentiate user functionality from product management functionality, this is a finding.
Fix: F-5783r299785_fix
Configure the Mainframe Product to load user modules into a separate dataset than system management modules.
- RMF Control
- SC-24
- Severity
- M
- CCI
- CCI-001190
- Version
- SRG-APP-000225-MFP-000300
- Vuln IDs
-
- V-205518
- V-68459
- Rule IDs
-
- SV-205518r397738_rule
- SV-82949
Checks: C-5784r299787_chk
Examine installation and configuration settings. If the Mainframe Product is not configured to secure all processes to a secure state (i.e., not allowing access to protected privileges and procedures in the event of failure), this is a finding.
Fix: F-5784r299788_fix
Configure the Mainframe Product to secure all processes to a secure state (i.e., not allowing access to protected privileges and procedures in the event of failure).
- RMF Control
- SC-24
- Severity
- M
- CCI
- CCI-001665
- Version
- SRG-APP-000226-MFP-000301
- Vuln IDs
-
- V-205519
- V-68461
- Rule IDs
-
- SV-205519r397741_rule
- SV-82951
Checks: C-5785r299790_chk
Examine installation and configuration settings. If the Mainframe Product is not configured to preserve information necessary to determine cause of failure and to assist in the return to normal operation, this is a finding.
Fix: F-5785r299791_fix
Configure the Mainframe Product to preserve information necessary to determine cause of failure and to assist in the return to normal operation.
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-001199
- Version
- SRG-APP-000231-MFP-000302
- Vuln IDs
-
- V-205520
- V-68463
- Rule IDs
-
- SV-205520r539610_rule
- SV-82953
Checks: C-5786r299793_chk
Examine installation and configuration settings. Verify that the Mainframe Product identifies product system-related files and user files for dataset/resource protection. If the Mainframe Product is not configured to protect product system and user files for dataset/resources from unauthorized access, this is a finding. If an external security manager (ESM) is in use, examine ESM configuration and rules. If the configuration and rules do not protect product system-related files and user files for dataset resources from unauthorized access, this is a finding.
Fix: F-5786r539609_fix
Configure the Mainframe Product to protect the product system and user files for dataset/resources from unauthorized access in accordance with applicable access control policies. This can be accomplished using an ESM. Configure the ESM to restrict access to authorized users only in accordance with applicable access control policies.
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- SRG-APP-000233-MFP-000305
- Vuln IDs
-
- V-205521
- V-68469
- Rule IDs
-
- SV-205521r397747_rule
- SV-82959
Checks: C-5787r299796_chk
Examine installation and configuration settings. Security modules should be loaded into different datasets than nonsecurity modules. If the Mainframe Product does not differentiate between security and nonsecurity functions and provide procedure to isolate the functions, this is a finding.
Fix: F-5787r299797_fix
Configure the Mainframe Product to load security modules into a separate dataset than nonsecurity modules.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001682
- Version
- SRG-APP-000234-MFP-000037
- Vuln IDs
-
- V-205522
- V-68133
- Rule IDs
-
- SV-205522r397750_rule
- SV-82623
Checks: C-5788r299799_chk
If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine account management settings. If emergency accounts are configured to never be automatically removed or disabled, this is not a finding.
Fix: F-5788r299800_fix
Configure the Mainframe Product account management settings to never automatically remove or disable emergency accounts. Accounts should be configured to terminate within 72 hours or until crisis has passed.
- RMF Control
- SI-10
- Severity
- M
- CCI
- CCI-001310
- Version
- SRG-APP-000251-MFP-000328
- Vuln IDs
-
- V-205523
- V-68473
- Rule IDs
-
- SV-205523r397834_rule
- SV-82963
Checks: C-5789r299802_chk
If the Mainframe Product has no function or capability for user/data input, this is not applicable. Examine installation and configuration settings. If the Mainframe Product is not configured to validate input, this is a finding.
Fix: F-5789r299803_fix
Configure the Mainframe Product to validate input.
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- SRG-APP-000266-MFP-000334
- Vuln IDs
-
- V-205524
- V-68477
- Rule IDs
-
- SV-205524r397843_rule
- SV-82967
Checks: C-5790r299805_chk
Examine product documentation and code. If error messages do not limit information provided to only that which is necessary for corrective actions, this is a finding.
Fix: F-5790r299806_fix
Configure the Mainframe Product to limit information provided to only that which is necessary for corrective actions.
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001314
- Version
- SRG-APP-000267-MFP-000335
- Vuln IDs
-
- V-205525
- V-68479
- Rule IDs
-
- SV-205525r397846_rule
- SV-82969
Checks: C-5791r299808_chk
Examine product documentation and code. If full text detailed error message are not restricted to system programmers and/or security administrators, this is a finding.
Fix: F-5791r299809_fix
Configure the Mainframe Product to restrict full text detailed error message to system programmers and/or security administrators only.
- RMF Control
- SI-3
- Severity
- M
- CCI
- CCI-001247
- Version
- SRG-APP-000272-MFP-000347
- Vuln IDs
-
- V-205526
- V-68487
- Rule IDs
-
- SV-205526r397855_rule
- SV-82977
Checks: C-5792r299811_chk
If the Mainframe Product has no function or capability for providing malicious code scanning or protection, this is not applicable. Refer to organizational-defined update procedures. Examine installation and configuration settings. If the Mainframe Product is not configured to receive automatic updates using organizational-defined procedures, this is a finding.
Fix: F-5792r299812_fix
Configure the Mainframe Product to receive automatic updates using organizational-defined procedures.
- RMF Control
- SI-6
- Severity
- M
- CCI
- CCI-001294
- Version
- SRG-APP-000275-MFP-000372
- Vuln IDs
-
- V-205527
- V-68497
- Rule IDs
-
- SV-205527r397861_rule
- SV-82987
Checks: C-5793r299814_chk
Review Mainframe Product Installation instructions and settings. If the Mainframe Product does not provide a message to the system programmer and security administrator to notify of failed security verification tests, this is a finding.
Fix: F-5793r299815_fix
Configure the Mainframe Product to notify the system programmer and security administrator of failed security verification tests.
- RMF Control
- SI-3
- Severity
- M
- CCI
- CCI-001240
- Version
- SRG-APP-000276-MFP-000353
- Vuln IDs
-
- V-205528
- V-68489
- Rule IDs
-
- SV-205528r397864_rule
- SV-82979
Checks: C-5794r299817_chk
If the Mainframe Product has no function or capability for providing malicious code scanning or protection, this is not applicable. Refer to organizational configuration management policy and procedures. Examine installation and configuration settings. If the Mainframe Product is not configured to install new releases using organizational configuration management policy and procedure, this is a finding.
Fix: F-5794r299818_fix
Configure the Mainframe Product to install new releases using organizational configuration management policy and procedures.
- RMF Control
- SI-3
- Severity
- M
- CCI
- CCI-001241
- Version
- SRG-APP-000277-MFP-000354
- Vuln IDs
-
- V-205529
- V-68491
- Rule IDs
-
- SV-205529r397867_rule
- SV-82981
Checks: C-5795r299820_chk
If the Mainframe Product has no function or capability for providing malicious code scanning or protection, this is not applicable. Examine installation and configuration settings. If the Mainframe Product is not configured to perform periodic scans of information system every seven days, this is a finding.
Fix: F-5795r299821_fix
Configure the Mainframe Product to perform periodic scans of information system every seven days.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001496
- Version
- SRG-APP-000290-MFP-000182
- Vuln IDs
-
- V-205530
- V-68303
- Rule IDs
-
- SV-205530r397882_rule
- SV-82793
Checks: C-5796r299823_chk
If the Mainframe Product does not perform audit data management or storage functions, this is not applicable. Examine the Mainframe Product Installation settings. If the Mainframe Product does not use cryptographic mechanisms to protect the integrity of audit tools, this is a finding.
Fix: F-5796r299824_fix
Configure the Mainframe Product to use cryptographic mechanisms to protect the integrity of audit tools.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001683
- Version
- SRG-APP-000291-MFP-000043
- Vuln IDs
-
- V-205531
- V-68145
- Rule IDs
-
- SV-205531r397885_rule
- SV-82635
Checks: C-5797r299826_chk
If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine account management settings. If the Mainframe Product does not notify system programmers and security administrators when accounts are created, this is a finding.
Fix: F-5797r299827_fix
Configure the Mainframe Product account management settings to notify system programmers and security administrators when accounts are created.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001684
- Version
- SRG-APP-000292-MFP-000044
- Vuln IDs
-
- V-205532
- V-68147
- Rule IDs
-
- SV-205532r399514_rule
- SV-82637
Checks: C-5798r299829_chk
If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine account management settings. If the Mainframe Product does not notify system programmers and security administrators when accounts are modified, this is a finding.
Fix: F-5798r299830_fix
Configure the Mainframe Product account management settings to notify system programmers and security administrators when accounts are modified.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001685
- Version
- SRG-APP-000293-MFP-000045
- Vuln IDs
-
- V-205533
- V-68149
- Rule IDs
-
- SV-205533r539570_rule
- SV-82639
Checks: C-5799r299832_chk
If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine account management settings. If the Mainframe Product does not notify System programmers and security administrators of account disabling actions, this is a finding.
Fix: F-5799r299833_fix
Configure the Mainframe Product account management settings to notify system programmers and security administrators when there are account disabling actions performed.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001686
- Version
- SRG-APP-000294-MFP-000046
- Vuln IDs
-
- V-205534
- V-68151
- Rule IDs
-
- SV-205534r399520_rule
- SV-82641
Checks: C-5800r299835_chk
If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine account management settings. If the Mainframe Product does not notify system programmers and security administrators of account removal actions, this is a finding.
Fix: F-5800r299836_fix
Configure the Mainframe Product account management settings to notify system programmers and security administrators when there are account removal actions performed.
- RMF Control
- AC-12
- Severity
- M
- CCI
- CCI-002361
- Version
- SRG-APP-000295-MFP-000006
- Vuln IDs
-
- V-205535
- V-68117
- Rule IDs
-
- SV-205535r851303_rule
- SV-82607
Checks: C-5801r299838_chk
If the Mainframe Product has no data screen capability, this requirement is not applicable. Determine whether the Mainframe Product has capability to terminate user sessions according to conditions as defined in site security plan and triggers. If it cannot, this is a finding. Examine Configuration settings to determine whether the Mainframe Product is configured to automatically terminate sessions. If it is not, this is a finding.
Fix: F-5801r299839_fix
Configure the Mainframe Product to automatically terminate a user session after any conditions as defined in site security plan or trigger requiring disconnect.
- RMF Control
- AC-12
- Severity
- M
- CCI
- CCI-002363
- Version
- SRG-APP-000296-MFP-000007
- Vuln IDs
-
- V-205536
- V-68119
- Rule IDs
-
- SV-205536r851304_rule
- SV-82609
Checks: C-5802r299841_chk
If the Mainframe Product has no logon capability, this requirement is not applicable. If the Mainframe Product does not provide a logout capability for user initiated communication sessions, this is a finding. Examine the Mainframe Product configuration settings to determine whether a user can logoff. If the configurations are not properly set, this is a finding.
Fix: F-5802r299842_fix
Configure the Mainframe Product settings to provide capability of user-initiated logoff.
- RMF Control
- AC-12
- Severity
- M
- CCI
- CCI-002364
- Version
- SRG-APP-000297-MFP-000008
- Vuln IDs
-
- V-205537
- V-68121
- Rule IDs
-
- SV-205537r851305_rule
- SV-82611
Checks: C-5803r299844_chk
If the Mainframe Product has no logon capability, this requirement is not applicable. Examine the Mainframe Product configuration settings to determine whether the Mainframe Product displays an explicit logoff message. If it does not, this is a finding
Fix: F-5803r299845_fix
Configure the Mainframe Product to display a specific logoff message.
- RMF Control
- AC-16
- Severity
- M
- CCI
- CCI-002262
- Version
- SRG-APP-000311-MFP-000025
- Vuln IDs
-
- V-205538
- V-68123
- Rule IDs
-
- SV-205538r851306_rule
- SV-82613
Checks: C-5804r299847_chk
If the Mainframe Product does not perform data management or storage function this is not applicable. Examine installation and configuration settings and / or specific meta-data for security attributes as defined by the organization. If there is no data labeling or tagging, this is a finding.
Fix: F-5804r299848_fix
Configure the Mainframe Product to associate organization-defined security attributes to managed data sets in storage. Verify the datasets attributes are labeled and/or tagged appropriately.
- RMF Control
- AC-16
- Severity
- M
- CCI
- CCI-002263
- Version
- SRG-APP-000313-MFP-000026
- Vuln IDs
-
- V-205539
- V-68125
- Rule IDs
-
- SV-205539r851307_rule
- SV-82615
Checks: C-5805r299850_chk
If the Mainframe Product does not perform data management or storage function this is not applicable. Examine installation and configuration settings and / or specific meta-data for individual types of security attributes as defined by the organization. If there is no specific data labeling or tagging, this is a finding.
Fix: F-5805r299851_fix
Configure the Mainframe Product to associate organization-defined security attributes to managed data sets in process. Verify the datasets attributes are labeled and/or tagged appropriately.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-002142
- Version
- SRG-APP-000317-MFP-000034
- Vuln IDs
-
- V-205540
- V-68129
- Rule IDs
-
- SV-205540r851308_rule
- SV-82619
Checks: C-5806r299853_chk
If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine account management settings. If Shared/group credentials are not terminated when members leave the group, this is a finding.
Fix: F-5806r299854_fix
Configure the Mainframe Product account management settings to terminate shared/group account credentials when members leave the group.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-002130
- Version
- SRG-APP-000319-MFP-000047
- Vuln IDs
-
- V-205541
- V-68153
- Rule IDs
-
- SV-205541r851309_rule
- SV-82643
Checks: C-5807r299856_chk
If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine account management settings. If the Mainframe Product does not automatically audit account creation, this is a finding.
Fix: F-5807r299857_fix
Configure the Mainframe Product account management settings to automatically audit account enabling actions.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-002132
- Version
- SRG-APP-000320-MFP-000048
- Vuln IDs
-
- V-205542
- V-68157
- Rule IDs
-
- SV-205542r851310_rule
- SV-82647
Checks: C-5808r299859_chk
If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine account management settings. If the Mainframe Product does not notify system programmers and security administrators of account enabling actions, this is a finding.
Fix: F-5808r299860_fix
Configure the Mainframe Product account management settings to notify system programmers and security administrators of account enabling actions.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002165
- Version
- SRG-APP-000328-MFP-000061
- Vuln IDs
-
- V-205543
- V-68163
- Rule IDs
-
- SV-205543r851311_rule
- SV-82653
Checks: C-5809r299862_chk
Examine installation, configuration, and product documentation. If the Mainframe Product does not enforce organization-defined discretionary access control policies over defined subjects and objects, this is a finding.
Fix: F-5809r299863_fix
If necessary, configure the Mainframe Product installation and configuration settings to enforce organization-defined discretionary access control policies over defined subjects and objects.
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- SRG-APP-000340-MFP-000088
- Vuln IDs
-
- V-205544
- V-68169
- Rule IDs
-
- SV-205544r851312_rule
- SV-82659
Checks: C-5810r299865_chk
Examine installation and configuration settings. Determine the Mainframe Product privileged functions. If the Mainframe Product uses an external security manager (ESM) for access authorizations, verify the ESM prevents access to privileged functions to appropriate privileged users. If it does not, this is a finding. If the Mainframe Product does not use an ESM to verify installation and configuration settings to prevent access to privileged functions to appropriate privileged users, this is a finding.
Fix: F-5810r299866_fix
Configure the Mainframe Product to prevent non-privileged users from executing privileged functions. This can be accomplished using the ESM. Configure the ESM to restrict update and higher access to privileged functions to privileged users.
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002233
- Version
- SRG-APP-000342-MFP-000090
- Vuln IDs
-
- V-205545
- V-68171
- Rule IDs
-
- SV-205545r851313_rule
- SV-82661
Checks: C-5811r299868_chk
Examine installation and configuration settings. Determine that the Mainframe Product identifies functions requiring elevated privileges. If the Mainframe Product uses an external security manager ensure that execution uses authority of the initiating user rather than that of the Mainframe Product. If it does not, this is a finding. The Mainframe Product does not use an external security manager ensure installation and configuration settings use the authority of the initiating user rather than that of the Mainframe Product. If it does not, this is a finding.
Fix: F-5811r299869_fix
Using information from the Mainframe Product about privileged function, configure the external security manager to enforce submitting jobs on behalf of another user parameters.
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002234
- Version
- SRG-APP-000343-MFP-000091
- Vuln IDs
-
- V-205546
- V-68173
- Rule IDs
-
- SV-205546r851314_rule
- SV-82663
Checks: C-5812r299871_chk
Examine installation and configuration settings. Verify the Mainframe Product provides logging for execution of privileged functions through use of SMF, the SYSLOG, the external security management software log, or to some other reliable log file. If it does not, this is a finding.
Fix: F-5812r299872_fix
Configure the Mainframe Product to log the execution of privileged functions using the external security manager, SMF, and/or the SYSLOG.
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-002238
- Version
- SRG-APP-000345-MFP-000094
- Vuln IDs
-
- V-205547
- V-68177
- Rule IDs
-
- SV-205547r851315_rule
- SV-82667
Checks: C-5813r299874_chk
If the Mainframe Product has no function or capability for user logon, this is not applicable. If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine Mainframe Product configuration settings. Verify that the Mainframe Product account management setting automatically locks the account until the locked account is released by an administrator when three unsuccessful logon attempts in 15 minutes are exceeded. If it does not, this is a finding.
Fix: F-5813r299875_fix
Configure the Mainframe Product account management settings to automatically lock the account until the locked account is released by an administrator when three unsuccessful logon attempts in 15 minutes are exceeded.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-001844
- Version
- SRG-APP-000356-MFP-000147
- Vuln IDs
-
- V-205552
- V-68255
- Rule IDs
-
- SV-205552r851316_rule
- SV-82745
Checks: C-5818r299883_chk
If the Mainframe Product does not perform audit data management or storage function this is not applicable. Examine configuration settings. Determine if the Mainframe Product provides centralized management of the capture content for all components. If it does not, this is a finding.
Fix: F-5818r299884_fix
Configure the Mainframe Product to provide centralized management and configuration of the content to be captured in audit records generated by all application components.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001849
- Version
- SRG-APP-000357-MFP-000148
- Vuln IDs
-
- V-205553
- V-68257
- Rule IDs
-
- SV-205553r851317_rule
- SV-82747
Checks: C-5819r299886_chk
If the Mainframe Product uses MVS System Management Facility (SMF) recording or ESM log files for auditing purposes, this is not applicable. Examine the Mainframe Product installation and configuration auditing settings. If the installation and/or configuration setting for auditing do not allocate audit record storage capacity in accordance with organization-defined audit record storage requirements, this is a finding.
Fix: F-5819r299887_fix
Configure installation and/or configuration auditing settings to allocate audit record storage capacity in accordance with organization-defined audit record storage requirements.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- SRG-APP-000358-MFP-000149
- Vuln IDs
-
- V-205554
- V-68259
- Rule IDs
-
- SV-205554r851318_rule
- SV-82749
Checks: C-5820r299889_chk
If the Mainframe Product uses MVS System Management Facility (SMF) recording or external security manager (ESM) log files for auditing purposes, this is not applicable. Examine the Mainframe Product installation and configuration auditing settings. If the installation and/or configuration setting for auditing do not require the off-loading of audit records onto a different system or media than the system being audited, this is a finding.
Fix: F-5820r299890_fix
Configure the Mainframe Product installation and/or configurations settings to off-load audit records onto a different system or media than the system being audited.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-001855
- Version
- SRG-APP-000359-MFP-000151
- Vuln IDs
-
- V-205555
- V-68261
- Rule IDs
-
- SV-205555r851319_rule
- SV-82751
Checks: C-5821r299892_chk
If the Mainframe Product uses MVS System Management Facility (SMF) recording or external security manager (ESM) log files for auditing purposes, this is not applicable. Examine the Mainframe Product installation and configuration auditing settings. If the installation and/or configuration setting for auditing do not provide an immediate warning to the system programmer and security administrator (at a minimum) when allocated audit record storage volume reaches 75 percent of repository maximum audit record storage capacity, this is a finding.
Fix: F-5821r539587_fix
Configure the Mainframe Product installation and configuration settings for auditing to provide an immediate warning to the system programmer and security administrator (at a minimum) when allocated audit record storage volume reaches 75 percent of repository maximum audit record storage capacity.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-001858
- Version
- SRG-APP-000360-MFP-000152
- Vuln IDs
-
- V-205556
- V-68263
- Rule IDs
-
- SV-205556r851320_rule
- SV-82753
Checks: C-5822r299895_chk
If the Mainframe Product does not perform audit data management or storage function, this is not applicable. Examine configuration settings. If the Mainframe Product does not provide for immediate real-time alerts to operations staff, system programmers, and/or security administrators for audit failures requiring real-time alerts, this is a finding.
Fix: F-5822r299896_fix
Configure the Mainframe Product to provide for immediate real-time alerts to operations staff, system programmers, and/or security administrators for audit failures requiring real-time alerts.
- RMF Control
- AU-7
- Severity
- M
- CCI
- CCI-001875
- Version
- SRG-APP-000364-MFP-000160
- Vuln IDs
-
- V-205557
- V-68273
- Rule IDs
-
- SV-205557r851321_rule
- SV-82763
Checks: C-5823r299898_chk
If the Mainframe Product does not perform audit data management or storage functions, this is not applicable. Examine installation and configuration settings. Verify the Mainframe Product audit reduction capability supports on-demand review and analysis. If it does not, this is a finding.
Fix: F-5823r299899_fix
Configure the Mainframe Product audit reduction capability to support on-demand review and analysis.
- RMF Control
- AU-7
- Severity
- M
- CCI
- CCI-001877
- Version
- SRG-APP-000365-MFP-000162
- Vuln IDs
-
- V-205558
- V-68277
- Rule IDs
-
- SV-205558r851322_rule
- SV-82767
Checks: C-5824r299901_chk
If the Mainframe Product does not perform audit data management or storage function this is not applicable. Examine installation and configuration settings. Verify the Mainframe Product audit reduction capability supports after-the-fact investigations of security incidents. If it does not, this is a finding.
Fix: F-5824r299902_fix
Configure the Mainframe Product audit reduction capability to support after-the-fact investigations of security incidents.
- RMF Control
- AU-7
- Severity
- M
- CCI
- CCI-001878
- Version
- SRG-APP-000366-MFP-000163
- Vuln IDs
-
- V-205559
- V-68279
- Rule IDs
-
- SV-205559r851323_rule
- SV-82769
Checks: C-5825r299904_chk
If the Mainframe Product does not perform audit data management or storage function, this is not applicable. Examine installation and configuration settings. Verify the Mainframe Product audit report generations support on-demand review and analysis. If it does not, this is a finding.
Fix: F-5825r299905_fix
Configure the Mainframe Product audit report generations to support on-demand review and analysis.
- RMF Control
- AU-7
- Severity
- M
- CCI
- CCI-001879
- Version
- SRG-APP-000367-MFP-000164
- Vuln IDs
-
- V-205560
- V-68281
- Rule IDs
-
- SV-205560r851324_rule
- SV-82771
Checks: C-5826r299907_chk
If the Mainframe Product does not perform audit data management or storage function, this is not applicable. Examine installation and configuration settings. Verify the Mainframe Product report generation capability supports on-demand reporting. If it does not, this is a finding.
Fix: F-5826r299908_fix
Configure the Mainframe Product report generation capability to support on-demand reporting.
- RMF Control
- AU-7
- Severity
- M
- CCI
- CCI-001880
- Version
- SRG-APP-000368-MFP-000165
- Vuln IDs
-
- V-205561
- V-68283
- Rule IDs
-
- SV-205561r851325_rule
- SV-82773
Checks: C-5827r299910_chk
If the Mainframe Product does not perform audit data management or storage function, this is not applicable. Examine installation and configuration settings. Verify the Mainframe Product report generation capability supports after-the-fact investigations of security incidents. If it does not, this is a finding.
Fix: F-5827r299911_fix
Configure the Mainframe Product report generation capability to support after-the-fact investigations of security incidents.
- RMF Control
- AU-7
- Severity
- M
- CCI
- CCI-001881
- Version
- SRG-APP-000369-MFP-000166
- Vuln IDs
-
- V-205562
- V-68285
- Rule IDs
-
- SV-205562r851326_rule
- SV-82775
Checks: C-5828r299913_chk
If the Mainframe Product does not perform audit data management or storage function, this is not applicable. Examine installation and configuration settings. Verify the Mainframe Product audit reduction capability does not alter original content or time ordering of audit records. If it does, this is a finding.
Fix: F-5828r299914_fix
Configure the Mainframe Product audit reduction capability to not alter original content or time ordering of audit records.
- RMF Control
- AU-7
- Severity
- M
- CCI
- CCI-001882
- Version
- SRG-APP-000370-MFP-000167
- Vuln IDs
-
- V-205563
- V-68287
- Rule IDs
-
- SV-205563r851327_rule
- SV-82777
Checks: C-5829r299916_chk
If the Mainframe Product does not perform audit data management or storage function, this is not applicable. Examine installation and configuration settings. Verify the Mainframe Product report generation does not alter original content or time ordering of audit records. If it does, this is a finding.
Fix: F-5829r299917_fix
Configure the Mainframe Product report generation to not alter original content or time ordering of audit records.
- RMF Control
- CM-11
- Severity
- M
- CCI
- CCI-001812
- Version
- SRG-APP-000378-MFP-000185
- Vuln IDs
-
- V-205564
- V-68305
- Rule IDs
-
- SV-205564r851329_rule
- SV-82795
Checks: C-5830r299919_chk
Examine installation and configuration settings for change management. If the Mainframe Product does not identify installation privilege roles and prohibit user installation of software without explicit privileged status, this is a finding. If the Mainframe Product uses an external security manager (ESM) and there are no rules for the identified roles and access is not restricted to appropriate privileged users according to site security plan, this is a finding.
Fix: F-5830r851328_fix
Configure the Mainframe Product to prohibit user installation of software without explicit privileged status. If the Mainframe Product uses an ESM, configure the ESM to include rules for installation of software-privileged roles. Configure the roles to restrict access for software installation to the user with privilege status.
- RMF Control
- CM-3
- Severity
- M
- CCI
- CCI-001744
- Version
- SRG-APP-000379-MFP-000186
- Vuln IDs
-
- V-205565
- V-68307
- Rule IDs
-
- SV-205565r851330_rule
- SV-82797
Checks: C-5831r299922_chk
Examine Installation configuration settings. If the Mainframe Product does not implement organization-defined automated security responses if baseline configurations are changed in an unauthorized manner, this is a finding.
Fix: F-5831r299923_fix
Configure installation and/or configuration auditing settings to implement organization-defined automated security responses if baseline configurations are changed in an unauthorized manner.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001813
- Version
- SRG-APP-000380-MFP-000187
- Vuln IDs
-
- V-205566
- V-68309
- Rule IDs
-
- SV-205566r851332_rule
- SV-82799
Checks: C-5832r299925_chk
Examine Configuration settings. Examine organization change management policies. If the Mainframe Product does not enforce access restriction associated with changes to the application in accordance with change management policies, this is a finding. If the Mainframe Product uses an external security manager (ESM), examine rules for change management access. If there are no rules for this access or access is not restricted to users in accordance with change management policies, this is a finding.
Fix: F-5832r851331_fix
Configure Mainframe Product change management settings to enforce access restrictions associated with changes to application configuration to appropriate users according to organizational change policies. If the Mainframe Product uses an ESM, configure rules to restrict access associated with application configuration change to appropriate users according to organizational change policies.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001814
- Version
- SRG-APP-000381-MFP-000188
- Vuln IDs
-
- V-205567
- V-68311
- Rule IDs
-
- SV-205567r851333_rule
- SV-82801
Checks: C-5833r299928_chk
Examine Configuration settings. Examine organization change management policies. If the Mainframe Product does not audit the enforcement actions used to access restriction associated with changes to the application in accordance with change management policies using System Management Facility (SMF) or an external security manager audit, this is a finding.
Fix: F-5833r299929_fix
Configure Mainframe Product change management settings to audit the enforcement actions used to restrict access associated with changes to application configuration to appropriate users according to organizational change policies.
- RMF Control
- IA-11
- Severity
- M
- CCI
- CCI-002038
- Version
- SRG-APP-000389-MFP-000204
- Vuln IDs
-
- V-205568
- V-68327
- Rule IDs
-
- SV-205568r851334_rule
- SV-82817
Checks: C-5834r299931_chk
If the Mainframe Product has no function or capability for user logon, this is not applicable. If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine user account management configurations. If the Mainframe Product is configured to require user reauthentication when circumstances or situations require reauthentication as defined in site security plan, this is not a finding.
Fix: F-5834r299932_fix
Configure the Mainframe Product to require user reauthentication when circumstances or situations require reauthentication as defined in site security plan.
- RMF Control
- IA-11
- Severity
- M
- CCI
- CCI-002039
- Version
- SRG-APP-000390-MFP-000205
- Vuln IDs
-
- V-205569
- V-68329
- Rule IDs
-
- SV-205569r851335_rule
- SV-82819
Checks: C-5835r299934_chk
If the Mainframe Product has no function or capability for device logon, this is not applicable. If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine user account management configurations. If the Mainframe Product is configured to require devices to reauthenticate when circumstances or situations require reauthentication as defined in site security plan, this is not a finding.
Fix: F-5835r299935_fix
Configure the Mainframe Product to require devices to reauthenticate when circumstances or situations require reauthentication as defined in site security plan.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001953
- Version
- SRG-APP-000391-MFP-000208
- Vuln IDs
-
- V-205570
- V-68335
- Rule IDs
-
- SV-205570r851336_rule
- SV-82825
Checks: C-5836r299937_chk
If the Mainframe Product uses an external security manager for all account management, this is not applicable. Examine user account management configurations. If the Mainframe Product account management is not configured to accept PIV credentials, this is a finding.
Fix: F-5836r299938_fix
Configure the Mainframe Product account management settings to accept PIV credentials.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001954
- Version
- SRG-APP-000392-MFP-000209
- Vuln IDs
-
- V-205571
- V-68337
- Rule IDs
-
- SV-205571r851337_rule
- SV-82827
Checks: C-5837r299940_chk
If the Mainframe Product uses an external security manager (ESM) for all account management, this is not applicable. Examine user account management configurations. If the Mainframe Product account management settings are not configured to electronically verify PIV credentials, this is a finding.
Fix: F-5837r299941_fix
Configure the Mainframe Product account management settings to electronically verify PIV credentials.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-002041
- Version
- SRG-APP-000397-MFP-000238
- Vuln IDs
-
- V-205572
- V-68395
- Rule IDs
-
- SV-205572r851338_rule
- SV-82885
Checks: C-5838r299943_chk
If the mainframe product uses an external security manager for all account management functions, this is not applicable. Examine Mainframe Product account management settings. If the Mainframe Product account management settings do not allow for the use of a temporary password for system logons with an immediate change to a permanent password, this is a finding.
Fix: F-5838r299944_fix
Configure the Mainframe Product account management settings to allow the use of a temporary password for system logons with an immediate change to a permanent password.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-002007
- Version
- SRG-APP-000400-MFP-000241
- Vuln IDs
-
- V-205573
- V-68397
- Rule IDs
-
- SV-205573r851339_rule
- SV-82887
Checks: C-5839r299946_chk
If the Mainframe Product has no function or capability for user logon, this is not applicable. If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine user account management configurations. If the Mainframe Product is configured to prohibit the use of cached authenticators after one hour, this is not a finding.
Fix: F-5839r299947_fix
Configure the Mainframe Product account management settings to prohibit the use of cached authenticators after one hour.
- RMF Control
- IA-8
- Severity
- M
- CCI
- CCI-002009
- Version
- SRG-APP-000402-MFP-000249
- Vuln IDs
-
- V-205574
- V-68411
- Rule IDs
-
- SV-205574r851340_rule
- SV-82901
Checks: C-5840r299949_chk
If the Mainframe Product has no function or capability for user logon, this is not applicable. If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine user account configurations. If the Mainframe Product is not configured to accept PIV credentials from other federal agencies, this is a finding.
Fix: F-5840r299950_fix
Configure the Mainframe Product account management settings to accept PIV credentials from other federal agencies.
- RMF Control
- IA-8
- Severity
- M
- CCI
- CCI-002010
- Version
- SRG-APP-000403-MFP-000250
- Vuln IDs
-
- V-205575
- V-68413
- Rule IDs
-
- SV-205575r851341_rule
- SV-82903
Checks: C-5841r299952_chk
If the Mainframe Product has no function or capability for user logon, this is not applicable. If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine user account configurations. If the Mainframe Product is not configured to electronically verify PIV credentials from other federal agencies, this is a finding.
Fix: F-5841r299953_fix
Configure the Mainframe Product account management settings to electronically verify PIV credentials from other federal agencies.
- RMF Control
- IA-8
- Severity
- M
- CCI
- CCI-002011
- Version
- SRG-APP-000404-MFP-000251
- Vuln IDs
-
- V-205576
- V-68415
- Rule IDs
-
- SV-205576r851342_rule
- SV-82905
Checks: C-5842r299955_chk
If the Mainframe Product has no function or capability for user logon, this is not applicable. If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine user account configurations. If the Mainframe Product is not configured to accept FICAM-approved third-party credentials, this is a finding.
Fix: F-5842r299956_fix
Configure the Mainframe Product account management settings to accept FICAM-approved third-party credentials.
- RMF Control
- IA-8
- Severity
- M
- CCI
- CCI-002014
- Version
- SRG-APP-000405-MFP-000252
- Vuln IDs
-
- V-205577
- V-68417
- Rule IDs
-
- SV-205577r851343_rule
- SV-82907
Checks: C-5843r299958_chk
If the Mainframe Product has no function or capability for user logon, this is not applicable. If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine user account configurations. If the Mainframe Product is not configured to conform to FICAM-issued profiles, this is a finding.
Fix: F-5843r299959_fix
Configure the Mainframe Product account management settings to conform to FICAM-issued profiles.
- RMF Control
- MA-4
- Severity
- M
- CCI
- CCI-002884
- Version
- SRG-APP-000409-MFP-000257
- Vuln IDs
-
- V-205578
- V-68421
- Rule IDs
-
- SV-205578r851344_rule
- SV-82911
Checks: C-5844r299961_chk
If the Mainframe Product has no function or capability for nonlocal maintenance this is not applicable. Examine installation and configuration settings. If the Mainframe Product does not audit the nonlocal maintenance and diagnostic sessions audit events defined in site security plan using external security manager files and/or SMF records, this is a finding.
Fix: F-5844r299962_fix
Configure the Mainframe Product to audit the nonlocal maintenance and diagnostic sessions audit events defined in site security plan using external security manager files and/or SMF records.
- RMF Control
- MA-4
- Severity
- M
- CCI
- CCI-002890
- Version
- SRG-APP-000411-MFP-000260
- Vuln IDs
-
- V-205579
- V-68423
- Rule IDs
-
- SV-205579r851345_rule
- SV-82913
Checks: C-5845r299964_chk
If the Mainframe Product has no function or capability for nonlocal maintenance, this is not applicable. Examine installation and configuration settings. If the Mainframe Product does not use FIPS 140 compliant modules to protect the integrity of nonlocal maintenance and diagnostic communications, this is a finding.
Fix: F-5845r299965_fix
Configure the Mainframe Product to use FIPS 140 compliant modules to protect the integrity of nonlocal maintenance and diagnostic communications.
- RMF Control
- MA-4
- Severity
- M
- CCI
- CCI-003123
- Version
- SRG-APP-000412-MFP-000261
- Vuln IDs
-
- V-205580
- V-68425
- Rule IDs
-
- SV-205580r851346_rule
- SV-82915
Checks: C-5846r299967_chk
If the Mainframe Product has no function or capability for nonlocal maintenance, this is not applicable. Examine installation and configuration settings. If the Mainframe Product does not use FIPS 140 compliant modules to protect the confidentiality of nonlocal maintenance and diagnostic communications, this is a finding.
Fix: F-5846r299968_fix
Configure the Mainframe Product to use FIPS 140 compliant modules to protect the confidentiality of nonlocal maintenance and diagnostic communications.
- RMF Control
- MA-4
- Severity
- M
- CCI
- CCI-002891
- Version
- SRG-APP-000413-MFP-000262
- Vuln IDs
-
- V-205581
- V-68427
- Rule IDs
-
- SV-205581r851347_rule
- SV-82917
Checks: C-5847r299970_chk
If the Mainframe Product has no function or capability for nonlocal maintenance, this is not applicable. Examine installation and configuration settings. If the Mainframe Product does not verify remote disconnection at the termination of nonlocal maintenance and diagnostic sessions, this is a finding.
Fix: F-5847r299971_fix
Configure the Mainframe Product to verify remote disconnection at the termination of nonlocal maintenance and diagnostic sessions.
- RMF Control
- RA-5
- Severity
- M
- CCI
- CCI-001067
- Version
- SRG-APP-000414-MFP-000265
- Vuln IDs
-
- V-205582
- V-68431
- Rule IDs
-
- SV-205582r400165_rule
- SV-82921
Checks: C-5848r299973_chk
If the Mainframe Product has no function or capability to perform vulnerability scanning function this is not applicable. Examine installation and configuration settings. If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. If the Mainframe Product does not restrict privilege access to all information system infrastructure components to appropriate personnel, this is a finding.
Fix: F-5848r299974_fix
Configure the Mainframe Product account management settings to restrict privilege access to all information system infrastructure components to appropriate personnel.
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-002475
- Version
- SRG-APP-000428-MFP-000303
- Vuln IDs
-
- V-205584
- V-68465
- Rule IDs
-
- SV-205584r851348_rule
- SV-82955
Checks: C-5850r299979_chk
Examine installation and configuration settings. Review requirements for relevant organizational or site-defined information. If the Mainframe Product does not have cryptographic mechanisms implemented to prevent unauthorized modification of all information not cleared for public release at rest on system components outside of organization facilities, this is a finding.
Fix: F-5850r299980_fix
Configure the Mainframe Product to implement cryptographic mechanisms to prevent unauthorized modification of all information not cleared for public release at rest on system components outside of organization facilities.
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-002476
- Version
- SRG-APP-000429-MFP-000304
- Vuln IDs
-
- V-205585
- V-68467
- Rule IDs
-
- SV-205585r851349_rule
- SV-82957
Checks: C-5851r299982_chk
Examine installation and configuration settings. Review requirements for relevant organization or site-defined information. If the Mainframe Product does not have cryptographic mechanisms implemented to prevent unauthorized disclosure of all information not cleared for public release at rest on system components outside of organization facilities, this is a finding.
Fix: F-5851r299983_fix
Configure the Mainframe Product to implement cryptographic mechanisms to prevent unauthorized disclosure of all information not cleared for public release at rest on system components outside of organization facilities.
- RMF Control
- SC-39
- Severity
- M
- CCI
- CCI-002530
- Version
- SRG-APP-000431-MFP-000312
- Vuln IDs
-
- V-205586
- V-68471
- Rule IDs
-
- SV-205586r851350_rule
- SV-82961
Checks: C-5852r299985_chk
If the Mainframe Product has no function or capability for multi-session operation, this is not applicable. If the Mainframe Product is not configured to uniquely define and engineer each session to execute independently of any other session, this is a finding.
Fix: F-5852r299986_fix
Configure the Mainframe Product to uniquely define and engineer each session to execute independently of any other session.
- RMF Control
- SI-10
- Severity
- M
- CCI
- CCI-002754
- Version
- SRG-APP-000447-MFP-000332
- Vuln IDs
-
- V-205587
- V-68475
- Rule IDs
-
- SV-205587r851351_rule
- SV-82965
Checks: C-5853r299988_chk
If the Mainframe Product has no function or capability for user/data input, this is not applicable. Examine installation and configuration settings. If the Mainframe Product is not configured to behave in a predictable and documented manner that reflects organizational and system objectives when invalid inputs are received, this is a finding.
Fix: F-5853r299989_fix
Configure the Mainframe Product to behave in a predictable and documented manner that reflects organizational and system objectives when invalid inputs are received.
- RMF Control
- SI-16
- Severity
- M
- CCI
- CCI-002824
- Version
- SRG-APP-000450-MFP-000338
- Vuln IDs
-
- V-205588
- V-68481
- Rule IDs
-
- SV-205588r851353_rule
- SV-82971
Checks: C-5854r299991_chk
Examine installation and configuration settings. Determine if critical core programs to the operating system are identified. If the Mainframe Product does not protect critical core programs, this is a finding. If an external security manager (ESM) is in use verify that the ESM is configured and/or has rules to protect critical core programs. If it does not, this is a finding.
Fix: F-5854r851352_fix
Configure the Mainframe Product to identify critical core programs to the operating system for protection in accordance with applicable access control policies. This can be accomplished by an external security manager (ESM). Configure the ESM to restrict access to these critical core programs to appropriate users in accordance with applicable access control policies.
- RMF Control
- SI-2
- Severity
- M
- CCI
- CCI-002617
- Version
- SRG-APP-000454-MFP-000343
- Vuln IDs
-
- V-205589
- V-68483
- Rule IDs
-
- SV-205589r851354_rule
- SV-82973
Checks: C-5855r299994_chk
Examine inventory of installed software components for the Mainframe Product. If the Mainframe Product does not remove all upgraded/replaced software components that are no longer required for operation, this is a finding.
Fix: F-5855r299995_fix
Configure the Mainframe Product to remove all upgraded/replaced software components that are no longer required for operation.
- RMF Control
- SI-2
- Severity
- M
- CCI
- CCI-002605
- Version
- SRG-APP-000456-MFP-000345
- Vuln IDs
-
- V-205590
- V-68485
- Rule IDs
-
- SV-205590r851355_rule
- SV-82975
Checks: C-5856r299997_chk
Review Mainframe Product published Version release information. Review authoritative sources. If security relevant updates are not installed as required, this is a finding.
Fix: F-5856r299998_fix
Install security relevant updates as required.
- RMF Control
- SI-6
- Severity
- M
- CCI
- CCI-002696
- Version
- SRG-APP-000472-MFP-000370
- Vuln IDs
-
- V-205591
- V-68493
- Rule IDs
-
- SV-205591r851356_rule
- SV-82983
Checks: C-5857r300000_chk
Examine the installation, configuration, and product documentation. If the Mainframe Product verification of the correct operation of security functions, which may include the valid connection to an external security manager (ESM), is not performed, this is a finding.
Fix: F-5857r300001_fix
If necessary, configure the Mainframe Product configuration and installation settings to perform verification of the correct operation of security functions.
- RMF Control
- SI-6
- Severity
- M
- CCI
- CCI-002699
- Version
- SRG-APP-000473-MFP-000371
- Vuln IDs
-
- V-205592
- V-68495
- Rule IDs
-
- SV-205592r851357_rule
- SV-82985
Checks: C-5858r300003_chk
Examine the installation, configuration, and product documentation. If the Mainframe Product verification of the correct operation of security functions, which may include the valid connection to an external security manager (ESM), is not performed upon product startup/restart, or by a user with privileged access, and/or every 30 days, this is a finding.
Fix: F-5858r539613_fix
If necessary, configure the Mainframe Product configuration and installation settings to perform verification of the correct operation of security functions, which may include the valid connection to an ESM, upon product startup/restart, or by a user with privileged access, and/or every 30 days.
- RMF Control
- SI-6
- Severity
- M
- CCI
- CCI-002702
- Version
- SRG-APP-000474-MFP-000373
- Vuln IDs
-
- V-205593
- V-68499
- Rule IDs
-
- SV-205593r851358_rule
- SV-82989
Checks: C-5859r300006_chk
Examine installation and configuration setting If the Mainframe Product is not configured to shut down; and/or restart and notify system programmer and operation staff when anomalies in the operation of security functions as defined by site security plan are discovered, this is a finding.
Fix: F-5859r300007_fix
Configure the Mainframe Product to shut down; and/or restart and notify system programmer and operation staff when anomalies in the operation of the security functions as defined in site security plan are discovered.
- RMF Control
- SI-7
- Severity
- M
- CCI
- CCI-002710
- Version
- SRG-APP-000475-MFP-000374
- Vuln IDs
-
- V-205594
- V-68501
- Rule IDs
-
- SV-205594r864583_rule
- SV-82991
Checks: C-5860r300009_chk
If the Mainframe Product has no function or capability for integrity verification, this is not applicable. Examine installation and configuration settings. If the Mainframe Product is not configured to perform an integrity check of all software from vendors/sources that provide cryptographic mechanisms to enable the validation of code authenticity and integrity at startup, at transitional states as defined in site security plan or security-relevant events, or annually, this is a finding.
Fix: F-5860r539615_fix
Configure the Mainframe Product to perform an integrity check of all software from vendors/sources that provide cryptographic mechanisms to enable the validation of code authenticity and integrity at startup, at transitional states as defined in site security plan or security-relevant events, or annually.
- RMF Control
- SI-7
- Severity
- M
- CCI
- CCI-002712
- Version
- SRG-APP-000477-MFP-000376
- Vuln IDs
-
- V-205595
- V-68503
- Rule IDs
-
- SV-205595r851360_rule
- SV-82993
Checks: C-5861r300012_chk
If the Mainframe Product has no function or capability for integrity verification, this is not applicable. Examine installation and configuration settings. If the Mainframe Product is not configured to perform an integrity check of information as defined in site security plan at startup, at transitional states as defined in site security plan or security-relevant events, or annually, this is a finding.
Fix: F-5861r300013_fix
Configure the Mainframe Product to perform integrity check of inform as defined in site security plan at startup, at transitional states as defined in site security plan or security-relevant events, or annually.
- RMF Control
- SI-7
- Severity
- M
- CCI
- CCI-002715
- Version
- SRG-APP-000480-MFP-000379
- Vuln IDs
-
- V-205596
- V-68505
- Rule IDs
-
- SV-205596r851361_rule
- SV-82995
Checks: C-5862r300015_chk
If the Mainframe Product has no function or capability for integrity verification, this is not applicable. Examine installation and configuration settings. If the Mainframe Product is not configured to automatically shut down the information system, restart the information system, and/or implement security safeguards as conditions as defined in site security plan when integrity violations are discovered, this is a finding.
Fix: F-5862r300016_fix
Configure the Mainframe Product to automatically shut down the information system, restart the information system, and/or implement security safeguards as conditions as defined in site security plan when integrity violations are discovered.
- RMF Control
- SI-7
- Severity
- M
- CCI
- CCI-002723
- Version
- SRG-APP-000484-MFP-000383
- Vuln IDs
-
- V-205597
- V-68507
- Rule IDs
-
- SV-205597r851362_rule
- SV-82997
Checks: C-5863r300018_chk
If the Mainframe Product has no function or capability for integrity verification, this is not applicable. Examine installation and configuration settings. If the Mainframe Product is not configured to audit detected potential integrity violations, this is a finding.
Fix: F-5863r300019_fix
Configure the Mainframe Product to audit detected potential integrity violations.
- RMF Control
- SI-7
- Severity
- M
- CCI
- CCI-002724
- Version
- SRG-APP-000485-MFP-000384
- Vuln IDs
-
- V-205598
- V-68509
- Rule IDs
-
- SV-205598r859702_rule
- SV-82999
Checks: C-5864r300021_chk
If the Mainframe Product has no function or capability for integrity verification, this is not applicable. Examine installation and configuration settings. If the Mainframe Product is not configured to generate an audit record, alert the current user, alert personnel or roles as defined in site security plan, and/or perform other actions as defined in site security plan, this is a finding.
Fix: F-5864r300022_fix
Configure the Mainframe Product to alert the current user, alert personnel or roles as defined in site security plan, and/or perform other actions as defined in site security plan.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-002460
- Version
- SRG-APP-000488-MFP-000282
- Vuln IDs
-
- V-205599
- V-68455
- Rule IDs
-
- SV-205599r851364_rule
- SV-82945
Checks: C-5865r300024_chk
If the Mainframe Product has no function or capability for mobile code use, this is not applicable. Examine installation and configuration settings. If the Mainframe Product is not configured to prompt user for action before executing mobile code, this is a finding.
Fix: F-5865r300025_fix
Configure the Mainframe Product to prompt the user for action before executing mobile code.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000492-MFP-000117
- Vuln IDs
-
- V-205600
- V-68193
- Rule IDs
-
- SV-205600r400753_rule
- SV-82683
Checks: C-5866r300027_chk
Examine installation and configuration settings. Verify that the Mainframe Product identifies all security objects, writes to SMF, and/or uses an external security manager (ESM) to generate audit records when successful/unsuccessful attempts to access security objects. If it does not, this is a finding.
Fix: F-5866r300028_fix
Configure the Mainframe Product to write to SMF and/or provide audit SAF to call when successful/unsuccessful attempts to access security objects.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000493-MFP-000118
- Vuln IDs
-
- V-205601
- V-68195
- Rule IDs
-
- SV-205601r400756_rule
- SV-82685
Checks: C-5867r300030_chk
Examine installation and configuration settings. Verify that the Mainframe Product identifies all security levels and writes to SMF and/or uses an external security manager to generate audit records when successful/unsuccessful attempts to access security levels. If it does not, this is a finding.
Fix: F-5867r300031_fix
Configure the Mainframe Product to write to SMF and/or provide audit SAF to call when successful/unsuccessful attempts to access security levels.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000494-MFP-000119
- Vuln IDs
-
- V-205602
- V-68197
- Rule IDs
-
- SV-205602r400759_rule
- SV-82687
Checks: C-5868r300033_chk
Examine installation and configuration settings. Verify that the Mainframe Product identifies all security categories of information; writes to SMF and/or uses an external security manager to generate audit records when successful/unsuccessful attempts to access categories of information. If it does not, this is a finding.
Fix: F-5868r300034_fix
Configure the Mainframe Product to write to SMF and/or provide audit SAF to call when successful/unsuccessful attempts to access categories of information occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000495-MFP-000120
- Vuln IDs
-
- V-205603
- V-68199
- Rule IDs
-
- SV-205603r400762_rule
- SV-82689
Checks: C-5869r300036_chk
Examine installation and configuration settings. Verify that the Mainframe Product identifies all security privileges, writes to SMF, and/or uses an external security manager (ESM) to generate audit records successful/unsuccessful attempts to modify privileges occur. If it does not, this is a finding.
Fix: F-5869r300037_fix
Configure the Mainframe Product to write to SMF and/or provide audit SAF to call when successful/unsuccessful attempts to modify privileges occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000496-MFP-000121
- Vuln IDs
-
- V-205604
- V-68201
- Rule IDs
-
- SV-205604r400765_rule
- SV-82691
Checks: C-5870r300039_chk
Examine installation and configuration settings. Verify that the Mainframe Product identifies all security object; writes to SMF and/or uses an external security manager to generate audit records when successful/unsuccessful attempts to modify security objects. If it does not, this is a finding.
Fix: F-5870r300040_fix
Configure the Mainframe Product to write to SMF and/or provide audit SAF to call when successful/unsuccessful attempts to modify security objects occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000497-MFP-000122
- Vuln IDs
-
- V-205605
- V-68205
- Rule IDs
-
- SV-205605r400825_rule
- SV-82695
Checks: C-5871r300042_chk
Examine installation and configuration settings. Verify that the Mainframe Product identifies all security levels writes to SMF and/or uses an external security manager to generate audit records when successful/unsuccessful attempts to modify security levels. If it does not, this is a finding.
Fix: F-5871r300043_fix
Configure the Mainframe Product to write to SMF and/or provide audit SAF to call when successful/unsuccessful attempts to modify security levels occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000498-MFP-000123
- Vuln IDs
-
- V-205606
- V-68207
- Rule IDs
-
- SV-205606r400828_rule
- SV-82697
Checks: C-5872r300045_chk
Examine installation and configuration settings. Verify that the Mainframe Product identifies all security categories of information; writes to SMF and/or uses an external security manager to generate audit records when successful/unsuccessful attempts to modify categories of information. If it does not, this is a finding.
Fix: F-5872r300046_fix
Configure the Mainframe Product to write to SMF and/or provide audit SAF to call when successful/unsuccessful attempts to modify categories of information (e.g., classification levels) occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000499-MFP-000124
- Vuln IDs
-
- V-205607
- V-68209
- Rule IDs
-
- SV-205607r400831_rule
- SV-82699
Checks: C-5873r300048_chk
Examine installation and configuration settings. Verify that the Mainframe Product identifies privileged functions, writes to SMF, and/or uses an external security manager (ESM) to generate audit records when successful/unsuccessful attempts to delete privileges occur. If it does not, this is a finding.
Fix: F-5873r300049_fix
Configure the Mainframe Product to write to SMF and/or provide audit SAF to call when successful/unsuccessful attempts to delete privileges occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000500-MFP-000125
- Vuln IDs
-
- V-205608
- V-68211
- Rule IDs
-
- SV-205608r400834_rule
- SV-82701
Checks: C-5874r300051_chk
Examine installation and configuration settings. Verify that the Mainframe Product identifies all security levels writes to SMF and/or uses an external security manager to generate audit records when successful/unsuccessful attempts to delete security levels. If it does not, this is a finding.
Fix: F-5874r300052_fix
Configure the Mainframe Product to write to SMF and/or provide audit SAF to call when successful/unsuccessful attempts to delete security levels occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000501-MFP-000126
- Vuln IDs
-
- V-205609
- V-68213
- Rule IDs
-
- SV-205609r400837_rule
- SV-82703
Checks: C-5875r300054_chk
Examine installation and configuration settings. Verify that the Mainframe Product identifies all security object writes to SMF and/or uses an external security manager to generate audit records when successful/unsuccessful attempts to delete security objects. If it does not, this is a finding.
Fix: F-5875r300055_fix
Configure the Mainframe Product to write to SMF and/or provide audit SAF to call when successful/unsuccessful attempts to delete security objects occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000502-MFP-000127
- Vuln IDs
-
- V-205610
- V-68215
- Rule IDs
-
- SV-205610r400840_rule
- SV-82705
Checks: C-5876r300057_chk
Examine installation and configuration settings. Verify that the Mainframe Product identifies all security categories of information; writes to SMF and/or uses an external security manager to generate audit records when successful/unsuccessful attempts to delete categories of information. If it does not, this is a finding.
Fix: F-5876r300058_fix
Configure the Mainframe Product to write to SMF and/or provide audit SAF to call when successful/unsuccessful attempts to delete categories of information occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000503-MFP-000128
- Vuln IDs
-
- V-205611
- V-68217
- Rule IDs
-
- SV-205611r400843_rule
- SV-82707
Checks: C-5877r300060_chk
If the Mainframe Product does not have the function or capability for user logon, this is not applicable. Examine configuration settings. Determine if successful/unsuccessful logon attempts are audited. If they are not, this is a finding.
Fix: F-5877r300061_fix
Configure the Mainframe Product to provide audit SAF to call when successful/unsuccessful logon attempts occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000504-MFP-000129
- Vuln IDs
-
- V-205612
- V-68219
- Rule IDs
-
- SV-205612r400846_rule
- SV-82709
Checks: C-5878r300063_chk
Examine installation and configuration settings. Verify that the Mainframe Product identifies privileged functions, writes to SMF, and/or provides an SAF call to an external security manager (ESM) to generate audit records for all privilege activities or other system-level access. If it does not, this is a finding.
Fix: F-5878r300064_fix
Configure the Mainframe Product to write to SMF and/or provide audit SAF to call for privileged activities or other system-level access.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000505-MFP-000130
- Vuln IDs
-
- V-205613
- V-68221
- Rule IDs
-
- SV-205613r400849_rule
- SV-82711
Checks: C-5879r300066_chk
If the Mainframe Product has no function or capability for user access this is not applicable. Examine configuration settings. If the Mainframe Product does not identify and audit start and end times of access to the systems, this is a finding.
Fix: F-5879r300067_fix
Configure the Mainframe Product to provide audit SAF call for starting and ending time for user access to the system.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000506-MFP-000131
- Vuln IDs
-
- V-205614
- V-68223
- Rule IDs
-
- SV-205614r400852_rule
- SV-82713
Checks: C-5880r300069_chk
If the Mainframe Product has no function or capability for user logon, this is not applicable. Examine configuration settings. If the Mainframe Product does not generate audit records when concurrent logons from different workstations occur, this is a finding.
Fix: F-5880r300070_fix
Configure the Mainframe Product to provide audit SAF call when concurrent logons from different workstations occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000507-MFP-000132
- Vuln IDs
-
- V-205615
- V-68225
- Rule IDs
-
- SV-205615r400855_rule
- SV-82715
Checks: C-5881r300072_chk
Examine installation and configuration settings. Verify that the Mainframe Product identifies access to all objects; writes to SMF and/or and uses an external security manager to generate audit records for all access. If it does not, this is a finding
Fix: F-5881r300073_fix
Configure the Mainframe Product to write to SMF and/or provide audit SAF call when successful/unsuccessful accesses to objects occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000508-MFP-000133
- Vuln IDs
-
- V-205616
- V-68227
- Rule IDs
-
- SV-205616r400858_rule
- SV-82717
Checks: C-5882r300075_chk
Examine installation and configuration settings. Verify that the Mainframe Product identifies direct access to the Mainframe Product, writes to SMF, and/or uses an external security manager (ESM) to generate audit records for all direct access. If it does not, this is a finding.
Fix: F-5882r300076_fix
Configure the Mainframe Product to write to SMF and/or provide audit SAF call for all direct access to the information system.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000509-MFP-000134
- Vuln IDs
-
- V-205617
- V-68229
- Rule IDs
-
- SV-205617r400861_rule
- SV-82719
Checks: C-5883r300078_chk
If the Mainframe Product has no function or capability for account creations, this is not applicable. Examine installation and configuration settings. Verify that the Mainframe Product identifies account functions, writes to SMF, and/or uses an external security manager (ESM) to generate audit records for all account creations, modifications, disabling, and termination events. If it does not, this is a finding.
Fix: F-5883r300079_fix
Configure the Mainframe Product to write to SMF and/or provide audit SAF call for all account creations, modifications, disabling, and termination events.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000510-MFP-000135
- Vuln IDs
-
- V-205618
- V-68231
- Rule IDs
-
- SV-205618r400864_rule
- SV-82721
Checks: C-5884r300081_chk
Examine installation and configuration settings. Verify that the Mainframe Product identifies all Kernel module activities, writes to SMF, and/or uses an external security manager (ESM) to generate audit records for all kernel mode load, unload, and restart events, and for all program initiations. If it does not, this is a finding.
Fix: F-5884r300082_fix
Configure the Mainframe Product to write to SMF and/or provide audit SAF call for all kernel module load, unload, and restart events, and for all program initiations.
- RMF Control
- SC-13
- Severity
- M
- CCI
- CCI-002450
- Version
- SRG-APP-000514-MFP-000270
- Vuln IDs
-
- V-205619
- V-68435
- Rule IDs
-
- SV-205619r851365_rule
- SV-82925
Checks: C-5885r300084_chk
Examine installation and configuration settings. If the Mainframe Product does not implement FIPS 140 cryptography to provision digital signatures in accordance with applicable federal laws, Executive orders, directives, policies, regulations, and standards, this is a finding.
Fix: F-5885r300085_fix
Configure the Mainframe Product settings to implement FIPS 140 cryptography to provision digital signatures in accordance with applicable federal laws, Executive orders, directives, policies, regulations, and standards.
- RMF Control
- SC-13
- Severity
- M
- CCI
- CCI-002450
- Version
- SRG-APP-000514-MFP-000272
- Vuln IDs
-
- V-205620
- V-68437
- Rule IDs
-
- SV-205620r851366_rule
- SV-82927
Checks: C-5886r300087_chk
Examine installation and configuration settings. If the Mainframe Product does not implement FIPS 140 cryptography to generate and validate cryptographic hashes in accordance with applicable federal laws, Executive orders, directives, policies, regulations, and standards, this is a finding.
Fix: F-5886r300088_fix
Configure the Mainframe Product settings to implement FIPS 140 cryptography to generate and validate cryptographic hashes in accordance with applicable federal laws, Executive orders, directives, policies, regulations, and standards.
- RMF Control
- SC-13
- Severity
- M
- CCI
- CCI-002450
- Version
- SRG-APP-000514-MFP-000274
- Vuln IDs
-
- V-205621
- V-68439
- Rule IDs
-
- SV-205621r864584_rule
- SV-82929
Checks: C-5887r300090_chk
Examine installation and configuration settings. If the Mainframe Product does not implement FIPS 140 cryptography to protect unclassified information requiring confidentiality and cryptographic protection in accordance with applicable federal laws, Executive orders, directives, policies, regulations, and standards, this is a finding.
Fix: F-5887r539607_fix
Configure the Mainframe Product settings to implement FIPS 140 cryptography to protect unclassified information requiring confidentiality and cryptographic protection in accordance with applicable federal laws, Executive orders, directives, policies, regulations, and standards.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-MFP-000195
- Vuln IDs
-
- V-205622
- V-68321
- Rule IDs
-
- SV-205622r401224_rule
- SV-82811
Checks: C-5888r300093_chk
Refer to site security configuration policies. Refer to Mainframe Product security documentation. Examine configuration settings. If configuration settings do not adhere to site policies, this is a finding.
Fix: F-5888r300094_fix
Configure the Mainframe Product to adhere to site policies.
- RMF Control
- AU-14
- Severity
- M
- CCI
- CCI-001919
- Version
- SRG-APP-000354-MFP-000136
- Vuln IDs
-
- V-219060
- V-68233
- Rule IDs
-
- SV-219060r865836_rule
- SV-82723
Checks: C-5816r69548_chk
If the Mainframe Product has no function or capability for session operations, this is not applicable. Examine installation and configuration settings. Verify that the Mainframe Product has the capability to select user sessions for monitoring and allows system programmers and security administrators to select sessions to capture/record or view/hear in accordance with applicable access control policies. If it does not, this is a finding. If there is an external security manager (ESM) in use, verify that the ESM restricts the ability to select sessions to capture/record or view/hear in accordance with applicable access control policies to system programmers or security administrators. If it does not, this is a finding.
Fix: F-20869r859694_fix
Configure the Mainframe Product to permit authorized users to select a user session to capture/record or view/hear. If there is an ESM in use, configure ESM to restrict the ability to select sessions to capture/record or view/hear in accordance with applicable access control policies to system programmers or security administrators.
- RMF Control
- AU-14
- Severity
- M
- CCI
- CCI-001920
- Version
- SRG-APP-000355-MFP-000139
- Vuln IDs
-
- V-219061
- V-68239
- Rule IDs
-
- SV-219061r865207_rule
- SV-82729
Checks: C-20871r300099_chk
If the Mainframe Product has no function or capability for session operations, this is not applicable. Examine installation and configuration settings. If the Mainframe Product does not have the capability to remotely view/hear, in real time, all content related to an established user session from a component separate from the Mainframe Product being monitored, this a finding. If the Mainframe Product does not restrict this capability to system programmers and security administrators, this is a finding. If an external security manager (ESM) is in use, verify that the ESM restricts the capability to remotely view/hear, in real time, all content related to an established user session from a component separate from the Mainframe Product being monitored to system programmers or security administrators. If it does not, this is a finding.
Fix: F-20870r859697_fix
Configure the Mainframe Product to permit authorized users to remotely view/hear, in real time, all content related to an established user session from a component separate from the Mainframe Product being monitored. If an ESM is in use, configure rules to restrict the ability to remotely view/hear, in real time, all content related to an established user session from a component separate from the Mainframe Product being monitored to system programmers and security administrators.
- RMF Control
- SC-13
- Severity
- M
- CCI
- CCI-002450
- Version
- SRG-APP-000416-MFP-000269
- Vuln IDs
-
- V-253508
- V-68433
- Rule IDs
-
- SV-253508r859701_rule
- SV-82923
Checks: C-22045r393530_chk
If the Mainframe Product is deployed in an unclassified environment, this is not applicable. Examine installation and configuration settings. If the Mainframe Product does not implement NSA-approved cryptography to protect classified information using an external security manager (ESM), this is a finding.
Fix: F-56911r859698_fix
Configure the Mainframe Product to implement NSA-approved cryptography to protect classified information using an external security manager.