Mainframe Product Security Requirements Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates +19 −6 ✎ 11
Comparison against the immediately-prior release (V2R1). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Added rules 19
- V-263669 Medium The Mainframe Product must disable accounts when the accounts have expired.
- V-263670 Medium The Mainframe Product must disable accounts when the accounts are no longer associated to a user.
- V-263671 Medium The Mainframe Product must implement the capability to centrally review and analyze audit records from multiple components within the system.
- V-263672 Medium The Mainframe Product must alert organization-defined personnel or roles upon detection of unauthorized access, modification, or deletion of audit information.
- V-263673 Medium The Mainframe Product must implement multifactor authentication for local; network; and/or remote access to privileged accounts; and/or nonprivileged accounts such that one of the factors is provided by a device separate from the system gaining access.
- V-263674 Medium The Mainframe Product must implement multifactor authentication for local; network; and/or remote access to privileged accounts; and/or nonprivileged accounts such that the device meets organization-defined strength of mechanism requirements.
- V-263675 Medium The Mainframe Product must, for password-based authentication, maintain a list of commonly used, expected, or compromised passwords on an organization-defined frequency.
- V-263676 Medium The Mainframe Product must, for password-based authentication, update the list of passwords on an organization-defined frequency.
- V-263677 Medium The Mainframe Product must, for password-based authentication, update the list of passwords when organizational passwords are suspected to have been compromised directly or indirectly.
- V-263678 Medium The Mainframe Product must, for password-based authentication, verify when users create or update passwords, that the passwords are not found on the list of commonly-used, expected, or compromised passwords in IA-5 (1) (a).
- V-263679 Medium The Mainframe Product must, for password-based authentication, require immediate selection of a new password upon account recovery.
- V-263680 Medium The Mainframe Product must, for password-based authentication, allow user selection of long passwords and passphrases, including spaces and all printable characters.
- V-263681 Medium The Mainframe Product must, for password-based authentication, employ automated tools to assist the user in selecting strong password authenticators.
- V-263682 Medium The Mainframe Product must for public key-based authentication, implement a local cache of revocation data to support path discovery and validation.
- V-263683 Medium The Mainframe Product must protect nonlocal maintenance sessions by separating the maintenance session from other network sessions with the system by logically separated communications paths.
- V-263684 Medium The Mainframe Product must include only approved trust anchors in trust stores or certificate stores managed by the organization.
- V-263685 Medium The Mainframe Product must provide protected storage for cryptographic keys with organization-defined safeguards and/or hardware protected key store.
- V-263686 Medium The Mainframe Product must synchronize system clocks within and between systems or system components.
- V-263687 Medium The Mainframe Product must compare the internal system clocks on an organization-defined frequency with organization-defined authoritative time source.
Removed rules 6
- V-205495 Medium The Mainframe Product must prohibit password reuse for a minimum of five generations.
- V-205512 Medium The Mainframe Product must terminate all sessions and network connections when nonlocal maintenance is completed.
- V-205552 Medium The Mainframe Product must provide centralized management and configuration of the content to be captured in audit records generated by all application components.
- V-205568 Medium The Mainframe Product must require users to reauthenticate when circumstances or situations require reauthentication as defined in site security plan.
- V-205569 Medium The Mainframe Product must require devices to reauthenticate when circumstances or situations require reauthentication as defined in site security plan.
- V-205572 Medium The Mainframe Product must allow the use of a temporary password for system logons with an immediate change to a permanent password.
Content changes 11
- V-205483 Medium description The Mainframe Product must prevent the installation of patches, service packs, or application components without verification that the software component has been digitally signed using a certificate that is recognized and approved by the organization.
- V-205491 Medium descriptioncheck The Mainframe Product must use multifactor authentication for local access to privileged accounts.
- V-205492 Medium descriptioncheckfix The Mainframe Product must use multifactor authentication for local access to nonprivileged accounts.
- V-205493 Medium descriptioncheck The Mainframe Product must verify users are authenticated with an individual authenticator prior to using a group authenticator.
- V-205500 Medium check The Mainframe Product must require the change of at least eight of the total number of characters when passwords are changed.
- V-205504 Medium description The Mainframe Product must enforce a 60-day maximum password lifetime restriction.
- V-205526 Medium descriptioncheckfix The Mainframe Product must update malicious code protection mechanisms whenever new releases are available in accordance with organizational configuration management policy.
- V-205528 Medium descriptioncheckfix The Mainframe Product must update malicious code protection mechanisms whenever new releases are available in accordance with organizational configuration management procedures.
- V-205531 Medium description The Mainframe Product must notify system programmers and security administrators when accounts are created.
- V-205542 Medium description The Mainframe Product must notify system programmers and security administrators of account enabling actions.
- V-205576 Medium description The Mainframe Product must accept Federal Identity, Credential, and Access Management (FICAM)-approved third-party credentials.
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- SRG-APP-000001-MFP-000001
- Vuln IDs
-
- V-205439
- V-67801
- Rule IDs
-
- SV-205439r960735_rule
- SV-82291
Checks: C-5705r299550_chk
If the Mainframe Product has no log on capability, this requirement is not applicable. Examine installation and configuration settings. If concurrent sessions are not limited to three per account by type of user, this is a finding.
Fix: F-5705r299551_fix
Configure the Mainframe Product to limit current sessions to three per account by type of user.
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000060
- Version
- SRG-APP-000002-MFP-000002
- Vuln IDs
-
- V-205440
- V-68109
- Rule IDs
-
- SV-205440r960738_rule
- SV-82599
Checks: C-5706r299553_chk
If the Mainframe Product has no data screen capability, this requirement is not applicable. Examine configuration parameters to determine whether information previously displayed on the screen is concealed at a session lock. If information is not concealed, this is a finding.
Fix: F-5706r299554_fix
Configure the Mainframe Product to conceal previously displayed information at a session lock.
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000057
- Version
- SRG-APP-000003-MFP-000003
- Vuln IDs
-
- V-205441
- V-68111
- Rule IDs
-
- SV-205441r960741_rule
- SV-82601
Checks: C-5707r299556_chk
If the Mainframe Product has no data screen capability, this requirement is not applicable. Examine configuration parameters to determine whether the Mainframe Product performs a session lock after 15 minutes of inactivity. If it does not, this is a finding.
Fix: F-5707r299557_fix
Configure the Mainframe Product to perform a session lock after 15 minutes of inactivity.
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000057
- Version
- SRG-APP-000004-MFP-000004
- Vuln IDs
-
- V-205442
- V-68113
- Rule IDs
-
- SV-205442r982280_rule
- SV-82603
Checks: C-5708r299559_chk
If the Mainframe Product has no data screen capability, this requirement is not applicable. Determine whether the Mainframe Product allows users to directly initiate a session lock. If it does not this is a finding. Examine the Mainframe Product configuration parameters and user attributes to determine whether user can initiate a session lock. If the parameters are not properly set and/or user is not permitted, this is a finding.
Fix: F-5708r859060_fix
Configure the Mainframe Product user's attributes to enable ability to initiate a session lock. Verify the external security manager permits it.
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000056
- Version
- SRG-APP-000005-MFP-000005
- Vuln IDs
-
- V-205443
- V-68115
- Rule IDs
-
- SV-205443r960747_rule
- SV-82605
Checks: C-5709r299562_chk
If the Mainframe Product has no data screen capability, this requirement is not applicable. Determine whether the Mainframe Product has the capability to retain the session lock until user reestablishes access using established Identification and authentication procedures. If it does not, this is a finding. Examine configuration settings to determine if sessions locks are held until the user reestablishes access. If they are not properly set, this is a finding.
Fix: F-5709r299563_fix
Configure the Mainframe Product setting to retain session locks until user reestablishes access using established identification and authentication procedures.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000015
- Version
- SRG-APP-000023-MFP-000033
- Vuln IDs
-
- V-205444
- V-68127
- Rule IDs
-
- SV-205444r960768_rule
- SV-82617
Checks: C-5710r299565_chk
Examine installation and configuration settings. If the Mainframe Product does not use an external security manager to support all account management functions, this is a finding.
Fix: F-5710r299566_fix
Configure the Mainframe Product to use an external security manager for all account management functions.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000016
- Version
- SRG-APP-000024-MFP-000036
- Vuln IDs
-
- V-205445
- V-68131
- Rule IDs
-
- SV-205445r960771_rule
- SV-82621
Checks: C-5711r299568_chk
If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine account management settings. If temporary users are not removed or disabled after 72 hours, this is a finding.
Fix: F-5711r299569_fix
Configure the Mainframe Product account management settings to automatically remove or disable temporary user accounts after 72 hours.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000017
- Version
- SRG-APP-000025-MFP-000038
- Vuln IDs
-
- V-205446
- V-68135
- Rule IDs
-
- SV-205446r960774_rule
- SV-82625
Checks: C-5712r299571_chk
If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine account management settings. If the Mainframe Product automatically disables accounts after 35 days of inactivity, this is not a finding.
Fix: F-5712r299572_fix
Configure the Mainframe Product account management settings to automatically disable accounts after 35 days of account inactivity.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000018
- Version
- SRG-APP-000026-MFP-000039
- Vuln IDs
-
- V-205447
- V-68137
- Rule IDs
-
- SV-205447r960777_rule
- SV-82627
Checks: C-5713r299574_chk
If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine account management settings. If the Mainframe Product does not automatically audit account creation, this is a finding.
Fix: F-5713r299575_fix
Configure the Mainframe Product account management settings to automatically audit account creation.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001403
- Version
- SRG-APP-000027-MFP-000040
- Vuln IDs
-
- V-205448
- V-68139
- Rule IDs
-
- SV-205448r960780_rule
- SV-82629
Checks: C-5714r299577_chk
If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine account management settings. If the Mainframe Product does not automatically audit account modification, this is a finding.
Fix: F-5714r299578_fix
Configure the Mainframe Product account management settings to automatically audit account modification.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001404
- Version
- SRG-APP-000028-MFP-000041
- Vuln IDs
-
- V-205449
- V-68141
- Rule IDs
-
- SV-205449r960783_rule
- SV-82631
Checks: C-5715r299580_chk
If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine account management settings. If the Mainframe Product does not automatically audit account disabling actions, this is a finding.
Fix: F-5715r299581_fix
Configure the Mainframe Product account management settings to automatically audit account disabling actions.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001405
- Version
- SRG-APP-000029-MFP-000042
- Vuln IDs
-
- V-205450
- V-68143
- Rule IDs
-
- SV-205450r960786_rule
- SV-82633
Checks: C-5716r299583_chk
If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine account management settings. If the Mainframe Product does not automatically audit account removal actions, this is a finding.
Fix: F-5716r299584_fix
Configure the Mainframe Product account management settings to automatically audit account removal actions.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- SRG-APP-000033-MFP-000056
- Vuln IDs
-
- V-205451
- V-68159
- Rule IDs
-
- SV-205451r960792_rule
- SV-82649
Checks: C-5717r299586_chk
If an external security manager is used, check the external security manager rules and configuration. If there are no rules for these resources or the rules do not restrict user access in accordance with applicable access control policies, this is a finding. Examine mainframe product installation and configuration settings. Verify that the Mainframe Product enforces role and/or resource access in accordance with applicable access control policies. If it does not, this is a finding.
Fix: F-5717r539572_fix
Configure the Mainframe Product to enforce role and/or resource access in accordance with applicable access control policies. This can be accomplished using an external security manager. Configure the external security manager to restrict user access according to applicable access control policies.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- SRG-APP-000033-MFP-000057
- Vuln IDs
-
- V-205452
- V-68161
- Rule IDs
-
- SV-205452r960792_rule
- SV-82651
Checks: C-5718r299589_chk
If an external security manager is used, check the external security manager rules and configuration. If there are no rules for these resources or the rules do not restrict security administrator access in accordance with applicable access control policies, this is a finding. Examine installation and configuration settings. Verify that the Mainframe Product enforces security administrator access to information and system resources in accordance with applicable access control policies. If it does not, this is a finding.
Fix: F-5718r539574_fix
Configure the Mainframe Product to enforce role and/or resource access in accordance with applicable access control policies. This can be accomplished using an external security manager. Configure the external security manager to restrict security administrator access according to applicable access control policies.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- SRG-APP-000033-MFP-000066
- Vuln IDs
-
- V-205453
- V-68165
- Rule IDs
-
- SV-205453r960792_rule
- SV-82655
Checks: C-5719r299592_chk
If an external security manager (ESM) is used, check the ESM rules and configuration. If there are no rules for these resources or the rules do not restrict system programmer access in accordance with applicable access control policies, this is a finding. If an ESM is not in use, examine installation and configuration settings. Verify that the Mainframe Product enforces system programmer access to information and system resources in accordance with applicable access control policies. If it does not, this is a finding.
Fix: F-5719r539576_fix
Configure the Mainframe Product to enforce role and/or resource access in accordance with applicable access control policies. This can be accomplished using an ESM. Configure the ESM to restrict system programmer access according to applicable access control policies.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001368
- Version
- SRG-APP-000038-MFP-000067
- Vuln IDs
-
- V-205454
- V-68167
- Rule IDs
-
- SV-205454r960801_rule
- SV-82657
Checks: C-5720r299595_chk
Examine installation and configuration settings. Verify that the Mainframe Product enforces approved authorizations for controlling the flow of information within the system with applicable access control policies. If it does not, this is a finding.
Fix: F-5720r299596_fix
Configure the Mainframe Product to enforce approved authorizations for controlling the flow of information within the system with applicable access control policies.
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-000044
- Version
- SRG-APP-000065-MFP-000093
- Vuln IDs
-
- V-205455
- V-68175
- Rule IDs
-
- SV-205455r960840_rule
- SV-82665
Checks: C-5721r299598_chk
If the Mainframe Product has no function or capability for user logon, this is not applicable. If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine Mainframe Product configuration settings. Verify that the Mainframe Product account management settings enforce a limit of three consecutive invalid logon attempts by a user during a 15 minute time period. If it does not, this is a finding.
Fix: F-5721r299599_fix
Configure the Mainframe Product account management settings to enforce a limit of three consecutive invalid logon attempts by a user during a 15 minute time period.
- RMF Control
- MA-3
- Severity
- M
- CCI
- CCI-000870
- Version
- SRG-APP-000073-MFP-000255
- Vuln IDs
-
- V-205456
- V-68419
- Rule IDs
-
- SV-205456r960852_rule
- SV-82909
Checks: C-5722r299601_chk
If the Mainframe Product has no function or capability for scanning activity, this is not applicable. Examine installation and configuration settings. If the Mainframe Product is not configured to scan all media brought into the organization for diagnostic and testing purposes for intentional or unintentionally included malicious code prior to use, this is a finding.
Fix: F-5722r299602_fix
Configure the Mainframe Product to scan all media used in maintenance prior to use.
- RMF Control
- AU-10
- Severity
- M
- CCI
- CCI-000166
- Version
- SRG-APP-000080-MFP-000102
- Vuln IDs
-
- V-205457
- V-68179
- Rule IDs
-
- SV-205457r960864_rule
- SV-82669
Checks: C-5723r299604_chk
If the Mainframe Product does not perform tasks on the behalf of other users, this is not applicable. Examine configuration settings. Determine whether settings identify initiating user for authentication. If it does not, this is a finding.
Fix: F-5723r299605_fix
Configure the Mainframe Product to identify initiating user for authentication for all tasks.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000174
- Version
- SRG-APP-000086-MFP-000110
- Vuln IDs
-
- V-205458
- V-68181
- Rule IDs
-
- SV-205458r960873_rule
- SV-82671
Checks: C-5724r299607_chk
If the Mainframe Product does not perform audit record aggregation, this is not applicable. Examine configuration settings. If the Mainframe Product settings do not use the operating system clock for time stamps, this is a finding.
Fix: F-5724r299608_fix
Configure the Mainframe Product to use the operating system clock for time stamps.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- SRG-APP-000089-MFP-000114
- Vuln IDs
-
- V-205459
- V-68187
- Rule IDs
-
- SV-205459r960879_rule
- SV-82677
Checks: C-5725r299610_chk
Examine Mainframe Product documentation. Refer to NIST SP 800-53 AU-2 or the Risk Management Knowledge Service (RMKS) for DoD auditing events. Examine configuration settings. Compare available auditing events. If available auditing events do not include all DoD-defined auditing events, this is a finding. If auditing is not available for all components of the Mainframe Product, this is a finding.
Fix: F-5725r299611_fix
Configure the Mainframe Product to audit all DoD-defined auditing events within all Mainframe Product components.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000171
- Version
- SRG-APP-000090-MFP-000115
- Vuln IDs
-
- V-205460
- V-68189
- Rule IDs
-
- SV-205460r960882_rule
- SV-82679
Checks: C-5726r299613_chk
Examine the configuration settings. Verify the capability to select auditable events is restricted to security administrators (or individuals or roles appointed by the ISSM). If it is not, this is a finding.
Fix: F-5726r299614_fix
Configure the Mainframe Product to restrict selection of auditable events to security administrators (or individuals or roles appointed by the ISSM).
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000091-MFP-000116
- Vuln IDs
-
- V-205461
- V-68191
- Rule IDs
-
- SV-205461r960885_rule
- SV-82681
Checks: C-5727r299616_chk
Examine the installation and configuration settings. Verify that the Mainframe Product identifies privileged functions and writes to SMF and/or uses an external security manager to generate audit records when successful/unsuccessful attempts to access privileges occur. If it does not, this is a finding.
Fix: F-5727r299617_fix
Configure the Mainframe Product to write to SMF and/or provide audit SAF call for the external security manager when successful/unsuccessful attempts to access privileges occur.
- RMF Control
- AU-14
- Severity
- M
- CCI
- CCI-001464
- Version
- SRG-APP-000092-MFP-000137
- Vuln IDs
-
- V-205462
- V-68235
- Rule IDs
-
- SV-205462r960888_rule
- SV-82725
Checks: C-5728r299619_chk
If the Mainframe Product has no function or capability for session operations, this is not applicable. Examine installation and configuration settings. Verify that session auditing is initiated at session startup. If it is not, this is a finding.
Fix: F-5728r299620_fix
Configure the Mainframe Product to initiate session auditing upon startup.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- SRG-APP-000095-MFP-000140
- Vuln IDs
-
- V-205464
- V-68241
- Rule IDs
-
- SV-205464r960891_rule
- SV-82731
Checks: C-5730r299625_chk
Examine installation and configuration settings. Verify data written to external security manager audit files and/or SMF records contain information that details what type of events occurred. If it does not, this is a finding.
Fix: F-5730r299626_fix
Configure the Mainframe Product audit records written to external security manager audit files and/or SMF records to contain information that details what type of events occurred.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000131
- Version
- SRG-APP-000096-MFP-000141
- Vuln IDs
-
- V-205465
- V-68243
- Rule IDs
-
- SV-205465r960894_rule
- SV-82733
Checks: C-5731r299628_chk
Examine installation and configuration settings. Ensure data written to external security manager audit files and/or SMF records contain information that details when events occurred. If it does not, this is a finding.
Fix: F-5731r299629_fix
Configure the Mainframe Product audit records written to external security manager audit files and/or SMF records to contain information that details when (date and time) the events occurred.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000132
- Version
- SRG-APP-000097-MFP-000142
- Vuln IDs
-
- V-205466
- V-68245
- Rule IDs
-
- SV-205466r960897_rule
- SV-82735
Checks: C-5732r299631_chk
Examine installation and configuration settings. Verify data written to external security manager audit files and/or SMF records contain information that details where events occurred. If it does not, this is a finding.
Fix: F-5732r299632_fix
Configure the Mainframe Product audit records written to external security manager audit files and/or SMF records to contain information that details where the events occurred.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000133
- Version
- SRG-APP-000098-MFP-000143
- Vuln IDs
-
- V-205467
- V-68247
- Rule IDs
-
- SV-205467r960900_rule
- SV-82737
Checks: C-5733r299634_chk
Examine installation and configuration settings. Verify data written to external security manager audit files and/or SMF records contain information that details the source of events. If it does not, this is a finding.
Fix: F-5733r299635_fix
Configure the Mainframe Product audit records written to external security manager audit files and/or SMF records to contain information to establish the source of the events.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000134
- Version
- SRG-APP-000099-MFP-000144
- Vuln IDs
-
- V-205468
- V-68249
- Rule IDs
-
- SV-205468r960903_rule
- SV-82739
Checks: C-5734r299637_chk
Examine installation and configuration settings. Verify data written to external security manager audit files and/or SMF records contain information that details the outcome of events. If it does not, this is a finding.
Fix: F-5734r299638_fix
Configure the Mainframe Product audit records written to external security manager audit files and/or SMF records to contain information to establish the outcome of the events.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-001487
- Version
- SRG-APP-000100-MFP-000145
- Vuln IDs
-
- V-205469
- V-68251
- Rule IDs
-
- SV-205469r960906_rule
- SV-82741
Checks: C-5735r299640_chk
Examine installation and configuration settings. Verify data written to external security manager audit files and/or SMF records contain information that details the identity of individuals or processes associated with the event. If it does not, this is a finding.
Fix: F-5735r299641_fix
Configure the Mainframe Product audit records written to external security manager audit files and/or SMF records to contain information to establish the identity of any individual or process associated with the event.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000135
- Version
- SRG-APP-000101-MFP-000146
- Vuln IDs
-
- V-205470
- V-68253
- Rule IDs
-
- SV-205470r960909_rule
- SV-82743
Checks: C-5736r299643_chk
Examine installation and configuration settings. Verify data written to external security manager audit files and/or SMF records contain information that details contain full-text recording of privileged commands or the individual identities of group account users associated with the event. If it does not, this is a finding.
Fix: F-5736r299644_fix
Configure the Mainframe Product audit records written to external security manager audit files and/or SMF records to contain full-text recording of privileged commands or the individual identities of group account users.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-000139
- Version
- SRG-APP-000108-MFP-000154
- Vuln IDs
-
- V-205471
- V-68265
- Rule IDs
-
- SV-205471r960912_rule
- SV-82755
Checks: C-5737r299646_chk
If the Mainframe Product does not perform audit data management or storage function, this is not applicable. Examine configuration settings. Determine if Mainframe Product alerts system programmers or security administrators in the event of audit processing failure. If it does not, this is a finding.
Fix: F-5737r299647_fix
Configure the Mainframe Product to alert system programmers or security administrators in the event of audit processing failure.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-000140
- Version
- SRG-APP-000109-MFP-000155
- Vuln IDs
-
- V-205472
- V-68267
- Rule IDs
-
- SV-205472r960915_rule
- SV-82757
Checks: C-5738r299649_chk
If the Mainframe Product does not perform audit data management or storage function, this is not applicable. Examine configuration settings for audit failure parameters. If Mainframe Product does not shut down by default in the event of audit processing failure, this is a finding. Note: This depends on whether availability is an overriding concern.
Fix: F-5738r299650_fix
Configure the Mainframe Product to shut down by default upon audit failure (unless availability is an overriding concern).
- RMF Control
- AU-6
- Severity
- M
- CCI
- CCI-000154
- Version
- SRG-APP-000111-MFP-000156
- Vuln IDs
-
- V-205473
- V-68269
- Rule IDs
-
- SV-205473r960918_rule
- SV-82759
Checks: C-5739r299652_chk
If the Mainframe Product does not perform audit data management or storage function, this is not applicable. Examine installation and configuration settings. Verify the Mainframe Product has the capability to centrally review and analyze audit records from multiple components in the system. If it does not, this is a finding.
Fix: F-5739r299653_fix
Configure the Mainframe Product to centrally review and analyze audit records from multiple components in the system.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- SRG-APP-000112-MFP-000280
- Vuln IDs
-
- V-205474
- V-68451
- Rule IDs
-
- SV-205474r960921_rule
- SV-82941
Checks: C-5740r299655_chk
If the Mainframe Product has no function or capability for mobile code use, this is not applicable. Examine installation and configuration settings. If the Mainframe Product is not configured to prevent the execution of prohibited mobile code, this is a finding.
Fix: F-5740r299656_fix
Configure the Mainframe Product to prevent the execution of prohibited mobile code.
- RMF Control
- AU-7
- Severity
- M
- CCI
- CCI-000158
- Version
- SRG-APP-000115-MFP-000157
- Vuln IDs
-
- V-205475
- V-68271
- Rule IDs
-
- SV-205475r960924_rule
- SV-82761
Checks: C-5741r299658_chk
If the Mainframe Product does not perform audit data management or storage function, this is not applicable. Examine installation and configuration settings. Refer to the site's auditing policies. Verify the Mainframe Product filters audit record events of interest based on Site defined criteria. If it does not, this is a finding.
Fix: F-5741r299659_fix
Configure the Mainframe Product to filter audit record events of interest based on Site defined criteria
- RMF Control
- AU-8
- Severity
- M
- CCI
- CCI-000159
- Version
- SRG-APP-000116-MFP-000171
- Vuln IDs
-
- V-205476
- V-68289
- Rule IDs
-
- SV-205476r960927_rule
- SV-82779
Checks: C-5742r299661_chk
Examine installation and configuration settings. If the Mainframe Product does not use the z/OS system clock for audit time stamps, this is a finding.
Fix: F-5742r299662_fix
Configure the Mainframe Product to use the z/OS system clock for audit time stamps.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- SRG-APP-000118-MFP-000174
- Vuln IDs
-
- V-205477
- V-68291
- Rule IDs
-
- SV-205477r960930_rule
- SV-82781
Checks: C-5743r299664_chk
Examine installation and configuration settings. Verify the Mainframe Product restricts audit information read access to system programmers, security administrators, and audit personnel. If access is not restricted, this is a finding. If an external security manager (ESM) is being used, examine external security configuration and rules. If the rules do not restrict read access to system programmers, security managers, and audit personnel, this is a finding.
Fix: F-5743r539589_fix
Verify the Mainframe Product restricts read access to system programmers, security administrators, and audit personnel. This can be accomplished using an ESM. Configure the Mainframe Product to provide a SAF call for audit information access. Verify ESM rules restrict read access to system programmers, security administrators, and audit personnel.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000163
- Version
- SRG-APP-000119-MFP-000175
- Vuln IDs
-
- V-205478
- V-68293
- Rule IDs
-
- SV-205478r960933_rule
- SV-82783
Checks: C-5744r299667_chk
Examine installation and configuration settings. Verify that the Mainframe Product restricts audit information update access to system programmers, security administrators, and audit personnel. If access is not restricted, this is a finding. If an external security manager (ESM) is being used, examine the external security configuration and rules. If the rules do not restrict update access to system programmers, security managers, and audit personnel, this is a finding.
Fix: F-5744r539591_fix
Verify the Mainframe Product restricts update or greater access to system programmers, security administrators, and audit personnel. This can be accomplished using an ESM. Configure the Mainframe Product to provide an SAF call for audit information access. Verify ESM rules restrict update or greater access to system programmers, security administrators, and audit personnel.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000164
- Version
- SRG-APP-000120-MFP-000176
- Vuln IDs
-
- V-205479
- V-68295
- Rule IDs
-
- SV-205479r960936_rule
- SV-82785
Checks: C-5745r299670_chk
Examine installation and configuration settings. Verify the Mainframe Product restricts audit information delete access to system programmers, security administrators, and audit personnel. If access is not restricted, this is a finding. If an external security manager (ESM) is being used, examine external security configuration and rules. If the rules do not restrict update or greater access to system programmers, security managers, and audit personnel, this is a finding.
Fix: F-5745r539593_fix
Verify the Mainframe Product restricts update or greater access to the system's programmers, security administrators, and audit personnel. This can be accomplished using an ESM. Configure the Mainframe Product to provide SAF call for audit information access. Ensure external security manager restricts update or greater access to the system's programmers, security administrators, and audit personnel.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001493
- Version
- SRG-APP-000121-MFP-000177
- Vuln IDs
-
- V-205480
- V-68297
- Rule IDs
-
- SV-205480r960939_rule
- SV-82787
Checks: C-5746r299673_chk
If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine installation and configuration settings. Verify the Mainframe Product restricts audit tool access to system programmers, security administrator, and audit personnel. If access is not restricted, this is a finding.
Fix: F-5746r299674_fix
Configure the Mainframe Product to restrict audit tool access to system programmers, security administrators, and audit personnel.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001494
- Version
- SRG-APP-000122-MFP-000178
- Vuln IDs
-
- V-205481
- V-68299
- Rule IDs
-
- SV-205481r960942_rule
- SV-82789
Checks: C-5747r299676_chk
If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine installation and configuration settings. Verify the Mainframe Product restricts audit tool modification to system programmers, security administrator, and audit personnel. If access is not restricted, this is a finding.
Fix: F-5747r299677_fix
Configure the Mainframe Product to restrict audit tool modification to system programmers, security administrators, and audit personnel.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001495
- Version
- SRG-APP-000123-MFP-000179
- Vuln IDs
-
- V-205482
- V-68301
- Rule IDs
-
- SV-205482r960945_rule
- SV-82791
Checks: C-5748r299679_chk
If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine installation and configuration settings. Verify the Mainframe Product restricts the ability to delete audit tool to system programmers, security administrators, and audit personnel. If access is not restricted, this is a finding.
Fix: F-5748r299680_fix
Configure the Mainframe Product to restrict audit tool deletion to system programmers, security administrators, and audit personnel.
- RMF Control
- Severity
- M
- CCI
- CCI-003992
- Version
- SRG-APP-000131-MFP-000189
- Vuln IDs
-
- V-205483
- V-68313
- Rule IDs
-
- SV-205483r982281_rule
- SV-82803
Checks: C-5749r299682_chk
Examine installation and configuration settings for change management. If the Mainframe Product does not prevent the installation of patches, service packs, or application components without verification that the software component has been digitally signed using a certificate that is recognized and approved by the organization, this is a finding.
Fix: F-5749r539599_fix
Configure installation and configuration settings for change management to prevent the installation of patches, service packs, or application components without verification that the software component has been digitally signed using a certificate that is recognized and approved by the organization.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001499
- Version
- SRG-APP-000133-MFP-000192
- Vuln IDs
-
- V-205484
- V-68315
- Rule IDs
-
- SV-205484r960960_rule
- SV-82805
Checks: C-5750r299685_chk
If an external security manager (ESM) is in use, examine the ESM configurations and rules. If the ESM does not restrict update or greater access to installation datasets to system programmers or security managers or other authorized users as directed by applicable access control policies, this is a finding. If an ESM is NOT in use, examine the Mainframe Product installation and configuration settings. If the Mainframe Product does not restrict update or greater access to Installation datasets to system programmers or security managers or other authorized users as directed by applicable access control policies, this is a finding.
Fix: F-5750r539601_fix
Configure the Mainframe Product to limit privileges to changing Mainframe Product installation datasets to system programmers or security managers or other authorized users as directed by applicable access control policies. This can be accomplished with an ESM. Configure the ESM to restrict update and greater access to Mainframe Product installation datasets to system programmers or security managers or other authorized users in accordance with applicable access control policies.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001499
- Version
- SRG-APP-000133-MFP-000193
- Vuln IDs
-
- V-205485
- V-68317
- Rule IDs
-
- SV-205485r960960_rule
- SV-82807
Checks: C-5751r299688_chk
If an external security manager (ESM) is in use, examine the ESM configurations and rules. If the ESM does not restrict update or greater access to started task and job datasets to system programmers or security managers or other authorized users as directed by applicable access control policies, this is a finding. If an ESM is NOT in use, examine the Mainframe Product installation and configuration settings. If the Mainframe Product does not restrict update or greater access to installation and job datasets to system programmers or security managers or other authorized users as directed by applicable access control policies, this is a finding.
Fix: F-5751r539603_fix
Configure the Mainframe Product to limit privileges to Mainframe Products started tasks and sob datasets to system programmers or other authorized users in accordance with applicable access control policies. This can be accomplished with an ESM. Configure the ESM to restrict update and greater access to Mainframe Product started tasks and job datasets to system programmers or other authorized users in accordance with applicable access control policies.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001499
- Version
- SRG-APP-000133-MFP-000194
- Vuln IDs
-
- V-205486
- V-68319
- Rule IDs
-
- SV-205486r960960_rule
- SV-82809
Checks: C-5752r299691_chk
If an external security manager (ESM) is in use, check the ESM rules and configuration. If there are no rules for Mainframe Product user datasets or the rules do not restrict access to Mainframe Product user datasets to authorized users as directed by applicable access control policies, this is a finding. If an ESM is NOT in use, examine installation and configuration settings. If the Mainframe Product does not restrict access to Mainframe Product user datasets to authorized users as directed by applicable access control policies, this is a finding.
Fix: F-5752r539605_fix
Configure the Mainframe Product to limit privileges to changing the software resident within software libraries. This can be accomplished with an ESM. Configure the ESM to restrict update and greater access to Mainframe Product started tasks and job datasets to security administrators in accordance with applicable access control policies.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- SRG-APP-000141-MFP-000200
- Vuln IDs
-
- V-205487
- V-68325
- Rule IDs
-
- SV-205487r960963_rule
- SV-82815
Checks: C-5753r299694_chk
Refer to Mainframe Product installation documentation to determine sample and default demonstrative components. Examine installation settings. If there are any sample or default demonstrative components in the installation, this is a finding.
Fix: F-5753r299695_fix
Configure the Mainframe Product installation and/or configurations to remove sample and demonstrative components.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000764
- Version
- SRG-APP-000148-MFP-000206
- Vuln IDs
-
- V-205488
- V-68331
- Rule IDs
-
- SV-205488r960969_rule
- SV-82821
Checks: C-5754r299697_chk
If the Mainframe Product has no function or capability for user logon, this is not applicable. If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine user account configurations. If the Mainframe Product does not uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users), this is a finding.
Fix: F-5754r299698_fix
Configure the Mainframe Product account management settings to uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000765
- Version
- SRG-APP-000149-MFP-000207
- Vuln IDs
-
- V-205489
- V-68333
- Rule IDs
-
- SV-205489r960972_rule
- SV-82823
Checks: C-5755r299700_chk
If the Mainframe Product has no function or capability for user logon, this is not applicable. If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine user account management configurations. If the Mainframe Product is configured to require multifactor authentication for network access to privileged accounts, this is not a finding
Fix: F-5755r299701_fix
Configure the Mainframe Product account management settings to require multifactor authentication for network access to privileged accounts.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000766
- Version
- SRG-APP-000150-MFP-000211
- Vuln IDs
-
- V-205490
- V-68339
- Rule IDs
-
- SV-205490r960975_rule
- SV-82829
Checks: C-5756r299703_chk
If the Mainframe Product has no function or capability for user logon, this is not applicable. If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine user account management configurations. If the Mainframe Product is configured to require multifactor authentication for network access to non-privileged accounts, this is not a finding
Fix: F-5756r299704_fix
Configure the Mainframe Product account management settings to require multifactor authentication for network access to non-privileged accounts.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000765
- Version
- SRG-APP-000151-MFP-000212
- Vuln IDs
-
- V-205491
- V-68511
- Rule IDs
-
- SV-205491r982283_rule
- SV-83001
Checks: C-5757r982282_chk
If the Mainframe Product has no function or capability for user logon, this is not applicable. If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine user account management configurations. If the Mainframe Product is configured to require multifactor authentication for local access to privileged accounts, this is not a finding.
Fix: F-5757r299707_fix
Configure the Mainframe Product account management settings to require multifactor authentication for local access to privileged accounts.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000766
- Version
- SRG-APP-000152-MFP-000213
- Vuln IDs
-
- V-205492
- V-68513
- Rule IDs
-
- SV-205492r982286_rule
- SV-83003
Checks: C-5758r982284_chk
If the Mainframe Product has no function or capability for user logon, this is not applicable. If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine user account management configurations. If the Mainframe Product is configured to require multifactor authentication for local access to nonprivileged accounts, this is not a finding.
Fix: F-5758r982285_fix
Configure the Mainframe Product account management settings to require multifactor authentication for local access to nonprivileged accounts.
- RMF Control
- Severity
- M
- CCI
- CCI-004045
- Version
- SRG-APP-000153-MFP-000214
- Vuln IDs
-
- V-205493
- V-68369
- Rule IDs
-
- SV-205493r982288_rule
- SV-82859
Checks: C-5759r982287_chk
If the Mainframe Product has no function or capability for user logon, this is not applicable. If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine user account management configurations. If the Mainframe Product is configured to require users to authenticate with an individual authenticator prior to using a group authenticator, this is not a finding.
Fix: F-5759r299713_fix
Configure the Mainframe Product account management settings to require users to authenticate with an individual authenticator prior to using a group authenticator.
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- SRG-APP-000164-MFP-000227
- Vuln IDs
-
- V-205494
- V-68371
- Rule IDs
-
- SV-205494r982289_rule
- SV-82861
Checks: C-5760r299715_chk
If the Mainframe Product employs an external security manager (ESM) for all account management functions, this is not applicable. Examine user account management configurations. If the Mainframe Product account management configuration does not enforce a minimum 15-character password length, this is a finding.
Fix: F-5760r299716_fix
Configure the Mainframe Product account management to enforce a minimum 15-character password length.
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- SRG-APP-000166-MFP-000228
- Vuln IDs
-
- V-205496
- V-68373
- Rule IDs
-
- SV-205496r982292_rule
- SV-82863
Checks: C-5762r299721_chk
If the Mainframe Product employs an external security manager (ESM) for all account management functions, this is not applicable. Examine user account management configurations. If the Mainframe Product does not require at least one uppercase character be used in passwords, this is a finding.
Fix: F-5762r982291_fix
Configure the Mainframe Product account management settings to require the use of at least one uppercase character in passwords.
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- SRG-APP-000167-MFP-000229
- Vuln IDs
-
- V-205497
- V-68375
- Rule IDs
-
- SV-205497r982293_rule
- SV-82865
Checks: C-5763r299724_chk
If the Mainframe Product employs an external security manager (ESM) for all account management functions, this is not applicable. Examine user account management configurations. If the Mainframe Product account management configurations do not require at least one lowercase character be used in passwords, this is a finding.
Fix: F-5763r299725_fix
Configure the Mainframe Product account management settings to require the use of at least one lowercase character in passwords.
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- SRG-APP-000168-MFP-000230
- Vuln IDs
-
- V-205498
- V-68377
- Rule IDs
-
- SV-205498r982294_rule
- SV-82867
Checks: C-5764r299727_chk
If the Mainframe Product employs an external security manager (ESM) for all account management functions, this is not applicable. Examine user account management configurations. If the Mainframe Product account management configurations do not require at least one numeric character be used in passwords, this is a finding.
Fix: F-5764r299728_fix
Configure the Mainframe Product account management settings to require the use of at least one numeric character in passwords.
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- SRG-APP-000169-MFP-000231
- Vuln IDs
-
- V-205499
- V-68381
- Rule IDs
-
- SV-205499r982296_rule
- SV-82871
Checks: C-5765r982295_chk
If the Mainframe Product employs an external security manager (ESM) for all account management functions, this is not applicable. Examine user account management configurations. If the Mainframe Product does not enforce password complexity by requiring at least one special character be used, this is a finding.
Fix: F-5765r299731_fix
Configure the Mainframe Product to enforce password complexity by requiring the use of at least one special character in passwords.
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- SRG-APP-000170-MFP-000232
- Vuln IDs
-
- V-205500
- V-68383
- Rule IDs
-
- SV-205500r982298_rule
- SV-82873
Checks: C-5766r982297_chk
If the Mainframe Product employs an external security manager (ESM) for all account management functions, this is not applicable. Examine user account management configurations. If the Mainframe Product account management settings do not require the change of at least eight of the total characters when passwords are changed, this is a finding.
Fix: F-5766r299734_fix
Configure the Mainframe Product account management settings to require the change of at least 8 of the total characters when passwords are changed.
- RMF Control
- Severity
- M
- CCI
- CCI-004062
- Version
- SRG-APP-000171-MFP-000233
- Vuln IDs
-
- V-205501
- V-68385
- Rule IDs
-
- SV-205501r982299_rule
- SV-82875
Checks: C-5767r299736_chk
If the Mainframe Product employs an external security manager (ESM) for all account management functions, this is not applicable. Examine user account management configurations. If the Mainframe Product account management configuration does not require that only cryptographically protected passwords are stored, this is a finding.
Fix: F-5767r299737_fix
Configure the Mainframe Product account management to store only cryptographically protected passwords.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000197
- Version
- SRG-APP-000172-MFP-000234
- Vuln IDs
-
- V-205502
- V-68387
- Rule IDs
-
- SV-205502r961029_rule
- SV-82877
Checks: C-5768r299739_chk
If the Mainframe Product employs an external security manager (ESM) for all account management functions, this is not applicable. Examine user account management configurations. If the Mainframe Product account management configuration does not require transmittal of only cryptographically protected passwords, this is a finding.
Fix: F-5768r299740_fix
Configure the Mainframe Product account management to transmit only cryptographically protected passwords.
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- SRG-APP-000173-MFP-000235
- Vuln IDs
-
- V-205503
- V-68389
- Rule IDs
-
- SV-205503r982300_rule
- SV-82879
Checks: C-5769r299742_chk
If the Mainframe Product employs an external security manager (ESM) for all account management functions, this is not applicable. Examine user account management configurations. If the Mainframe Product account management configuration does not enforce 24 hours/1 day as the minimum password lifetime, this is a finding.
Fix: F-5769r299743_fix
Configure the Mainframe Product account management to enforce 24 hours/1 day as the minimum password lifetime.
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- SRG-APP-000174-MFP-000236
- Vuln IDs
-
- V-205504
- V-68391
- Rule IDs
-
- SV-205504r982301_rule
- SV-82881
Checks: C-5770r299745_chk
If the Mainframe Product employs an external security manager (ESM) for all account management functions, this is not applicable. Examine user account management configurations. If the Mainframe Product account management configuration does not enforce a 60-day maximum password lifetime restriction, this is a finding.
Fix: F-5770r299746_fix
Configure the Mainframe Product account management settings to enforce a 60-day maximum password lifetime restriction.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000185
- Version
- SRG-APP-000175-MFP-000242
- Vuln IDs
-
- V-205505
- V-68399
- Rule IDs
-
- SV-205505r961038_rule
- SV-82889
Checks: C-5771r299748_chk
If the Mainframe Product uses an external security manager (ESM) for all account management, this is not applicable. Examine user account management configurations. If the Mainframe Product account management is not configured to validate certificates by constructing a certification path (which includes status information) to an accepted trust anchor when using PKI-based authentication, this is a finding.
Fix: F-5771r299749_fix
Configure the Mainframe Product account management settings to validate certificates by constructing a certification path (which includes status information) to an accepted trust anchor when using PKI-based authentication.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000186
- Version
- SRG-APP-000176-MFP-000243
- Vuln IDs
-
- V-205506
- V-68401
- Rule IDs
-
- SV-205506r961041_rule
- SV-82891
Checks: C-5772r299751_chk
If the Mainframe Product employs an external security manager (ESM) for all account management functions, this is not applicable. Examine user account management configurations. If the Mainframe Product account management configurations do not enforce authorized access to the corresponding private key when using PKI-based authentication, this is a finding.
Fix: F-5772r299752_fix
Configure the Mainframe Product account management settings to enforce authorized access to the corresponding private key when using PKI-based authentication.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000187
- Version
- SRG-APP-000177-MFP-000244
- Vuln IDs
-
- V-205507
- V-68403
- Rule IDs
-
- SV-205507r961044_rule
- SV-82893
Checks: C-5773r299754_chk
If the Mainframe Product has no function or capability for user logon, this is not applicable. If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine user account configurations. If the Mainframe Product is not configured to map the authenticated identity to the individual user or group account for PKI-based authentication, this is a finding.
Fix: F-5773r299755_fix
Configure the Mainframe Product account management settings to map the authenticated identity to the individual user or group account for PKI-based authentication.
- RMF Control
- IA-6
- Severity
- M
- CCI
- CCI-000206
- Version
- SRG-APP-000178-MFP-000246
- Vuln IDs
-
- V-205508
- V-68405
- Rule IDs
-
- SV-205508r961047_rule
- SV-82895
Checks: C-5774r299757_chk
If the Mainframe Product has no function or capability for user logon, this is not applicable. If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine Mainframe Product installation settings; examine user account configurations. If the Mainframe Product is not configured to obscure feedback of authentication information during the authentication process, this is a finding.
Fix: F-5774r299758_fix
Configure the Mainframe Product account management settings to obscure feedback of authentication information during the authentication process.
- RMF Control
- IA-7
- Severity
- M
- CCI
- CCI-000803
- Version
- SRG-APP-000179-MFP-000247
- Vuln IDs
-
- V-205509
- V-68407
- Rule IDs
-
- SV-205509r961050_rule
- SV-82897
Checks: C-5775r299760_chk
If the Mainframe Product has no function or capability for user logon, this is not applicable. If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine user account configurations. If the Mainframe Product is configured to be FIPS 140 compliant, this is not a finding.
Fix: F-5775r299761_fix
Configure the Mainframe Product account management settings to be FIPS 140 compliant.
- RMF Control
- IA-8
- Severity
- M
- CCI
- CCI-000804
- Version
- SRG-APP-000180-MFP-000248
- Vuln IDs
-
- V-205510
- V-68409
- Rule IDs
-
- SV-205510r961053_rule
- SV-82899
Checks: C-5776r299763_chk
If the Mainframe Product has no function or capability for user logon, this is not applicable. If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine installation and configuration settings. Examine user account configurations. If the Mainframe Product does not uniquely identify and authenticate non-organizational users, this is a finding.
Fix: F-5776r299764_fix
Configure the Mainframe Product account management settings to uniquely identify and authenticate non-organizational users
- RMF Control
- AU-7
- Severity
- M
- CCI
- CCI-001876
- Version
- SRG-APP-000181-MFP-000161
- Vuln IDs
-
- V-205511
- V-68275
- Rule IDs
-
- SV-205511r961056_rule
- SV-82765
Checks: C-5777r299766_chk
If the Mainframe Product does not perform audit data management or storage functions, this is not applicable. Examine installation and configuration settings. Verify the Mainframe Product audit reduction capability supports on-demand reporting. If it does not, this is a finding.
Fix: F-5777r299767_fix
Configure the Mainframe Product audit reduction capability to support on-demand reporting.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001166
- Version
- SRG-APP-000206-MFP-000277
- Vuln IDs
-
- V-205513
- V-68445
- Rule IDs
-
- SV-205513r961083_rule
- SV-82935
Checks: C-5779r299772_chk
If the Mainframe Product has no function for the use of mobile code, this is not applicable. Examine installation and configuration settings. If the Mainframe Product does not identify mobile code in the installation, this is a finding.
Fix: F-5779r299773_fix
Configure the Mainframe Product to identify mobile code in the installation.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- SRG-APP-000207-MFP-000278
- Vuln IDs
-
- V-205514
- V-68447
- Rule IDs
-
- SV-205514r961086_rule
- SV-82937
Checks: C-5780r299775_chk
If the Mainframe Product has no function for the use of mobile code, this is not applicable. Examine installation and configuration settings. If the Mainframe Product does not block and/or alert system programmers and security administrators when prohibited mobile code is identified, this is a finding.
Fix: F-5780r299776_fix
Configure the Mainframe Product to block and/or alert system programmers and security administrators when prohibited mobile code is identified.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001169
- Version
- SRG-APP-000209-MFP-000279
- Vuln IDs
-
- V-205515
- V-68449
- Rule IDs
-
- SV-205515r961089_rule
- SV-82939
Checks: C-5781r299778_chk
If the Mainframe Product has no function or capability for mobile code use, this is not applicable. Examine installation and configuration settings. If the Mainframe Product is not configured to prevent the download of prohibited mobile code, this is a finding.
Fix: F-5781r299779_fix
Configure the Mainframe Product to prevent the download of prohibited mobile code.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- SRG-APP-000210-MFP-000281
- Vuln IDs
-
- V-205516
- V-68453
- Rule IDs
-
- SV-205516r961092_rule
- SV-82943
Checks: C-5782r299781_chk
If the Mainframe Product has no function or capability for mobile code use, this is not applicable. Examine installation and configuration settings. If the Mainframe Product is not configured to prevent the automatic execution of mobile code in all applications, this is a finding.
Fix: F-5782r299782_fix
Configure the Mainframe Product to prevent the automatic execution of mobile code in all applications.
- RMF Control
- SC-2
- Severity
- M
- CCI
- CCI-001082
- Version
- SRG-APP-000211-MFP-000283
- Vuln IDs
-
- V-205517
- V-68457
- Rule IDs
-
- SV-205517r961095_rule
- SV-82947
Checks: C-5783r299784_chk
Examine installation and configuration settings. User module should be loaded into a separate dataset than system management modules. If the Mainframe Product does not differentiate user functionality from product management functionality, this is a finding.
Fix: F-5783r299785_fix
Configure the Mainframe Product to load user modules into a separate dataset than system management modules.
- RMF Control
- SC-24
- Severity
- M
- CCI
- CCI-001190
- Version
- SRG-APP-000225-MFP-000300
- Vuln IDs
-
- V-205518
- V-68459
- Rule IDs
-
- SV-205518r961122_rule
- SV-82949
Checks: C-5784r299787_chk
Examine installation and configuration settings. If the Mainframe Product is not configured to secure all processes to a secure state (i.e., not allowing access to protected privileges and procedures in the event of failure), this is a finding.
Fix: F-5784r299788_fix
Configure the Mainframe Product to secure all processes to a secure state (i.e., not allowing access to protected privileges and procedures in the event of failure).
- RMF Control
- SC-24
- Severity
- M
- CCI
- CCI-001665
- Version
- SRG-APP-000226-MFP-000301
- Vuln IDs
-
- V-205519
- V-68461
- Rule IDs
-
- SV-205519r961125_rule
- SV-82951
Checks: C-5785r299790_chk
Examine installation and configuration settings. If the Mainframe Product is not configured to preserve information necessary to determine cause of failure and to assist in the return to normal operation, this is a finding.
Fix: F-5785r299791_fix
Configure the Mainframe Product to preserve information necessary to determine cause of failure and to assist in the return to normal operation.
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-001199
- Version
- SRG-APP-000231-MFP-000302
- Vuln IDs
-
- V-205520
- V-68463
- Rule IDs
-
- SV-205520r961128_rule
- SV-82953
Checks: C-5786r299793_chk
Examine installation and configuration settings. Verify that the Mainframe Product identifies product system-related files and user files for dataset/resource protection. If the Mainframe Product is not configured to protect product system and user files for dataset/resources from unauthorized access, this is a finding. If an external security manager (ESM) is in use, examine ESM configuration and rules. If the configuration and rules do not protect product system-related files and user files for dataset resources from unauthorized access, this is a finding.
Fix: F-5786r539609_fix
Configure the Mainframe Product to protect the product system and user files for dataset/resources from unauthorized access in accordance with applicable access control policies. This can be accomplished using an ESM. Configure the ESM to restrict access to authorized users only in accordance with applicable access control policies.
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- SRG-APP-000233-MFP-000305
- Vuln IDs
-
- V-205521
- V-68469
- Rule IDs
-
- SV-205521r961131_rule
- SV-82959
Checks: C-5787r299796_chk
Examine installation and configuration settings. Security modules should be loaded into different datasets than nonsecurity modules. If the Mainframe Product does not differentiate between security and nonsecurity functions and provide procedure to isolate the functions, this is a finding.
Fix: F-5787r299797_fix
Configure the Mainframe Product to load security modules into a separate dataset than nonsecurity modules.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001682
- Version
- SRG-APP-000234-MFP-000037
- Vuln IDs
-
- V-205522
- V-68133
- Rule IDs
-
- SV-205522r971528_rule
- SV-82623
Checks: C-5788r299799_chk
If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine account management settings. If emergency accounts are configured to never be automatically removed or disabled, this is not a finding.
Fix: F-5788r299800_fix
Configure the Mainframe Product account management settings to never automatically remove or disable emergency accounts. Accounts should be configured to terminate within 72 hours or until crisis has passed.
- RMF Control
- SI-10
- Severity
- M
- CCI
- CCI-001310
- Version
- SRG-APP-000251-MFP-000328
- Vuln IDs
-
- V-205523
- V-68473
- Rule IDs
-
- SV-205523r961158_rule
- SV-82963
Checks: C-5789r299802_chk
If the Mainframe Product has no function or capability for user/data input, this is not applicable. Examine installation and configuration settings. If the Mainframe Product is not configured to validate input, this is a finding.
Fix: F-5789r299803_fix
Configure the Mainframe Product to validate input.
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- SRG-APP-000266-MFP-000334
- Vuln IDs
-
- V-205524
- V-68477
- Rule IDs
-
- SV-205524r961167_rule
- SV-82967
Checks: C-5790r299805_chk
Examine product documentation and code. If error messages do not limit information provided to only that which is necessary for corrective actions, this is a finding.
Fix: F-5790r299806_fix
Configure the Mainframe Product to limit information provided to only that which is necessary for corrective actions.
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001314
- Version
- SRG-APP-000267-MFP-000335
- Vuln IDs
-
- V-205525
- V-68479
- Rule IDs
-
- SV-205525r961170_rule
- SV-82969
Checks: C-5791r299808_chk
Examine product documentation and code. If full text detailed error message are not restricted to system programmers and/or security administrators, this is a finding.
Fix: F-5791r299809_fix
Configure the Mainframe Product to restrict full text detailed error message to system programmers and/or security administrators only.
- RMF Control
- Severity
- M
- CCI
- CCI-004964
- Version
- SRG-APP-000272-MFP-000347
- Vuln IDs
-
- V-205526
- V-68487
- Rule IDs
-
- SV-205526r982305_rule
- SV-82977
Checks: C-5792r982303_chk
If the Mainframe Product has no function or capability for providing malicious code scanning or protection, this is not applicable. Refer to organizational configuration management policy. Examine installation and configuration settings. If the Mainframe Product is not configured to receive automatic updates using organizational-defined configuration management policy, this is a finding.
Fix: F-5792r982304_fix
Configure the Mainframe Product to install new releases using organizational configuration management policy.
- RMF Control
- SI-6
- Severity
- M
- CCI
- CCI-001294
- Version
- SRG-APP-000275-MFP-000372
- Vuln IDs
-
- V-205527
- V-68497
- Rule IDs
-
- SV-205527r961185_rule
- SV-82987
Checks: C-5793r299814_chk
Review Mainframe Product Installation instructions and settings. If the Mainframe Product does not provide a message to the system programmer and security administrator to notify of failed security verification tests, this is a finding.
Fix: F-5793r299815_fix
Configure the Mainframe Product to notify the system programmer and security administrator of failed security verification tests.
- RMF Control
- Severity
- M
- CCI
- CCI-004965
- Version
- SRG-APP-000276-MFP-000353
- Vuln IDs
-
- V-205528
- V-68489
- Rule IDs
-
- SV-205528r982308_rule
- SV-82979
Checks: C-5794r982306_chk
If the Mainframe Product has no function or capability for providing malicious code scanning or protection, this is not applicable. Refer to organizational configuration management procedures. Examine installation and configuration settings. If the Mainframe Product is not configured to install new releases using organizational-defined configuration management procedure, this is a finding.
Fix: F-5794r982307_fix
Configure the Mainframe Product to install new releases using organizational configuration management procedures.
- RMF Control
- SI-3
- Severity
- M
- CCI
- CCI-001241
- Version
- SRG-APP-000277-MFP-000354
- Vuln IDs
-
- V-205529
- V-68491
- Rule IDs
-
- SV-205529r961191_rule
- SV-82981
Checks: C-5795r299820_chk
If the Mainframe Product has no function or capability for providing malicious code scanning or protection, this is not applicable. Examine installation and configuration settings. If the Mainframe Product is not configured to perform periodic scans of information system every seven days, this is a finding.
Fix: F-5795r299821_fix
Configure the Mainframe Product to perform periodic scans of information system every seven days.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001496
- Version
- SRG-APP-000290-MFP-000182
- Vuln IDs
-
- V-205530
- V-68303
- Rule IDs
-
- SV-205530r961206_rule
- SV-82793
Checks: C-5796r299823_chk
If the Mainframe Product does not perform audit data management or storage functions, this is not applicable. Examine the Mainframe Product Installation settings. If the Mainframe Product does not use cryptographic mechanisms to protect the integrity of audit tools, this is a finding.
Fix: F-5796r299824_fix
Configure the Mainframe Product to use cryptographic mechanisms to protect the integrity of audit tools.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000015
- Version
- SRG-APP-000291-MFP-000043
- Vuln IDs
-
- V-205531
- V-68145
- Rule IDs
-
- SV-205531r982309_rule
- SV-82635
Checks: C-5797r299826_chk
If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine account management settings. If the Mainframe Product does not notify system programmers and security administrators when accounts are created, this is a finding.
Fix: F-5797r299827_fix
Configure the Mainframe Product account management settings to notify system programmers and security administrators when accounts are created.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000015
- Version
- SRG-APP-000292-MFP-000044
- Vuln IDs
-
- V-205532
- V-68147
- Rule IDs
-
- SV-205532r982310_rule
- SV-82637
Checks: C-5798r299829_chk
If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine account management settings. If the Mainframe Product does not notify system programmers and security administrators when accounts are modified, this is a finding.
Fix: F-5798r299830_fix
Configure the Mainframe Product account management settings to notify system programmers and security administrators when accounts are modified.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000015
- Version
- SRG-APP-000293-MFP-000045
- Vuln IDs
-
- V-205533
- V-68149
- Rule IDs
-
- SV-205533r982311_rule
- SV-82639
Checks: C-5799r299832_chk
If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine account management settings. If the Mainframe Product does not notify System programmers and security administrators of account disabling actions, this is a finding.
Fix: F-5799r299833_fix
Configure the Mainframe Product account management settings to notify system programmers and security administrators when there are account disabling actions performed.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000015
- Version
- SRG-APP-000294-MFP-000046
- Vuln IDs
-
- V-205534
- V-68151
- Rule IDs
-
- SV-205534r982312_rule
- SV-82641
Checks: C-5800r299835_chk
If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine account management settings. If the Mainframe Product does not notify system programmers and security administrators of account removal actions, this is a finding.
Fix: F-5800r299836_fix
Configure the Mainframe Product account management settings to notify system programmers and security administrators when there are account removal actions performed.
- RMF Control
- AC-12
- Severity
- M
- CCI
- CCI-002361
- Version
- SRG-APP-000295-MFP-000006
- Vuln IDs
-
- V-205535
- V-68117
- Rule IDs
-
- SV-205535r961221_rule
- SV-82607
Checks: C-5801r299838_chk
If the Mainframe Product has no data screen capability, this requirement is not applicable. Determine whether the Mainframe Product has capability to terminate user sessions according to conditions as defined in site security plan and triggers. If it cannot, this is a finding. Examine Configuration settings to determine whether the Mainframe Product is configured to automatically terminate sessions. If it is not, this is a finding.
Fix: F-5801r299839_fix
Configure the Mainframe Product to automatically terminate a user session after any conditions as defined in site security plan or trigger requiring disconnect.
- RMF Control
- AC-12
- Severity
- M
- CCI
- CCI-002363
- Version
- SRG-APP-000296-MFP-000007
- Vuln IDs
-
- V-205536
- V-68119
- Rule IDs
-
- SV-205536r961224_rule
- SV-82609
Checks: C-5802r299841_chk
If the Mainframe Product has no logon capability, this requirement is not applicable. If the Mainframe Product does not provide a logout capability for user initiated communication sessions, this is a finding. Examine the Mainframe Product configuration settings to determine whether a user can logoff. If the configurations are not properly set, this is a finding.
Fix: F-5802r299842_fix
Configure the Mainframe Product settings to provide capability of user-initiated logoff.
- RMF Control
- AC-12
- Severity
- M
- CCI
- CCI-002364
- Version
- SRG-APP-000297-MFP-000008
- Vuln IDs
-
- V-205537
- V-68121
- Rule IDs
-
- SV-205537r961227_rule
- SV-82611
Checks: C-5803r299844_chk
If the Mainframe Product has no logon capability, this requirement is not applicable. Examine the Mainframe Product configuration settings to determine whether the Mainframe Product displays an explicit logoff message. If it does not, this is a finding
Fix: F-5803r299845_fix
Configure the Mainframe Product to display a specific logoff message.
- RMF Control
- AC-16
- Severity
- M
- CCI
- CCI-002262
- Version
- SRG-APP-000311-MFP-000025
- Vuln IDs
-
- V-205538
- V-68123
- Rule IDs
-
- SV-205538r961269_rule
- SV-82613
Checks: C-5804r299847_chk
If the Mainframe Product does not perform data management or storage function this is not applicable. Examine installation and configuration settings and / or specific meta-data for security attributes as defined by the organization. If there is no data labeling or tagging, this is a finding.
Fix: F-5804r299848_fix
Configure the Mainframe Product to associate organization-defined security attributes to managed data sets in storage. Verify the datasets attributes are labeled and/or tagged appropriately.
- RMF Control
- AC-16
- Severity
- M
- CCI
- CCI-002263
- Version
- SRG-APP-000313-MFP-000026
- Vuln IDs
-
- V-205539
- V-68125
- Rule IDs
-
- SV-205539r961272_rule
- SV-82615
Checks: C-5805r299850_chk
If the Mainframe Product does not perform data management or storage function this is not applicable. Examine installation and configuration settings and / or specific meta-data for individual types of security attributes as defined by the organization. If there is no specific data labeling or tagging, this is a finding.
Fix: F-5805r299851_fix
Configure the Mainframe Product to associate organization-defined security attributes to managed data sets in process. Verify the datasets attributes are labeled and/or tagged appropriately.
- RMF Control
- Severity
- M
- CCI
- CCI-004045
- Version
- SRG-APP-000317-MFP-000034
- Vuln IDs
-
- V-205540
- V-68129
- Rule IDs
-
- SV-205540r982313_rule
- SV-82619
Checks: C-5806r299853_chk
If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine account management settings. If Shared/group credentials are not terminated when members leave the group, this is a finding.
Fix: F-5806r299854_fix
Configure the Mainframe Product account management settings to terminate shared/group account credentials when members leave the group.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-002130
- Version
- SRG-APP-000319-MFP-000047
- Vuln IDs
-
- V-205541
- V-68153
- Rule IDs
-
- SV-205541r961290_rule
- SV-82643
Checks: C-5807r299856_chk
If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine account management settings. If the Mainframe Product does not automatically audit account creation, this is a finding.
Fix: F-5807r299857_fix
Configure the Mainframe Product account management settings to automatically audit account enabling actions.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000015
- Version
- SRG-APP-000320-MFP-000048
- Vuln IDs
-
- V-205542
- V-68157
- Rule IDs
-
- SV-205542r982314_rule
- SV-82647
Checks: C-5808r299859_chk
If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine account management settings. If the Mainframe Product does not notify system programmers and security administrators of account enabling actions, this is a finding.
Fix: F-5808r299860_fix
Configure the Mainframe Product account management settings to notify system programmers and security administrators of account enabling actions.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002165
- Version
- SRG-APP-000328-MFP-000061
- Vuln IDs
-
- V-205543
- V-68163
- Rule IDs
-
- SV-205543r961317_rule
- SV-82653
Checks: C-5809r299862_chk
Examine installation, configuration, and product documentation. If the Mainframe Product does not enforce organization-defined discretionary access control policies over defined subjects and objects, this is a finding.
Fix: F-5809r299863_fix
If necessary, configure the Mainframe Product installation and configuration settings to enforce organization-defined discretionary access control policies over defined subjects and objects.
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- SRG-APP-000340-MFP-000088
- Vuln IDs
-
- V-205544
- V-68169
- Rule IDs
-
- SV-205544r961353_rule
- SV-82659
Checks: C-5810r299865_chk
Examine installation and configuration settings. Determine the Mainframe Product privileged functions. If the Mainframe Product uses an external security manager (ESM) for access authorizations, verify the ESM prevents access to privileged functions to appropriate privileged users. If it does not, this is a finding. If the Mainframe Product does not use an ESM to verify installation and configuration settings to prevent access to privileged functions to appropriate privileged users, this is a finding.
Fix: F-5810r299866_fix
Configure the Mainframe Product to prevent non-privileged users from executing privileged functions. This can be accomplished using the ESM. Configure the ESM to restrict update and higher access to privileged functions to privileged users.
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002233
- Version
- SRG-APP-000342-MFP-000090
- Vuln IDs
-
- V-205545
- V-68171
- Rule IDs
-
- SV-205545r961359_rule
- SV-82661
Checks: C-5811r299868_chk
Examine installation and configuration settings. Determine that the Mainframe Product identifies functions requiring elevated privileges. If the Mainframe Product uses an external security manager ensure that execution uses authority of the initiating user rather than that of the Mainframe Product. If it does not, this is a finding. The Mainframe Product does not use an external security manager ensure installation and configuration settings use the authority of the initiating user rather than that of the Mainframe Product. If it does not, this is a finding.
Fix: F-5811r299869_fix
Using information from the Mainframe Product about privileged function, configure the external security manager to enforce submitting jobs on behalf of another user parameters.
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002234
- Version
- SRG-APP-000343-MFP-000091
- Vuln IDs
-
- V-205546
- V-68173
- Rule IDs
-
- SV-205546r961362_rule
- SV-82663
Checks: C-5812r299871_chk
Examine installation and configuration settings. Verify the Mainframe Product provides logging for execution of privileged functions through use of SMF, the SYSLOG, the external security management software log, or to some other reliable log file. If it does not, this is a finding.
Fix: F-5812r299872_fix
Configure the Mainframe Product to log the execution of privileged functions using the external security manager, SMF, and/or the SYSLOG.
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-002238
- Version
- SRG-APP-000345-MFP-000094
- Vuln IDs
-
- V-205547
- V-68177
- Rule IDs
-
- SV-205547r961368_rule
- SV-82667
Checks: C-5813r299874_chk
If the Mainframe Product has no function or capability for user logon, this is not applicable. If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine Mainframe Product configuration settings. Verify that the Mainframe Product account management setting automatically locks the account until the locked account is released by an administrator when three unsuccessful logon attempts in 15 minutes are exceeded. If it does not, this is a finding.
Fix: F-5813r299875_fix
Configure the Mainframe Product account management settings to automatically lock the account until the locked account is released by an administrator when three unsuccessful logon attempts in 15 minutes are exceeded.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001849
- Version
- SRG-APP-000357-MFP-000148
- Vuln IDs
-
- V-205553
- V-68257
- Rule IDs
-
- SV-205553r961392_rule
- SV-82747
Checks: C-5819r299886_chk
If the Mainframe Product uses MVS System Management Facility (SMF) recording or ESM log files for auditing purposes, this is not applicable. Examine the Mainframe Product installation and configuration auditing settings. If the installation and/or configuration setting for auditing do not allocate audit record storage capacity in accordance with organization-defined audit record storage requirements, this is a finding.
Fix: F-5819r299887_fix
Configure installation and/or configuration auditing settings to allocate audit record storage capacity in accordance with organization-defined audit record storage requirements.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- SRG-APP-000358-MFP-000149
- Vuln IDs
-
- V-205554
- V-68259
- Rule IDs
-
- SV-205554r961395_rule
- SV-82749
Checks: C-5820r299889_chk
If the Mainframe Product uses MVS System Management Facility (SMF) recording or external security manager (ESM) log files for auditing purposes, this is not applicable. Examine the Mainframe Product installation and configuration auditing settings. If the installation and/or configuration setting for auditing do not require the off-loading of audit records onto a different system or media than the system being audited, this is a finding.
Fix: F-5820r299890_fix
Configure the Mainframe Product installation and/or configurations settings to off-load audit records onto a different system or media than the system being audited.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-001855
- Version
- SRG-APP-000359-MFP-000151
- Vuln IDs
-
- V-205555
- V-68261
- Rule IDs
-
- SV-205555r961398_rule
- SV-82751
Checks: C-5821r299892_chk
If the Mainframe Product uses MVS System Management Facility (SMF) recording or external security manager (ESM) log files for auditing purposes, this is not applicable. Examine the Mainframe Product installation and configuration auditing settings. If the installation and/or configuration setting for auditing do not provide an immediate warning to the system programmer and security administrator (at a minimum) when allocated audit record storage volume reaches 75 percent of repository maximum audit record storage capacity, this is a finding.
Fix: F-5821r539587_fix
Configure the Mainframe Product installation and configuration settings for auditing to provide an immediate warning to the system programmer and security administrator (at a minimum) when allocated audit record storage volume reaches 75 percent of repository maximum audit record storage capacity.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-001858
- Version
- SRG-APP-000360-MFP-000152
- Vuln IDs
-
- V-205556
- V-68263
- Rule IDs
-
- SV-205556r961401_rule
- SV-82753
Checks: C-5822r299895_chk
If the Mainframe Product does not perform audit data management or storage function, this is not applicable. Examine configuration settings. If the Mainframe Product does not provide for immediate real-time alerts to operations staff, system programmers, and/or security administrators for audit failures requiring real-time alerts, this is a finding.
Fix: F-5822r299896_fix
Configure the Mainframe Product to provide for immediate real-time alerts to operations staff, system programmers, and/or security administrators for audit failures requiring real-time alerts.
- RMF Control
- AU-7
- Severity
- M
- CCI
- CCI-001875
- Version
- SRG-APP-000364-MFP-000160
- Vuln IDs
-
- V-205557
- V-68273
- Rule IDs
-
- SV-205557r961413_rule
- SV-82763
Checks: C-5823r299898_chk
If the Mainframe Product does not perform audit data management or storage functions, this is not applicable. Examine installation and configuration settings. Verify the Mainframe Product audit reduction capability supports on-demand review and analysis. If it does not, this is a finding.
Fix: F-5823r299899_fix
Configure the Mainframe Product audit reduction capability to support on-demand review and analysis.
- RMF Control
- AU-7
- Severity
- M
- CCI
- CCI-001877
- Version
- SRG-APP-000365-MFP-000162
- Vuln IDs
-
- V-205558
- V-68277
- Rule IDs
-
- SV-205558r961416_rule
- SV-82767
Checks: C-5824r299901_chk
If the Mainframe Product does not perform audit data management or storage function this is not applicable. Examine installation and configuration settings. Verify the Mainframe Product audit reduction capability supports after-the-fact investigations of security incidents. If it does not, this is a finding.
Fix: F-5824r299902_fix
Configure the Mainframe Product audit reduction capability to support after-the-fact investigations of security incidents.
- RMF Control
- AU-7
- Severity
- M
- CCI
- CCI-001878
- Version
- SRG-APP-000366-MFP-000163
- Vuln IDs
-
- V-205559
- V-68279
- Rule IDs
-
- SV-205559r961419_rule
- SV-82769
Checks: C-5825r299904_chk
If the Mainframe Product does not perform audit data management or storage function, this is not applicable. Examine installation and configuration settings. Verify the Mainframe Product audit report generations support on-demand review and analysis. If it does not, this is a finding.
Fix: F-5825r299905_fix
Configure the Mainframe Product audit report generations to support on-demand review and analysis.
- RMF Control
- AU-7
- Severity
- M
- CCI
- CCI-001879
- Version
- SRG-APP-000367-MFP-000164
- Vuln IDs
-
- V-205560
- V-68281
- Rule IDs
-
- SV-205560r961422_rule
- SV-82771
Checks: C-5826r299907_chk
If the Mainframe Product does not perform audit data management or storage function, this is not applicable. Examine installation and configuration settings. Verify the Mainframe Product report generation capability supports on-demand reporting. If it does not, this is a finding.
Fix: F-5826r299908_fix
Configure the Mainframe Product report generation capability to support on-demand reporting.
- RMF Control
- AU-7
- Severity
- M
- CCI
- CCI-001880
- Version
- SRG-APP-000368-MFP-000165
- Vuln IDs
-
- V-205561
- V-68283
- Rule IDs
-
- SV-205561r961425_rule
- SV-82773
Checks: C-5827r299910_chk
If the Mainframe Product does not perform audit data management or storage function, this is not applicable. Examine installation and configuration settings. Verify the Mainframe Product report generation capability supports after-the-fact investigations of security incidents. If it does not, this is a finding.
Fix: F-5827r299911_fix
Configure the Mainframe Product report generation capability to support after-the-fact investigations of security incidents.
- RMF Control
- AU-7
- Severity
- M
- CCI
- CCI-001881
- Version
- SRG-APP-000369-MFP-000166
- Vuln IDs
-
- V-205562
- V-68285
- Rule IDs
-
- SV-205562r961428_rule
- SV-82775
Checks: C-5828r299913_chk
If the Mainframe Product does not perform audit data management or storage function, this is not applicable. Examine installation and configuration settings. Verify the Mainframe Product audit reduction capability does not alter original content or time ordering of audit records. If it does, this is a finding.
Fix: F-5828r299914_fix
Configure the Mainframe Product audit reduction capability to not alter original content or time ordering of audit records.
- RMF Control
- AU-7
- Severity
- M
- CCI
- CCI-001882
- Version
- SRG-APP-000370-MFP-000167
- Vuln IDs
-
- V-205563
- V-68287
- Rule IDs
-
- SV-205563r961431_rule
- SV-82777
Checks: C-5829r299916_chk
If the Mainframe Product does not perform audit data management or storage function, this is not applicable. Examine installation and configuration settings. Verify the Mainframe Product report generation does not alter original content or time ordering of audit records. If it does, this is a finding.
Fix: F-5829r299917_fix
Configure the Mainframe Product report generation to not alter original content or time ordering of audit records.
- RMF Control
- Severity
- M
- CCI
- CCI-003980
- Version
- SRG-APP-000378-MFP-000185
- Vuln IDs
-
- V-205564
- V-68305
- Rule IDs
-
- SV-205564r982316_rule
- SV-82795
Checks: C-5830r299919_chk
Examine installation and configuration settings for change management. If the Mainframe Product does not identify installation privilege roles and prohibit user installation of software without explicit privileged status, this is a finding. If the Mainframe Product uses an external security manager (ESM) and there are no rules for the identified roles and access is not restricted to appropriate privileged users according to site security plan, this is a finding.
Fix: F-5830r851328_fix
Configure the Mainframe Product to prohibit user installation of software without explicit privileged status. If the Mainframe Product uses an ESM, configure the ESM to include rules for installation of software-privileged roles. Configure the roles to restrict access for software installation to the user with privilege status.
- RMF Control
- CM-3
- Severity
- M
- CCI
- CCI-001744
- Version
- SRG-APP-000379-MFP-000186
- Vuln IDs
-
- V-205565
- V-68307
- Rule IDs
-
- SV-205565r961458_rule
- SV-82797
Checks: C-5831r299922_chk
Examine Installation configuration settings. If the Mainframe Product does not implement organization-defined automated security responses if baseline configurations are changed in an unauthorized manner, this is a finding.
Fix: F-5831r299923_fix
Configure installation and/or configuration auditing settings to implement organization-defined automated security responses if baseline configurations are changed in an unauthorized manner.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001813
- Version
- SRG-APP-000380-MFP-000187
- Vuln IDs
-
- V-205566
- V-68309
- Rule IDs
-
- SV-205566r961461_rule
- SV-82799
Checks: C-5832r299925_chk
Examine Configuration settings. Examine organization change management policies. If the Mainframe Product does not enforce access restriction associated with changes to the application in accordance with change management policies, this is a finding. If the Mainframe Product uses an external security manager (ESM), examine rules for change management access. If there are no rules for this access or access is not restricted to users in accordance with change management policies, this is a finding.
Fix: F-5832r851331_fix
Configure Mainframe Product change management settings to enforce access restrictions associated with changes to application configuration to appropriate users according to organizational change policies. If the Mainframe Product uses an ESM, configure rules to restrict access associated with application configuration change to appropriate users according to organizational change policies.
- RMF Control
- Severity
- M
- CCI
- CCI-003938
- Version
- SRG-APP-000381-MFP-000188
- Vuln IDs
-
- V-205567
- V-68311
- Rule IDs
-
- SV-205567r982317_rule
- SV-82801
Checks: C-5833r299928_chk
Examine Configuration settings. Examine organization change management policies. If the Mainframe Product does not audit the enforcement actions used to access restriction associated with changes to the application in accordance with change management policies using System Management Facility (SMF) or an external security manager audit, this is a finding.
Fix: F-5833r299929_fix
Configure Mainframe Product change management settings to audit the enforcement actions used to restrict access associated with changes to application configuration to appropriate users according to organizational change policies.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001953
- Version
- SRG-APP-000391-MFP-000208
- Vuln IDs
-
- V-205570
- V-68335
- Rule IDs
-
- SV-205570r961494_rule
- SV-82825
Checks: C-5836r299937_chk
If the Mainframe Product uses an external security manager for all account management, this is not applicable. Examine user account management configurations. If the Mainframe Product account management is not configured to accept PIV credentials, this is a finding.
Fix: F-5836r299938_fix
Configure the Mainframe Product account management settings to accept PIV credentials.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001954
- Version
- SRG-APP-000392-MFP-000209
- Vuln IDs
-
- V-205571
- V-68337
- Rule IDs
-
- SV-205571r961497_rule
- SV-82827
Checks: C-5837r299940_chk
If the Mainframe Product uses an external security manager (ESM) for all account management, this is not applicable. Examine user account management configurations. If the Mainframe Product account management settings are not configured to electronically verify PIV credentials, this is a finding.
Fix: F-5837r299941_fix
Configure the Mainframe Product account management settings to electronically verify PIV credentials.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-002007
- Version
- SRG-APP-000400-MFP-000241
- Vuln IDs
-
- V-205573
- V-68397
- Rule IDs
-
- SV-205573r961521_rule
- SV-82887
Checks: C-5839r299946_chk
If the Mainframe Product has no function or capability for user logon, this is not applicable. If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine user account management configurations. If the Mainframe Product is configured to prohibit the use of cached authenticators after one hour, this is not a finding.
Fix: F-5839r299947_fix
Configure the Mainframe Product account management settings to prohibit the use of cached authenticators after one hour.
- RMF Control
- IA-8
- Severity
- M
- CCI
- CCI-002009
- Version
- SRG-APP-000402-MFP-000249
- Vuln IDs
-
- V-205574
- V-68411
- Rule IDs
-
- SV-205574r961527_rule
- SV-82901
Checks: C-5840r299949_chk
If the Mainframe Product has no function or capability for user logon, this is not applicable. If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine user account configurations. If the Mainframe Product is not configured to accept PIV credentials from other federal agencies, this is a finding.
Fix: F-5840r299950_fix
Configure the Mainframe Product account management settings to accept PIV credentials from other federal agencies.
- RMF Control
- IA-8
- Severity
- M
- CCI
- CCI-002010
- Version
- SRG-APP-000403-MFP-000250
- Vuln IDs
-
- V-205575
- V-68413
- Rule IDs
-
- SV-205575r961530_rule
- SV-82903
Checks: C-5841r299952_chk
If the Mainframe Product has no function or capability for user logon, this is not applicable. If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine user account configurations. If the Mainframe Product is not configured to electronically verify PIV credentials from other federal agencies, this is a finding.
Fix: F-5841r299953_fix
Configure the Mainframe Product account management settings to electronically verify PIV credentials from other federal agencies.
- RMF Control
- Severity
- M
- CCI
- CCI-004083
- Version
- SRG-APP-000404-MFP-000251
- Vuln IDs
-
- V-205576
- V-68415
- Rule IDs
-
- SV-205576r982321_rule
- SV-82905
Checks: C-5842r299955_chk
If the Mainframe Product has no function or capability for user logon, this is not applicable. If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine user account configurations. If the Mainframe Product is not configured to accept FICAM-approved third-party credentials, this is a finding.
Fix: F-5842r299956_fix
Configure the Mainframe Product account management settings to accept FICAM-approved third-party credentials.
- RMF Control
- Severity
- M
- CCI
- CCI-004085
- Version
- SRG-APP-000405-MFP-000252
- Vuln IDs
-
- V-205577
- V-68417
- Rule IDs
-
- SV-205577r982322_rule
- SV-82907
Checks: C-5843r299958_chk
If the Mainframe Product has no function or capability for user logon, this is not applicable. If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. Examine user account configurations. If the Mainframe Product is not configured to conform to FICAM-issued profiles, this is a finding.
Fix: F-5843r299959_fix
Configure the Mainframe Product account management settings to conform to FICAM-issued profiles.
- RMF Control
- MA-4
- Severity
- M
- CCI
- CCI-002884
- Version
- SRG-APP-000409-MFP-000257
- Vuln IDs
-
- V-205578
- V-68421
- Rule IDs
-
- SV-205578r961548_rule
- SV-82911
Checks: C-5844r299961_chk
If the Mainframe Product has no function or capability for nonlocal maintenance this is not applicable. Examine installation and configuration settings. If the Mainframe Product does not audit the nonlocal maintenance and diagnostic sessions audit events defined in site security plan using external security manager files and/or SMF records, this is a finding.
Fix: F-5844r299962_fix
Configure the Mainframe Product to audit the nonlocal maintenance and diagnostic sessions audit events defined in site security plan using external security manager files and/or SMF records.
- RMF Control
- MA-4
- Severity
- M
- CCI
- CCI-002890
- Version
- SRG-APP-000411-MFP-000260
- Vuln IDs
-
- V-205579
- V-68423
- Rule IDs
-
- SV-205579r961554_rule
- SV-82913
Checks: C-5845r299964_chk
If the Mainframe Product has no function or capability for nonlocal maintenance, this is not applicable. Examine installation and configuration settings. If the Mainframe Product does not use FIPS 140 compliant modules to protect the integrity of nonlocal maintenance and diagnostic communications, this is a finding.
Fix: F-5845r299965_fix
Configure the Mainframe Product to use FIPS 140 compliant modules to protect the integrity of nonlocal maintenance and diagnostic communications.
- RMF Control
- MA-4
- Severity
- M
- CCI
- CCI-003123
- Version
- SRG-APP-000412-MFP-000261
- Vuln IDs
-
- V-205580
- V-68425
- Rule IDs
-
- SV-205580r961557_rule
- SV-82915
Checks: C-5846r299967_chk
If the Mainframe Product has no function or capability for nonlocal maintenance, this is not applicable. Examine installation and configuration settings. If the Mainframe Product does not use FIPS 140 compliant modules to protect the confidentiality of nonlocal maintenance and diagnostic communications, this is a finding.
Fix: F-5846r299968_fix
Configure the Mainframe Product to use FIPS 140 compliant modules to protect the confidentiality of nonlocal maintenance and diagnostic communications.
- RMF Control
- MA-4
- Severity
- M
- CCI
- CCI-002891
- Version
- SRG-APP-000413-MFP-000262
- Vuln IDs
-
- V-205581
- V-68427
- Rule IDs
-
- SV-205581r961560_rule
- SV-82917
Checks: C-5847r299970_chk
If the Mainframe Product has no function or capability for nonlocal maintenance, this is not applicable. Examine installation and configuration settings. If the Mainframe Product does not verify remote disconnection at the termination of nonlocal maintenance and diagnostic sessions, this is a finding.
Fix: F-5847r299971_fix
Configure the Mainframe Product to verify remote disconnection at the termination of nonlocal maintenance and diagnostic sessions.
- RMF Control
- RA-5
- Severity
- M
- CCI
- CCI-001067
- Version
- SRG-APP-000414-MFP-000265
- Vuln IDs
-
- V-205582
- V-68431
- Rule IDs
-
- SV-205582r961563_rule
- SV-82921
Checks: C-5848r299973_chk
If the Mainframe Product has no function or capability to perform vulnerability scanning function this is not applicable. Examine installation and configuration settings. If the Mainframe Product employs an external security manager for all account management functions, this is not applicable. If the Mainframe Product does not restrict privilege access to all information system infrastructure components to appropriate personnel, this is a finding.
Fix: F-5848r299974_fix
Configure the Mainframe Product account management settings to restrict privilege access to all information system infrastructure components to appropriate personnel.
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-002475
- Version
- SRG-APP-000428-MFP-000303
- Vuln IDs
-
- V-205584
- V-68465
- Rule IDs
-
- SV-205584r961599_rule
- SV-82955
Checks: C-5850r299979_chk
Examine installation and configuration settings. Review requirements for relevant organizational or site-defined information. If the Mainframe Product does not have cryptographic mechanisms implemented to prevent unauthorized modification of all information not cleared for public release at rest on system components outside of organization facilities, this is a finding.
Fix: F-5850r299980_fix
Configure the Mainframe Product to implement cryptographic mechanisms to prevent unauthorized modification of all information not cleared for public release at rest on system components outside of organization facilities.
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-002476
- Version
- SRG-APP-000429-MFP-000304
- Vuln IDs
-
- V-205585
- V-68467
- Rule IDs
-
- SV-205585r961602_rule
- SV-82957
Checks: C-5851r299982_chk
Examine installation and configuration settings. Review requirements for relevant organization or site-defined information. If the Mainframe Product does not have cryptographic mechanisms implemented to prevent unauthorized disclosure of all information not cleared for public release at rest on system components outside of organization facilities, this is a finding.
Fix: F-5851r299983_fix
Configure the Mainframe Product to implement cryptographic mechanisms to prevent unauthorized disclosure of all information not cleared for public release at rest on system components outside of organization facilities.
- RMF Control
- SC-39
- Severity
- M
- CCI
- CCI-002530
- Version
- SRG-APP-000431-MFP-000312
- Vuln IDs
-
- V-205586
- V-68471
- Rule IDs
-
- SV-205586r961608_rule
- SV-82961
Checks: C-5852r299985_chk
If the Mainframe Product has no function or capability for multi-session operation, this is not applicable. If the Mainframe Product is not configured to uniquely define and engineer each session to execute independently of any other session, this is a finding.
Fix: F-5852r299986_fix
Configure the Mainframe Product to uniquely define and engineer each session to execute independently of any other session.
- RMF Control
- SI-10
- Severity
- M
- CCI
- CCI-002754
- Version
- SRG-APP-000447-MFP-000332
- Vuln IDs
-
- V-205587
- V-68475
- Rule IDs
-
- SV-205587r961656_rule
- SV-82965
Checks: C-5853r299988_chk
If the Mainframe Product has no function or capability for user/data input, this is not applicable. Examine installation and configuration settings. If the Mainframe Product is not configured to behave in a predictable and documented manner that reflects organizational and system objectives when invalid inputs are received, this is a finding.
Fix: F-5853r299989_fix
Configure the Mainframe Product to behave in a predictable and documented manner that reflects organizational and system objectives when invalid inputs are received.
- RMF Control
- SI-16
- Severity
- M
- CCI
- CCI-002824
- Version
- SRG-APP-000450-MFP-000338
- Vuln IDs
-
- V-205588
- V-68481
- Rule IDs
-
- SV-205588r961665_rule
- SV-82971
Checks: C-5854r299991_chk
Examine installation and configuration settings. Determine if critical core programs to the operating system are identified. If the Mainframe Product does not protect critical core programs, this is a finding. If an external security manager (ESM) is in use verify that the ESM is configured and/or has rules to protect critical core programs. If it does not, this is a finding.
Fix: F-5854r851352_fix
Configure the Mainframe Product to identify critical core programs to the operating system for protection in accordance with applicable access control policies. This can be accomplished by an external security manager (ESM). Configure the ESM to restrict access to these critical core programs to appropriate users in accordance with applicable access control policies.
- RMF Control
- SI-2
- Severity
- M
- CCI
- CCI-002617
- Version
- SRG-APP-000454-MFP-000343
- Vuln IDs
-
- V-205589
- V-68483
- Rule IDs
-
- SV-205589r961677_rule
- SV-82973
Checks: C-5855r299994_chk
Examine inventory of installed software components for the Mainframe Product. If the Mainframe Product does not remove all upgraded/replaced software components that are no longer required for operation, this is a finding.
Fix: F-5855r299995_fix
Configure the Mainframe Product to remove all upgraded/replaced software components that are no longer required for operation.
- RMF Control
- SI-2
- Severity
- M
- CCI
- CCI-002605
- Version
- SRG-APP-000456-MFP-000345
- Vuln IDs
-
- V-205590
- V-68485
- Rule IDs
-
- SV-205590r961683_rule
- SV-82975
Checks: C-5856r299997_chk
Review Mainframe Product published Version release information. Review authoritative sources. If security relevant updates are not installed as required, this is a finding.
Fix: F-5856r299998_fix
Install security relevant updates as required.
- RMF Control
- SI-6
- Severity
- M
- CCI
- CCI-002696
- Version
- SRG-APP-000472-MFP-000370
- Vuln IDs
-
- V-205591
- V-68493
- Rule IDs
-
- SV-205591r961731_rule
- SV-82983
Checks: C-5857r300000_chk
Examine the installation, configuration, and product documentation. If the Mainframe Product verification of the correct operation of security functions, which may include the valid connection to an external security manager (ESM), is not performed, this is a finding.
Fix: F-5857r300001_fix
If necessary, configure the Mainframe Product configuration and installation settings to perform verification of the correct operation of security functions.
- RMF Control
- SI-6
- Severity
- M
- CCI
- CCI-002699
- Version
- SRG-APP-000473-MFP-000371
- Vuln IDs
-
- V-205592
- V-68495
- Rule IDs
-
- SV-205592r961734_rule
- SV-82985
Checks: C-5858r300003_chk
Examine the installation, configuration, and product documentation. If the Mainframe Product verification of the correct operation of security functions, which may include the valid connection to an external security manager (ESM), is not performed upon product startup/restart, or by a user with privileged access, and/or every 30 days, this is a finding.
Fix: F-5858r539613_fix
If necessary, configure the Mainframe Product configuration and installation settings to perform verification of the correct operation of security functions, which may include the valid connection to an ESM, upon product startup/restart, or by a user with privileged access, and/or every 30 days.
- RMF Control
- SI-6
- Severity
- M
- CCI
- CCI-002702
- Version
- SRG-APP-000474-MFP-000373
- Vuln IDs
-
- V-205593
- V-68499
- Rule IDs
-
- SV-205593r961737_rule
- SV-82989
Checks: C-5859r300006_chk
Examine installation and configuration setting If the Mainframe Product is not configured to shut down; and/or restart and notify system programmer and operation staff when anomalies in the operation of security functions as defined by site security plan are discovered, this is a finding.
Fix: F-5859r300007_fix
Configure the Mainframe Product to shut down; and/or restart and notify system programmer and operation staff when anomalies in the operation of the security functions as defined in site security plan are discovered.
- RMF Control
- SI-7
- Severity
- M
- CCI
- CCI-002710
- Version
- SRG-APP-000475-MFP-000374
- Vuln IDs
-
- V-205594
- V-68501
- Rule IDs
-
- SV-205594r961740_rule
- SV-82991
Checks: C-5860r300009_chk
If the Mainframe Product has no function or capability for integrity verification, this is not applicable. Examine installation and configuration settings. If the Mainframe Product is not configured to perform an integrity check of all software from vendors/sources that provide cryptographic mechanisms to enable the validation of code authenticity and integrity at startup, at transitional states as defined in site security plan or security-relevant events, or annually, this is a finding.
Fix: F-5860r539615_fix
Configure the Mainframe Product to perform an integrity check of all software from vendors/sources that provide cryptographic mechanisms to enable the validation of code authenticity and integrity at startup, at transitional states as defined in site security plan or security-relevant events, or annually.
- RMF Control
- SI-7
- Severity
- M
- CCI
- CCI-002712
- Version
- SRG-APP-000477-MFP-000376
- Vuln IDs
-
- V-205595
- V-68503
- Rule IDs
-
- SV-205595r961746_rule
- SV-82993
Checks: C-5861r300012_chk
If the Mainframe Product has no function or capability for integrity verification, this is not applicable. Examine installation and configuration settings. If the Mainframe Product is not configured to perform an integrity check of information as defined in site security plan at startup, at transitional states as defined in site security plan or security-relevant events, or annually, this is a finding.
Fix: F-5861r300013_fix
Configure the Mainframe Product to perform integrity check of inform as defined in site security plan at startup, at transitional states as defined in site security plan or security-relevant events, or annually.
- RMF Control
- SI-7
- Severity
- M
- CCI
- CCI-002715
- Version
- SRG-APP-000480-MFP-000379
- Vuln IDs
-
- V-205596
- V-68505
- Rule IDs
-
- SV-205596r961755_rule
- SV-82995
Checks: C-5862r300015_chk
If the Mainframe Product has no function or capability for integrity verification, this is not applicable. Examine installation and configuration settings. If the Mainframe Product is not configured to automatically shut down the information system, restart the information system, and/or implement security safeguards as conditions as defined in site security plan when integrity violations are discovered, this is a finding.
Fix: F-5862r300016_fix
Configure the Mainframe Product to automatically shut down the information system, restart the information system, and/or implement security safeguards as conditions as defined in site security plan when integrity violations are discovered.
- RMF Control
- SI-7
- Severity
- M
- CCI
- CCI-002723
- Version
- SRG-APP-000484-MFP-000383
- Vuln IDs
-
- V-205597
- V-68507
- Rule IDs
-
- SV-205597r961767_rule
- SV-82997
Checks: C-5863r300018_chk
If the Mainframe Product has no function or capability for integrity verification, this is not applicable. Examine installation and configuration settings. If the Mainframe Product is not configured to audit detected potential integrity violations, this is a finding.
Fix: F-5863r300019_fix
Configure the Mainframe Product to audit detected potential integrity violations.
- RMF Control
- SI-7
- Severity
- M
- CCI
- CCI-002724
- Version
- SRG-APP-000485-MFP-000384
- Vuln IDs
-
- V-205598
- V-68509
- Rule IDs
-
- SV-205598r961770_rule
- SV-82999
Checks: C-5864r300021_chk
If the Mainframe Product has no function or capability for integrity verification, this is not applicable. Examine installation and configuration settings. If the Mainframe Product is not configured to generate an audit record, alert the current user, alert personnel or roles as defined in site security plan, and/or perform other actions as defined in site security plan, this is a finding.
Fix: F-5864r300022_fix
Configure the Mainframe Product to alert the current user, alert personnel or roles as defined in site security plan, and/or perform other actions as defined in site security plan.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-002460
- Version
- SRG-APP-000488-MFP-000282
- Vuln IDs
-
- V-205599
- V-68455
- Rule IDs
-
- SV-205599r961779_rule
- SV-82945
Checks: C-5865r300024_chk
If the Mainframe Product has no function or capability for mobile code use, this is not applicable. Examine installation and configuration settings. If the Mainframe Product is not configured to prompt user for action before executing mobile code, this is a finding.
Fix: F-5865r300025_fix
Configure the Mainframe Product to prompt the user for action before executing mobile code.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000492-MFP-000117
- Vuln IDs
-
- V-205600
- V-68193
- Rule IDs
-
- SV-205600r961791_rule
- SV-82683
Checks: C-5866r300027_chk
Examine installation and configuration settings. Verify that the Mainframe Product identifies all security objects, writes to SMF, and/or uses an external security manager (ESM) to generate audit records when successful/unsuccessful attempts to access security objects. If it does not, this is a finding.
Fix: F-5866r300028_fix
Configure the Mainframe Product to write to SMF and/or provide audit SAF to call when successful/unsuccessful attempts to access security objects.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000493-MFP-000118
- Vuln IDs
-
- V-205601
- V-68195
- Rule IDs
-
- SV-205601r961794_rule
- SV-82685
Checks: C-5867r300030_chk
Examine installation and configuration settings. Verify that the Mainframe Product identifies all security levels and writes to SMF and/or uses an external security manager to generate audit records when successful/unsuccessful attempts to access security levels. If it does not, this is a finding.
Fix: F-5867r300031_fix
Configure the Mainframe Product to write to SMF and/or provide audit SAF to call when successful/unsuccessful attempts to access security levels.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000494-MFP-000119
- Vuln IDs
-
- V-205602
- V-68197
- Rule IDs
-
- SV-205602r961797_rule
- SV-82687
Checks: C-5868r300033_chk
Examine installation and configuration settings. Verify that the Mainframe Product identifies all security categories of information; writes to SMF and/or uses an external security manager to generate audit records when successful/unsuccessful attempts to access categories of information. If it does not, this is a finding.
Fix: F-5868r300034_fix
Configure the Mainframe Product to write to SMF and/or provide audit SAF to call when successful/unsuccessful attempts to access categories of information occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000495-MFP-000120
- Vuln IDs
-
- V-205603
- V-68199
- Rule IDs
-
- SV-205603r961800_rule
- SV-82689
Checks: C-5869r300036_chk
Examine installation and configuration settings. Verify that the Mainframe Product identifies all security privileges, writes to SMF, and/or uses an external security manager (ESM) to generate audit records successful/unsuccessful attempts to modify privileges occur. If it does not, this is a finding.
Fix: F-5869r300037_fix
Configure the Mainframe Product to write to SMF and/or provide audit SAF to call when successful/unsuccessful attempts to modify privileges occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000496-MFP-000121
- Vuln IDs
-
- V-205604
- V-68201
- Rule IDs
-
- SV-205604r961803_rule
- SV-82691
Checks: C-5870r300039_chk
Examine installation and configuration settings. Verify that the Mainframe Product identifies all security object; writes to SMF and/or uses an external security manager to generate audit records when successful/unsuccessful attempts to modify security objects. If it does not, this is a finding.
Fix: F-5870r300040_fix
Configure the Mainframe Product to write to SMF and/or provide audit SAF to call when successful/unsuccessful attempts to modify security objects occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000497-MFP-000122
- Vuln IDs
-
- V-205605
- V-68205
- Rule IDs
-
- SV-205605r961806_rule
- SV-82695
Checks: C-5871r300042_chk
Examine installation and configuration settings. Verify that the Mainframe Product identifies all security levels writes to SMF and/or uses an external security manager to generate audit records when successful/unsuccessful attempts to modify security levels. If it does not, this is a finding.
Fix: F-5871r300043_fix
Configure the Mainframe Product to write to SMF and/or provide audit SAF to call when successful/unsuccessful attempts to modify security levels occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000498-MFP-000123
- Vuln IDs
-
- V-205606
- V-68207
- Rule IDs
-
- SV-205606r961809_rule
- SV-82697
Checks: C-5872r300045_chk
Examine installation and configuration settings. Verify that the Mainframe Product identifies all security categories of information; writes to SMF and/or uses an external security manager to generate audit records when successful/unsuccessful attempts to modify categories of information. If it does not, this is a finding.
Fix: F-5872r300046_fix
Configure the Mainframe Product to write to SMF and/or provide audit SAF to call when successful/unsuccessful attempts to modify categories of information (e.g., classification levels) occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000499-MFP-000124
- Vuln IDs
-
- V-205607
- V-68209
- Rule IDs
-
- SV-205607r961812_rule
- SV-82699
Checks: C-5873r300048_chk
Examine installation and configuration settings. Verify that the Mainframe Product identifies privileged functions, writes to SMF, and/or uses an external security manager (ESM) to generate audit records when successful/unsuccessful attempts to delete privileges occur. If it does not, this is a finding.
Fix: F-5873r300049_fix
Configure the Mainframe Product to write to SMF and/or provide audit SAF to call when successful/unsuccessful attempts to delete privileges occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000500-MFP-000125
- Vuln IDs
-
- V-205608
- V-68211
- Rule IDs
-
- SV-205608r961815_rule
- SV-82701
Checks: C-5874r300051_chk
Examine installation and configuration settings. Verify that the Mainframe Product identifies all security levels writes to SMF and/or uses an external security manager to generate audit records when successful/unsuccessful attempts to delete security levels. If it does not, this is a finding.
Fix: F-5874r300052_fix
Configure the Mainframe Product to write to SMF and/or provide audit SAF to call when successful/unsuccessful attempts to delete security levels occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000501-MFP-000126
- Vuln IDs
-
- V-205609
- V-68213
- Rule IDs
-
- SV-205609r961818_rule
- SV-82703
Checks: C-5875r300054_chk
Examine installation and configuration settings. Verify that the Mainframe Product identifies all security object writes to SMF and/or uses an external security manager to generate audit records when successful/unsuccessful attempts to delete security objects. If it does not, this is a finding.
Fix: F-5875r300055_fix
Configure the Mainframe Product to write to SMF and/or provide audit SAF to call when successful/unsuccessful attempts to delete security objects occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000502-MFP-000127
- Vuln IDs
-
- V-205610
- V-68215
- Rule IDs
-
- SV-205610r961821_rule
- SV-82705
Checks: C-5876r300057_chk
Examine installation and configuration settings. Verify that the Mainframe Product identifies all security categories of information; writes to SMF and/or uses an external security manager to generate audit records when successful/unsuccessful attempts to delete categories of information. If it does not, this is a finding.
Fix: F-5876r300058_fix
Configure the Mainframe Product to write to SMF and/or provide audit SAF to call when successful/unsuccessful attempts to delete categories of information occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000503-MFP-000128
- Vuln IDs
-
- V-205611
- V-68217
- Rule IDs
-
- SV-205611r961824_rule
- SV-82707
Checks: C-5877r300060_chk
If the Mainframe Product does not have the function or capability for user logon, this is not applicable. Examine configuration settings. Determine if successful/unsuccessful logon attempts are audited. If they are not, this is a finding.
Fix: F-5877r300061_fix
Configure the Mainframe Product to provide audit SAF to call when successful/unsuccessful logon attempts occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000504-MFP-000129
- Vuln IDs
-
- V-205612
- V-68219
- Rule IDs
-
- SV-205612r961827_rule
- SV-82709
Checks: C-5878r300063_chk
Examine installation and configuration settings. Verify that the Mainframe Product identifies privileged functions, writes to SMF, and/or provides an SAF call to an external security manager (ESM) to generate audit records for all privilege activities or other system-level access. If it does not, this is a finding.
Fix: F-5878r300064_fix
Configure the Mainframe Product to write to SMF and/or provide audit SAF to call for privileged activities or other system-level access.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000505-MFP-000130
- Vuln IDs
-
- V-205613
- V-68221
- Rule IDs
-
- SV-205613r961830_rule
- SV-82711
Checks: C-5879r300066_chk
If the Mainframe Product has no function or capability for user access this is not applicable. Examine configuration settings. If the Mainframe Product does not identify and audit start and end times of access to the systems, this is a finding.
Fix: F-5879r300067_fix
Configure the Mainframe Product to provide audit SAF call for starting and ending time for user access to the system.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000506-MFP-000131
- Vuln IDs
-
- V-205614
- V-68223
- Rule IDs
-
- SV-205614r961833_rule
- SV-82713
Checks: C-5880r300069_chk
If the Mainframe Product has no function or capability for user logon, this is not applicable. Examine configuration settings. If the Mainframe Product does not generate audit records when concurrent logons from different workstations occur, this is a finding.
Fix: F-5880r300070_fix
Configure the Mainframe Product to provide audit SAF call when concurrent logons from different workstations occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000507-MFP-000132
- Vuln IDs
-
- V-205615
- V-68225
- Rule IDs
-
- SV-205615r961836_rule
- SV-82715
Checks: C-5881r300072_chk
Examine installation and configuration settings. Verify that the Mainframe Product identifies access to all objects; writes to SMF and/or and uses an external security manager to generate audit records for all access. If it does not, this is a finding
Fix: F-5881r300073_fix
Configure the Mainframe Product to write to SMF and/or provide audit SAF call when successful/unsuccessful accesses to objects occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000508-MFP-000133
- Vuln IDs
-
- V-205616
- V-68227
- Rule IDs
-
- SV-205616r961839_rule
- SV-82717
Checks: C-5882r300075_chk
Examine installation and configuration settings. Verify that the Mainframe Product identifies direct access to the Mainframe Product, writes to SMF, and/or uses an external security manager (ESM) to generate audit records for all direct access. If it does not, this is a finding.
Fix: F-5882r300076_fix
Configure the Mainframe Product to write to SMF and/or provide audit SAF call for all direct access to the information system.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000509-MFP-000134
- Vuln IDs
-
- V-205617
- V-68229
- Rule IDs
-
- SV-205617r961842_rule
- SV-82719
Checks: C-5883r300078_chk
If the Mainframe Product has no function or capability for account creations, this is not applicable. Examine installation and configuration settings. Verify that the Mainframe Product identifies account functions, writes to SMF, and/or uses an external security manager (ESM) to generate audit records for all account creations, modifications, disabling, and termination events. If it does not, this is a finding.
Fix: F-5883r300079_fix
Configure the Mainframe Product to write to SMF and/or provide audit SAF call for all account creations, modifications, disabling, and termination events.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000510-MFP-000135
- Vuln IDs
-
- V-205618
- V-68231
- Rule IDs
-
- SV-205618r961845_rule
- SV-82721
Checks: C-5884r300081_chk
Examine installation and configuration settings. Verify that the Mainframe Product identifies all Kernel module activities, writes to SMF, and/or uses an external security manager (ESM) to generate audit records for all kernel mode load, unload, and restart events, and for all program initiations. If it does not, this is a finding.
Fix: F-5884r300082_fix
Configure the Mainframe Product to write to SMF and/or provide audit SAF call for all kernel module load, unload, and restart events, and for all program initiations.
- RMF Control
- SC-13
- Severity
- M
- CCI
- CCI-002450
- Version
- SRG-APP-000514-MFP-000270
- Vuln IDs
-
- V-205619
- V-68435
- Rule IDs
-
- SV-205619r961857_rule
- SV-82925
Checks: C-5885r300084_chk
Examine installation and configuration settings. If the Mainframe Product does not implement FIPS 140 cryptography to provision digital signatures in accordance with applicable federal laws, Executive orders, directives, policies, regulations, and standards, this is a finding.
Fix: F-5885r300085_fix
Configure the Mainframe Product settings to implement FIPS 140 cryptography to provision digital signatures in accordance with applicable federal laws, Executive orders, directives, policies, regulations, and standards.
- RMF Control
- SC-13
- Severity
- M
- CCI
- CCI-002450
- Version
- SRG-APP-000514-MFP-000272
- Vuln IDs
-
- V-205620
- V-68437
- Rule IDs
-
- SV-205620r961857_rule
- SV-82927
Checks: C-5886r300087_chk
Examine installation and configuration settings. If the Mainframe Product does not implement FIPS 140 cryptography to generate and validate cryptographic hashes in accordance with applicable federal laws, Executive orders, directives, policies, regulations, and standards, this is a finding.
Fix: F-5886r300088_fix
Configure the Mainframe Product settings to implement FIPS 140 cryptography to generate and validate cryptographic hashes in accordance with applicable federal laws, Executive orders, directives, policies, regulations, and standards.
- RMF Control
- SC-13
- Severity
- M
- CCI
- CCI-002450
- Version
- SRG-APP-000514-MFP-000274
- Vuln IDs
-
- V-205621
- V-68439
- Rule IDs
-
- SV-205621r961857_rule
- SV-82929
Checks: C-5887r300090_chk
Examine installation and configuration settings. If the Mainframe Product does not implement FIPS 140 cryptography to protect unclassified information requiring confidentiality and cryptographic protection in accordance with applicable federal laws, Executive orders, directives, policies, regulations, and standards, this is a finding.
Fix: F-5887r539607_fix
Configure the Mainframe Product settings to implement FIPS 140 cryptography to protect unclassified information requiring confidentiality and cryptographic protection in accordance with applicable federal laws, Executive orders, directives, policies, regulations, and standards.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-MFP-000195
- Vuln IDs
-
- V-205622
- V-68321
- Rule IDs
-
- SV-205622r961863_rule
- SV-82811
Checks: C-5888r300093_chk
Refer to site security configuration policies. Refer to Mainframe Product security documentation. Examine configuration settings. If configuration settings do not adhere to site policies, this is a finding.
Fix: F-5888r300094_fix
Configure the Mainframe Product to adhere to site policies.
- RMF Control
- AU-14
- Severity
- M
- CCI
- CCI-001919
- Version
- SRG-APP-000354-MFP-000136
- Vuln IDs
-
- V-219060
- V-68233
- Rule IDs
-
- SV-219060r961863_rule
- SV-82723
Checks: C-5816r69548_chk
If the Mainframe Product has no function or capability for session operations, this is not applicable. Examine installation and configuration settings. Verify that the Mainframe Product has the capability to select user sessions for monitoring and allows system programmers and security administrators to select sessions to capture/record or view/hear in accordance with applicable access control policies. If it does not, this is a finding. If there is an external security manager (ESM) in use, verify that the ESM restricts the ability to select sessions to capture/record or view/hear in accordance with applicable access control policies to system programmers or security administrators. If it does not, this is a finding.
Fix: F-20869r859694_fix
Configure the Mainframe Product to permit authorized users to select a user session to capture/record or view/hear. If there is an ESM in use, configure ESM to restrict the ability to select sessions to capture/record or view/hear in accordance with applicable access control policies to system programmers or security administrators.
- RMF Control
- AU-14
- Severity
- M
- CCI
- CCI-001920
- Version
- SRG-APP-000355-MFP-000139
- Vuln IDs
-
- V-219061
- V-68239
- Rule IDs
-
- SV-219061r961863_rule
- SV-82729
Checks: C-20871r300099_chk
If the Mainframe Product has no function or capability for session operations, this is not applicable. Examine installation and configuration settings. If the Mainframe Product does not have the capability to remotely view/hear, in real time, all content related to an established user session from a component separate from the Mainframe Product being monitored, this a finding. If the Mainframe Product does not restrict this capability to system programmers and security administrators, this is a finding. If an external security manager (ESM) is in use, verify that the ESM restricts the capability to remotely view/hear, in real time, all content related to an established user session from a component separate from the Mainframe Product being monitored to system programmers or security administrators. If it does not, this is a finding.
Fix: F-20870r859697_fix
Configure the Mainframe Product to permit authorized users to remotely view/hear, in real time, all content related to an established user session from a component separate from the Mainframe Product being monitored. If an ESM is in use, configure rules to restrict the ability to remotely view/hear, in real time, all content related to an established user session from a component separate from the Mainframe Product being monitored to system programmers and security administrators.
- RMF Control
- SC-13
- Severity
- M
- CCI
- CCI-002450
- Version
- SRG-APP-000416-MFP-000269
- Vuln IDs
-
- V-253508
- V-68433
- Rule IDs
-
- SV-253508r962034_rule
- SV-82923
Checks: C-22045r393530_chk
If the Mainframe Product is deployed in an unclassified environment, this is not applicable. Examine installation and configuration settings. If the Mainframe Product does not implement NSA-approved cryptography to protect classified information using an external security manager (ESM), this is a finding.
Fix: F-56911r859698_fix
Configure the Mainframe Product to implement NSA-approved cryptography to protect classified information using an external security manager.
- RMF Control
- Severity
- M
- CCI
- CCI-003627
- Version
- SRG-APP-000700-MFP-000100
- Vuln IDs
-
- V-263669
- Rule IDs
-
- SV-263669r982577_rule
Checks: C-67582r982576_chk
Verify the Mainframe Product is configured to disable accounts when the accounts have expired. If the Mainframe Product is not configured to disable accounts when the accounts have expired, this is a finding.
Fix: F-67490r982324_fix
Configure the Mainframe Product to disable accounts when the accounts have expired.
- RMF Control
- Severity
- M
- CCI
- CCI-003628
- Version
- SRG-APP-000705-MFP-000110
- Vuln IDs
-
- V-263670
- Rule IDs
-
- SV-263670r982579_rule
Checks: C-67583r982578_chk
Verify the Mainframe Product is configured to disable accounts when the accounts are no longer associated to a user. If the Mainframe Product is not configured to disable accounts when the accounts are no longer associated to a user, this is a finding.
Fix: F-67491r982327_fix
Configure the Mainframe Product to disable accounts when the accounts are no longer associated to a user.
- RMF Control
- Severity
- M
- CCI
- CCI-003821
- Version
- SRG-APP-000745-MFP-000120
- Vuln IDs
-
- V-263671
- Rule IDs
-
- SV-263671r982581_rule
Checks: C-67584r982580_chk
Verify the Mainframe Product is configured to implement the capability to centrally review and analyze audit records from multiple components within the system. If the Mainframe Product is not configured to implement the capability to centrally review and analyze audit records from multiple components within the system, this is a finding.
Fix: F-67492r982330_fix
Configure the Mainframe Product to implement the capability to centrally review and analyze audit records from multiple components within the system.
- RMF Control
- Severity
- M
- CCI
- CCI-003831
- Version
- SRG-APP-000795-MFP-000130
- Vuln IDs
-
- V-263672
- Rule IDs
-
- SV-263672r982583_rule
Checks: C-67585r982582_chk
Verify the Mainframe Product is configured to alert organization-defined personnel or roles upon detection of unauthorized access, modification, or deletion of audit information. If the Mainframe Product is not configured to alert organization-defined personnel or roles upon detection of unauthorized access, modification, or deletion of audit information, this is a finding.
Fix: F-67493r982333_fix
Configure the Mainframe Product to alert organization-defined personnel or roles upon detection of unauthorized access, modification, or deletion of audit information.
- RMF Control
- Severity
- M
- CCI
- CCI-004046
- Version
- SRG-APP-000820-MFP-000170
- Vuln IDs
-
- V-263673
- Rule IDs
-
- SV-263673r982337_rule
Checks: C-67586r982335_chk
Verify the Mainframe Product is configured to implement multifactor authentication for local; network; and/or remote access to privileged accounts; and/or nonprivileged accounts such that one of the factors is provided by a device separate from the system gaining access. If the Mainframe Product is not configured to implement multifactor authentication for local; network; and/or remote access to privileged accounts; and/or nonprivileged accounts such that one of the factors is provided by a device separate from the system gaining access, this is a finding.
Fix: F-67494r982336_fix
Configure the Mainframe Product to implement multifactor authentication for local; network; and/or remote access to privileged accounts; and/or nonprivileged accounts such that one of the factors is provided by a device separate from the system gaining access.
- RMF Control
- Severity
- M
- CCI
- CCI-004047
- Version
- SRG-APP-000825-MFP-000180
- Vuln IDs
-
- V-263674
- Rule IDs
-
- SV-263674r982585_rule
Checks: C-67587r982584_chk
Verify the Mainframe Product is configured to implement multifactor authentication for local; network; and/or remote access to privileged accounts; and/or nonprivileged accounts such that the device meets organization-defined strength of mechanism requirements. If the Mainframe Product is not configured to implement multifactor authentication for local; network; and/or remote access to privileged accounts; and/or nonprivileged accounts such that the device meets organization-defined strength of mechanism requirements, this is a finding.
Fix: F-67495r982339_fix
Configure the Mainframe Product to implement multifactor authentication for local; network; and/or remote access to privileged accounts; and/or nonprivileged accounts such that the device meets organization-defined strength of mechanism requirements.
- RMF Control
- Severity
- M
- CCI
- CCI-004058
- Version
- SRG-APP-000830-MFP-000190
- Vuln IDs
-
- V-263675
- Rule IDs
-
- SV-263675r982343_rule
Checks: C-67588r982341_chk
Verify the Mainframe Product is configured to maintain a list of commonly used, expected, or compromised passwords on an organization-defined frequency. If the Mainframe Product is not configured to maintain a list of commonly used, expected, or compromised passwords on an organization-defined frequency, this is a finding.
Fix: F-67496r982342_fix
Configure the Mainframe Product to maintain a list of commonly used, expected, or compromised passwords on an organization-defined frequency.
- RMF Control
- Severity
- M
- CCI
- CCI-004059
- Version
- SRG-APP-000835-MFP-000200
- Vuln IDs
-
- V-263676
- Rule IDs
-
- SV-263676r982587_rule
Checks: C-67589r982586_chk
Verify the Mainframe Product is configured to update the list of passwords on an organization-defined frequency. If the Mainframe Product is not configured to update the list of passwords on an organization-defined frequency, this is a finding.
Fix: F-67497r982345_fix
Configure the Mainframe Product to update the list of passwords on an organization-defined frequency.
- RMF Control
- Severity
- M
- CCI
- CCI-004060
- Version
- SRG-APP-000840-MFP-000210
- Vuln IDs
-
- V-263677
- Rule IDs
-
- SV-263677r982589_rule
Checks: C-67590r982588_chk
Verify the Mainframe Product is configured to update the list of passwords when organizational passwords are suspected to have been compromised directly or indirectly. If the Mainframe Product is not configured to update the list of passwords when organizational passwords are suspected to have been compromised directly or indirectly, this is a finding.
Fix: F-67498r982348_fix
Configure the Mainframe Product to update the list of passwords when organizational passwords are suspected to have been compromised directly or indirectly.
- RMF Control
- Severity
- M
- CCI
- CCI-004061
- Version
- SRG-APP-000845-MFP-000220
- Vuln IDs
-
- V-263678
- Rule IDs
-
- SV-263678r982352_rule
Checks: C-67591r982350_chk
Verify the Mainframe Product is configured to verify when users create or update passwords, that the passwords are not found on the list of commonly-used, expected, or compromised passwords in IA-5 (1) (a). If the Mainframe Product is not configured to verify when users create or update passwords, that the passwords are not found on the list of commonly-used, expected, or compromised passwords in IA-5 (1) (a), this is a finding.
Fix: F-67499r982351_fix
Configure the Mainframe Product to verify when users create or update passwords, that the passwords are not found on the list of commonly-used, expected, or compromised passwords in IA-5 (1) (a).
- RMF Control
- Severity
- M
- CCI
- CCI-004063
- Version
- SRG-APP-000855-MFP-000240
- Vuln IDs
-
- V-263679
- Rule IDs
-
- SV-263679r982591_rule
Checks: C-67592r982590_chk
Verify the Mainframe Product is configured to require immediate selection of a new password upon account recovery. If the Mainframe Product is not configured to require immediate selection of a new password upon account recovery, this is a finding.
Fix: F-67500r982354_fix
Configure the Mainframe Product to require immediate selection of a new password upon account recovery.
- RMF Control
- Severity
- M
- CCI
- CCI-004064
- Version
- SRG-APP-000860-MFP-000250
- Vuln IDs
-
- V-263680
- Rule IDs
-
- SV-263680r982593_rule
Checks: C-67593r982592_chk
Verify the Mainframe Product is configured to allow user selection of long passwords and passphrases, including spaces and all printable characters. If the Mainframe Product is not configured to allow user selection of long passwords and passphrases, including spaces and all printable characters, this is a finding.
Fix: F-67501r982357_fix
Configure the Mainframe Product to allow user selection of long passwords and passphrases, including spaces and all printable characters.
- RMF Control
- Severity
- M
- CCI
- CCI-004065
- Version
- SRG-APP-000865-MFP-000260
- Vuln IDs
-
- V-263681
- Rule IDs
-
- SV-263681r982595_rule
Checks: C-67594r982594_chk
Verify the Mainframe Product is configured to employ automated tools to assist the user in selecting strong password authenticators. If the Mainframe Product is not configured to employ automated tools to assist the user in selecting strong password authenticators, this is a finding.
Fix: F-67502r982360_fix
Configure the Mainframe Product to employ automated tools to assist the user in selecting strong password authenticators.
- RMF Control
- Severity
- M
- CCI
- CCI-004068
- Version
- SRG-APP-000875-MFP-000280
- Vuln IDs
-
- V-263682
- Rule IDs
-
- SV-263682r982364_rule
Checks: C-67595r982362_chk
Verify the Mainframe Product is configured to implement a local cache of revocation data to support path discovery and validation. If the Mainframe Product is not configured to implement a local cache of revocation data to support path discovery and validation, this is a finding.
Fix: F-67503r982363_fix
Configure the Mainframe Product to implement a local cache of revocation data to support path discovery and validation.
- RMF Control
- Severity
- M
- CCI
- CCI-004192
- Version
- SRG-APP-000880-MFP-000290
- Vuln IDs
-
- V-263683
- Rule IDs
-
- SV-263683r982597_rule
Checks: C-67596r982596_chk
Verify the Mainframe Product is configured to protect nonlocal maintenance sessions by separating the maintenance session from other network sessions with the system by logically separated communications paths. If the Mainframe Product is not configured to protect nonlocal maintenance sessions by separating the maintenance session from other network sessions with the system by logically separated communications paths, this is a finding.
Fix: F-67504r982366_fix
Configure the Mainframe Product to protect nonlocal maintenance sessions by separating the maintenance session from other network sessions with the system by logically separated communications paths.
- RMF Control
- Severity
- M
- CCI
- CCI-004909
- Version
- SRG-APP-000910-MFP-000300
- Vuln IDs
-
- V-263684
- Rule IDs
-
- SV-263684r982599_rule
Checks: C-67597r982598_chk
Verify the Mainframe Product is configured to include only approved trust anchors in trust stores or certificate stores managed by the organization. If the Mainframe Product is not configured to include only approved trust anchors in trust stores or certificate stores managed by the organization, this is a finding.
Fix: F-67505r982369_fix
Configure the Mainframe Product to include only approved trust anchors in trust stores or certificate stores managed by the organization.
- RMF Control
- Severity
- M
- CCI
- CCI-004910
- Version
- SRG-APP-000915-MFP-000310
- Vuln IDs
-
- V-263685
- Rule IDs
-
- SV-263685r982601_rule
Checks: C-67598r982600_chk
Verify the Mainframe Product is configured to provide protected storage for cryptographic keys with organization-defined safeguards and/or hardware protected key store. If the Mainframe Product is not configured to provide protected storage for cryptographic keys with organization-defined safeguards and/or hardware protected key store, this is a finding.
Fix: F-67506r982372_fix
Configure the Mainframe Product to provide protected storage for cryptographic keys with organization-defined safeguards and/or hardware protected key store.
- RMF Control
- Severity
- M
- CCI
- CCI-004922
- Version
- SRG-APP-000920-MFP-000320
- Vuln IDs
-
- V-263686
- Rule IDs
-
- SV-263686r982603_rule
Checks: C-67599r982602_chk
Verify the Mainframe Product is configured to synchronize system clocks within and between systems or system components. If the Mainframe Product is not configured to synchronize system clocks within and between systems or system components, this is a finding.
Fix: F-67507r982375_fix
Configure the Mainframe Product to synchronize system clocks within and between systems or system components.
- RMF Control
- Severity
- M
- CCI
- CCI-004923
- Version
- SRG-APP-000925-MFP-000330
- Vuln IDs
-
- V-263687
- Rule IDs
-
- SV-263687r982605_rule
Checks: C-67600r982604_chk
Verify the Mainframe Product is configured to compare the internal system clocks on an organization-defined frequency with organization-defined authoritative time source. If the Mainframe Product is not configured to compare the internal system clocks on an organization-defined frequency with organization-defined authoritative time source, this is a finding.
Fix: F-67508r982378_fix
Configure the Mainframe Product to compare the internal system clocks on an organization-defined frequency with organization-defined authoritative time source.