z/OS CL/SuperSession for TSS STIG

Details

Version / Release: V6R10

Published: 2018-04-04

Updated At: 2018-09-23 19:24:37

Compare/View Releases

Select any two versions of this STIG to compare the individual requirements

Select any old version/release of this STIG to view the previous requirements

Actions

Download

Filter


Findings
Severity Open Not Reviewed Not Applicable Not a Finding
Overall 0 0 0 0
Low 0 0 0 0
Medium 0 0 0 0
High 0 0 0 0
Drop CKL or SCAP (XCCDF) results here.

    Vuln Rule Version CCI Severity Title Description Status Finding Details Comments
    SV-27092r2_rule ZCLST000 CCI-000213 MEDIUM CL/SuperSession Install data sets must be properly protected. CL/SuperSession Install data sets provide the capability to use privileged functions and/or have access to sensitive data. Failure to properly restrict access to their data sets could result in violating the integrity of the base product which could resul
    SV-27098r3_rule ZCLST001 CCI-001499 MEDIUM CL/SuperSession STC data sets must be properly protected. CL/SuperSession STC data sets provide the capability to use privileged functions and/or have access to sensitive data. Failure to properly restrict access to their data sets could result in violating the integrity of the base product which could result in
    SV-28592r1_rule ZCLST030 CCI-000764 MEDIUM CL/SuperSession Started Task name is not properly identified / defined to the system ACP. CL/SuperSession requires a started task that will be restricted to certain resources, datasets and other system functions. By defining the started task as a userid to the system ACP, It allows the ACP to control the access and authorized users that requir
    SV-27238r1_rule ZCLST032 CCI-000764 MEDIUM CL/SuperSession Started task(s) must be properly defined to the Started Task Table ACID for Top Secret. Access to product resources should be restricted to only those individuals responsible for the application connectivity and who have a requirement to access these resources. Improper control of product resources could potentially compromise the operatin
    SV-27240r1_rule ZCLST036 CCI-000764 MEDIUM CL/SuperSession is not properly defined to the Facility Matrix Table for Top Secret. Improperly defined security controls for the Product could result in the compromise of the network, operating system, and customer data.Information Assurance OfficerSystems Programmer
    SV-27190r1_rule ZCLST038 CCI-000336 MEDIUM CL/SuperSession's Resouce Class is not defined or active in the ACP. Failure to use a robust ACP to control a product could potentially compromise the integrity and availability of the MVS operating system and user data.Information Assurance OfficerInformation Assurance Manager
    SV-27197r1_rule ZCLS0040 CCI-000035 MEDIUM CL/SuperSession profile options are set improperly. Product configuration/parameters control the security and operational characteristics of products. If these parameter values are improperly specified, security and operational controls may be weakened. This exposure may threaten the availability of the
    SV-27198r1_rule ZCLS0041 CCI-000035 MEDIUM CL/SuperSession is not properly configured to generate SMF records for audit trail and accounting reports. Product configuration/parameters control the security and operational characteristics of products. If these parameter values are improperly specified, security and operational controls may be weakened. This exposure may threaten the availability of the
    SV-27258r4_rule ZCLST042 CCI-000035 MEDIUM CL/SuperSession KLVINNAM member must be configured in accordance to security requirements. CL/SuperSession configuration/parameters control the security and operational characteristics of products. If these parameter values are improperly specified, security and operational controls may be weakened. This exposure may threaten the availability
    SV-27261r1_rule ZCLST043 CCI-000035 MEDIUM CL/SuperSession APPCLASS member is not configured in accordance with the proper security requirements. Product configuration/parameters control the security and operational characteristics of products. If these parameter values are improperly specified, security and operational controls may be weakened. This exposure may threaten the availability of the