z/OS IBM System Display and Search Facility (SDSF) for RACF Security Technical Implementation Guide

Description

This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: [email protected]

Details

Version / Release: V6R9

Published: 2022-06-27

Updated At: 2022-08-25 11:41:25

Compare/View Releases

Select any two versions of this STIG to compare the individual requirements

Select any old version/release of this STIG to view the previous requirements

Actions

Download

Filter

Findings
Severity Open Not Reviewed Not Applicable Not a Finding
Overall 0 0 0 0
Low 0 0 0 0
Medium 0 0 0 0
High 0 0 0 0
Drop CKL or SCAP (XCCDF) results here.

    Vuln Rule Version CCI Severity Title Description Status Finding Details Comments
    SV-224504r520363_rule ZISF0040 CCI-000035 MEDIUM IBM System Display and Search Facility (SDSF) Configuration parameters must be correctly specified. IBM System Display and Search Facility (SDSF) ISFPARMS defines global options, panel formats, and security for SDSF. Failure to properly specify these parameter values could potentially compromise the integrity and availability of the MVS operating syste
    SV-224505r840215_rule ZISFR000 CCI-000213 MEDIUM IBM System Display and Search Facility (SDSF) installation data sets will be properly protected. IBM System Display and Search Facility (SDSF) installation data sets have the ability to use privileged functions and/or have access to sensitive data. Failure to properly restrict access to these data sets could result in violating the integrity of the
    SV-224506r520369_rule ZISFR002 CCI-000213 MEDIUM IBM System Display and Search Facility (SDSF) HASPINDX data set identified in the INDEX parameter must be properly protected. IBM System Display and Search Facility (SDSF) HASPINDX data set control the execution, configuration, and security of the SDSF products. Failure to properly protect access to these data sets could result in unauthorized access. This exposure may threate
    SV-224507r836687_rule ZISFR020 CCI-000035 MEDIUM IBM System Display and Search Facility (SDSF) resources will be properly defined and protected. IBM System Display and Search Facility (SDSF) can run with sensitive system privileges, and potentially can circumvent system controls. Failure to properly control access to product resources could result in the compromise of the operating system environ
    SV-224508r840217_rule ZISFR021 CCI-000035 MEDIUM IBM System Display and Search Facility (SDSF) resources will be properly defined and protected. IBM System Display and Search Facility (SDSF) can run with sensitive system privileges, and potentially can circumvent system controls. Failure to properly control access to product resources could result in the compromise of the operating system environ
    SV-224509r840220_rule ZISFR030 CCI-000764 MEDIUM IBM System Display and Search Facility (SDSF) Started Task name will be properly identified and/or defined to the system ACP. IBM System Display and Search Facility (SDSF) requires a started task that will be restricted to certain resources, datasets and other system functions. By defining the started task as a userid to the system ACP, It allows the ACP to control the access an
    SV-224510r840223_rule ZISFR032 CCI-000764 MEDIUM IBM System Display and Search Facility (SDSF) Started task will be properly defined to the STARTED resource class for RACF. Access to product resources should be restricted to only those individuals responsible for the application connectivity and who have a requirement to access these resources. Improper control of product resources could potentially compromise the operating
    SV-224511r840225_rule ZISFR038 CCI-000336 MEDIUM IBM System Display and Search Facility (SDSF) Resource Class will be active in the RACF. Failure to use a robust ACP to control a product could potentially compromise the integrity and availability of the MVS operating system and user data.