z/OS TADz for TSS STIG

Details

Version / Release: V6R6

Published: 2016-03-23

Updated At: 2018-09-23 16:14:36

Compare/View Releases

Select any two versions of this STIG to compare the individual requirements

Select any old version/release of this STIG to view the previous requirements

Actions

Download

Filter


Findings
Severity Open Not Reviewed Not Applicable Not a Finding
Overall 0 0 0 0
Low 0 0 0 0
Medium 0 0 0 0
High 0 0 0 0
Drop CKL or SCAP (XCCDF) results here.

    Vuln Rule Version CCI Severity Title Description Status Finding Details Comments
    SV-28471r1_rule ZTADT000 CCI-000213 MEDIUM Tivoli Asset Discovery for z/OS (TADz) Install data sets are not properly protected. Tivoli Asset Discovery for z/OS (TADz) Install data sets provide the capability to use privileged functions and/or have access to sensitive data. Failure to properly restrict access to their data sets could result in violating the integrity of the base pr
    SV-28549r2_rule ZTADT001 CCI-001499 MEDIUM Tivoli Asset Discovery for zOS (TADz) STC and/or batch data sets are not properly protected. Tivoli Asset Discovery for zOS (TADz) STC and/or batch data sets provide the capability to use privileged functions and/or have access to sensitive data. Failure to properly restrict access to their data sets could result in violating the integrity of the
    SV-28555r2_rule ZTADT030 CCI-000764 MEDIUM Tivoli Asset Discovery for z/OS (TADz) Started Task name(s) must be properly identified / defined to the system ACP. Tivoli Asset Discovery for z/OS (TADz) requires a started task(s) that will be restricted to certain resources, datasets and other system functions. By defining the started task as a userid to the system Access Control Program (ACP), it allows the ACP to
    SV-28562r1_rule ZTADT032 CCI-000764 MEDIUM IBM Tivoli Asset Discovery for zOS (TADz) Started task(s) must be properly defined to the Started Task Table ACID for Top Secret. Access to product resources should be restricted to only those individuals responsible for the application connectivity and who have a requirement to access these resources. Improper control of product resources could potentially compromise the operating