STIGQter STIGQter: STIG Summary: IBM z/OS ACF2 Security Technical Implementation Guide Version: 8 Release: 2 Benchmark Date: 23 Apr 2021:

CA-ACF2 NJE GSO record value must indicate validation options that apply to jobs submitted through a network job entry subsystem (JES2, JES3, RSCS).

DISA Rule

SV-223429r533198_rule

Vulnerability Number

V-223429

Group Title

SRG-OS-000080-GPOS-00048

Rule Version

ACF2-ES-000080

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure ACF2 validation options that apply to jobs submitted through a network job entry subsystem (JES2, JES3, RSCS) as follows:

DFTLID()
INHERIT
NODEMASK(-)
ENCRYPT
VALIN(YES)
NOVALOUT

NOTE: For NJE nodes that are incompatible with the XDES algorithm, discrete NJE records will be created with NOENCRYPT.

NOTE: Local changes will be justified in writing with supporting documentation.

Check Contents

From the ACF input screen enter:
SET CONTROL(GSO)
LIST LIKE(NJE-)

If the GSO NJE record values conform to the following requirements, this is not a finding.

Specifies ACF2 validation options that apply to jobs submitted through a network job entry subsystem (JES2, JES3, RSCS).

DFTLID() INHERIT NODEMASK(-) ENCRYPT VALIN(YES) NOVALOUT

NOTE: For NJE nodes that are incompatible with the XDES algorithm, discrete NJE records will be created with NOENCRYPT.
NOTE: Local changes will be documented in writing with supporting documentation.

Vulnerability Number

V-223429

Documentable

False

Rule Version

ACF2-ES-000080

Severity Override Guidance

From the ACF input screen enter:
SET CONTROL(GSO)
LIST LIKE(NJE-)

If the GSO NJE record values conform to the following requirements, this is not a finding.

Specifies ACF2 validation options that apply to jobs submitted through a network job entry subsystem (JES2, JES3, RSCS).

DFTLID() INHERIT NODEMASK(-) ENCRYPT VALIN(YES) NOVALOUT

NOTE: For NJE nodes that are incompatible with the XDES algorithm, discrete NJE records will be created with NOENCRYPT.
NOTE: Local changes will be documented in writing with supporting documentation.

Check Content Reference

M

Target Key

4100

Comments