STIGQter STIGQter: STIG Summary: IBM z/OS RACF Security Technical Implementation Guide Version: 8 Release: 3 Benchmark Date: 23 Apr 2021:

IBM RACF must limit WRITE or greater access to all APF-authorized libraries to system programmers only.

DISA Rule

SV-223682r604139_rule

Vulnerability Number

V-223682

Group Title

SRG-OS-000080-GPOS-00048

Rule Version

RACF-ES-000340

Severity

CAT I

CCI(s)

Weight

10

Fix Recommendation

Review access authorization to critical system files. Evaluate the impact of correcting the deficiency. Develop a plan of action and implement the changes required to protect APF Authorized Libraries.

Configure, WRITE, or greater access to all APF-authorized libraries to be limited to system programmers only and all WRITE or greater access is logged.

Check Contents

From Any ISPF input line, enter TSO ISRDDN APF.

If all of the following are untrue, this is not a finding.

If any of the following are true, this is a finding.

-The ACP data set rules for APF libraries do not restrict WRITE or greater access to only z/OS systems programming personnel.
-The ACP data set rules for APF libraries do not specify that all (i.e., failures and successes) WRITE or greater access will be logged.

Vulnerability Number

V-223682

Documentable

False

Rule Version

RACF-ES-000340

Severity Override Guidance

From Any ISPF input line, enter TSO ISRDDN APF.

If all of the following are untrue, this is not a finding.

If any of the following are true, this is a finding.

-The ACP data set rules for APF libraries do not restrict WRITE or greater access to only z/OS systems programming personnel.
-The ACP data set rules for APF libraries do not specify that all (i.e., failures and successes) WRITE or greater access will be logged.

Check Content Reference

M

Target Key

4101

Comments