SV-223697r604139_rule
V-223697
SRG-OS-000063-GPOS-00032
RACF-ES-000500
CAT I
10
Configure access rules for SYS1.PARMLIB as follows:
Systems programming personnel will be authorized to WRITE or greater the SYS1.PARMLIB concatenation.
Domain level security administrators can be authorized to update the SYS1.PARMLIB concatenation.
System Level Started Tasks, authorized Data Center personnel, and auditor can be authorized read access by the ISSO.
All WRITE or greater access is logged.
Execute a dataset list of access to SYS1.PARMLIB.
If the ESM data set rules for SYS1.PARMLIB allow inappropriate (e.g., global READ) access, this is a finding.
If data set rules for SYS1.PARMLIB do not restrict READ, WRITE or greater access to only systems programming personnel, this is a finding.
If data set rules for SYS1.PARMLIB do not restrict READ and UPDATE access to only domain level security administrators, this is a finding.
If data set rules for SYS1.PARMLIB do not restrict READ access to only system Level Started Tasks, authorized Data Center personnel, and auditors, this is a finding.
If data set rules for SYS1.PARMLIB do not specify that all (i.e., failures and successes) UPDATE and/or ALTER access will be logged, this is a finding.
V-223697
False
RACF-ES-000500
Execute a dataset list of access to SYS1.PARMLIB.
If the ESM data set rules for SYS1.PARMLIB allow inappropriate (e.g., global READ) access, this is a finding.
If data set rules for SYS1.PARMLIB do not restrict READ, WRITE or greater access to only systems programming personnel, this is a finding.
If data set rules for SYS1.PARMLIB do not restrict READ and UPDATE access to only domain level security administrators, this is a finding.
If data set rules for SYS1.PARMLIB do not restrict READ access to only system Level Started Tasks, authorized Data Center personnel, and auditors, this is a finding.
If data set rules for SYS1.PARMLIB do not specify that all (i.e., failures and successes) UPDATE and/or ALTER access will be logged, this is a finding.
M
4101