STIGQter STIGQter: STIG Summary: IBM z/OS TSS Security Technical Implementation Guide Version: 8 Release: 2 Benchmark Date: 23 Apr 2021:

Unsupported IBM z/OS system software must not be installed and/or active on the system.

DISA Rule

SV-224017r561402_rule

Vulnerability Number

V-224017

Group Title

SRG-OS-000368-GPOS-00154

Rule Version

TSS0-OS-000210

Severity

CAT I

CCI(s)

Weight

10

Fix Recommendation

For all products that meet the following criteria:

- Uses authorized and restricted z/OS interfaces by utilizing Authorized Program Facility (APF) authorized modules or libraries.
- Require access to system data sets or sensitive information or requires special or privileged authority to run.

The ISSO will ensure that unsupported system software for the products in the above category is removed or upgraded prior to a vendor dropping support.

Authorized software which is NO longer supported is a CAT I – vulnerability. The customer and site will be given six months to mitigate the risk, come up with a supported solution, or obtain a formal letter approving such risk/software.

Check Contents

This check applies to all products that meet the following criteria:

- Uses authorized and restricted z/OS interfaces by utilizing Authorized Program Facility (APF) authorized modules or libraries.
- Require access to system data sets or sensitive information or requires special or privileged authority to run.

For the products in the above category refer to the Vendor’s support lifecycle information for current versions and releases.

If the software products currently running on the reviewed system are at a version greater than or equal to the products listed in the vendor’s Support Lifecycle information, this is not a finding.

Vulnerability Number

V-224017

Documentable

False

Rule Version

TSS0-OS-000210

Severity Override Guidance

This check applies to all products that meet the following criteria:

- Uses authorized and restricted z/OS interfaces by utilizing Authorized Program Facility (APF) authorized modules or libraries.
- Require access to system data sets or sensitive information or requires special or privileged authority to run.

For the products in the above category refer to the Vendor’s support lifecycle information for current versions and releases.

If the software products currently running on the reviewed system are at a version greater than or equal to the products listed in the vendor’s Support Lifecycle information, this is not a finding.

Check Content Reference

M

Target Key

4102

Comments