SV-251r3_rule
V-251
ZCIC0020
ZCIC0020
CAT II
10
The IAO will ensure that each CICS region is associated with a unique userid and that userid is properly defined.
Develop a plan to implement the required changes.
1. Most transactions are protected in groups. An example would be "KT2" which would contain all Category 2 transactions. KT2 is defined to ACF2 as a resource and contains all the Category 2 transactions.
An example of how to implement this within ACF2 is shown here:
$KEY(CEMT) TYPE(KT2)
UID(syspaudt) ALLOW
UID(*) PREVENT
2. Transactions groups should be defined and permitted in accordance with the CICS Transaction tables listed in the z/OS STIG Addendum.
a) Refer to the following report produced by the ACF2 Data Collection and Data Set and Resource Data Collection:
- SENSITVE.RPT(TRANS)
- ACF2CMDS.RPT(RESOURCE) – Alternate report
Refer to the CICS Systems Programmer Worksheets filled out from previous vulnerability ZCIC0010..
b) Browse the data set allocated by the ACF2PARM DD statement in each CICS startup procedure. Determine the resource type for transactions. Example:
CICSKEY OPTION=VALIDATE,TYPE=resource type, RESOURCE=TRANS
c) Ensure the following items are in effect for all CICS transactions for each resource type:
NOTE: Authorized personnel include systems programming and security staffs. Additional guidance regarding authorized personnel for specific transactions is included in this z/OS STIG Addendum. For example, CEMT SPI provides a broader use of this sensitive transaction by restricting execution to inquiries.
1) Transactions, listed in tables CICS CATEGORY 2 CICS AND OTHER PRODUCT TRANSACTIONS and CICS CATEGORY 4 COTS-SUPPLIED SENSITIVE TRANSACTIONS, in the z/OS STIG Addendum, are restricted to authorized personnel.
Note: The exception to this is the CEOT and CSGM transactions, which can be made available to all users.
Note: The exception to this is the CWBA transaction, can be made available to the CICS Default user.
Note: The transactions beginning with "CK" apply to regions running WebSphere MQ.
Note: Category 1 transactions are internally restricted to CICS region userids.
d) If (c) is true for all CICS regions, there is NO FINDING.
e) If (c) is untrue for any CICS region, this is a FINDING.
V-251
False
ZCIC0020
a) Refer to the following report produced by the ACF2 Data Collection and Data Set and Resource Data Collection:
- SENSITVE.RPT(TRANS)
- ACF2CMDS.RPT(RESOURCE) – Alternate report
Refer to the CICS Systems Programmer Worksheets filled out from previous vulnerability ZCIC0010..
b) Browse the data set allocated by the ACF2PARM DD statement in each CICS startup procedure. Determine the resource type for transactions. Example:
CICSKEY OPTION=VALIDATE,TYPE=resource type, RESOURCE=TRANS
c) Ensure the following items are in effect for all CICS transactions for each resource type:
NOTE: Authorized personnel include systems programming and security staffs. Additional guidance regarding authorized personnel for specific transactions is included in this z/OS STIG Addendum. For example, CEMT SPI provides a broader use of this sensitive transaction by restricting execution to inquiries.
1) Transactions, listed in tables CICS CATEGORY 2 CICS AND OTHER PRODUCT TRANSACTIONS and CICS CATEGORY 4 COTS-SUPPLIED SENSITIVE TRANSACTIONS, in the z/OS STIG Addendum, are restricted to authorized personnel.
Note: The exception to this is the CEOT and CSGM transactions, which can be made available to all users.
Note: The exception to this is the CWBA transaction, can be made available to the CICS Default user.
Note: The transactions beginning with "CK" apply to regions running WebSphere MQ.
Note: Category 1 transactions are internally restricted to CICS region userids.
d) If (c) is true for all CICS regions, there is NO FINDING.
e) If (c) is untrue for any CICS region, this is a FINDING.
M
Information Assurance Officer
198