SV-7542r4_rule
V-6962
ZWMQ0052
ZWMQ0052
CAT II
10
Review the following connection resources defined to the MQCONN resource class:
Resource Authorized Users
ssid.BATCH TSO and batch job ACIDs
ssid.CICS CICS region ACIDs
ssid.IMS IMS region ACIDs
ssid.CHIN Channel initiator ACIDs
NOTE: ssid is the queue manager name (a.k.a., subsystem identifier).
c) For all connection resources defined to the MQCONN resource class, ensure the following items are in effect:
1) Access authorization restricts access to the appropriate users as indicated in (b) above.
2) All access FAILUREs are logged.
The following is a sample of the commands required to allow a batch user (USER1) to connect to a queue manager (QM1):
TSS ADD(USER1) FAC(QM1MSTR)
TSS PER(USER1) MQCONN(QM1.BATCH) ACC(READ)
a) Refer to the following report produced by the TSS Data Collection:
- SENSITVE.RPT(WHOHMCON)
b) Review the following connection resources defined to the MQCONN resource class:
Resource Authorized Users
ssid.BATCH TSO and batch job ACIDs
ssid.CICS CICS region ACIDs
ssid.IMS IMS region ACIDs
ssid.CHIN Channel initiator ACIDs
NOTE: ssid is the queue manager name (a.k.a., subsystem identifier).
c) For all connection resources defined to the MQCONN resource class, ensure the following items are in effect:
1) Access authorization restricts access to the appropriate users as indicated in (b) above.
2) All access FAILUREs are logged.
d) If all of the items in (c) are true, there is NO FINDING.
e) If any item in (c) is untrue, this is a FINDING.
V-6962
False
ZWMQ0052
a) Refer to the following report produced by the TSS Data Collection:
- SENSITVE.RPT(WHOHMCON)
b) Review the following connection resources defined to the MQCONN resource class:
Resource Authorized Users
ssid.BATCH TSO and batch job ACIDs
ssid.CICS CICS region ACIDs
ssid.IMS IMS region ACIDs
ssid.CHIN Channel initiator ACIDs
NOTE: ssid is the queue manager name (a.k.a., subsystem identifier).
c) For all connection resources defined to the MQCONN resource class, ensure the following items are in effect:
1) Access authorization restricts access to the appropriate users as indicated in (b) above.
2) All access FAILUREs are logged.
d) If all of the items in (c) are true, there is NO FINDING.
e) If any item in (c) is untrue, this is a FINDING.
M
Information Assurance Officer
3599