SV-7543r4_rule
V-7120
ZCIC0042
ZCIC0042
CAT II
10
Review all CICS region, default, and end-user userids to ensure they are defined and controlled as required.
Ensure that all ACIDs authorized to access a CICS facility have their OPTIME field set to 15 minutes.
Ensure that all ACIDs authorized to access a CICS facility restrict SIGNMULTI to test and development use.
Example:
TSS ADDTO(acid) OPTIME(hhmm)
TSS ADDTO(acid) FACILITY(facility) SIGNMULTI
a) Refer to the following report produced by the TSS Data Collection:
- TSSCMDS.RPT(@ACIDS)
Refer to the CICS Systems Programmer Worksheets filled out from previous vulnerability ZCIC0010.
NOTE: Note: Any ACID that does not have an OPTIME value specified will obtain its OPTIME value from the default value set in ZCIC0041. Any ACID that specifies an OPTIME value must meet the requirements specified below.
b) For all ACIDs authorized to access a CICS facility if the OPTIME field set to 15 minutes, this is not a finding.
NOTE: If the time-out limit is greater than 15 minutes, and the system is processing unclassified information, review the following items. If any of these is true, this is not a finding
If a session is not terminated, but instead is locked out after 15 minutes of inactivity, a process must be in place that requires user identification and authentication before the session is unlocked. Session lock-out will be implemented through system controls or terminal screen protection.
A system’s default time for terminal lock-out or session termination may be lengthened to 30 minutes at the discretion of the ISSM. The ISSM will maintain the documentation for each system with a time-out adjusted beyond the 15-minute recommendation to explain the basis for this decision.
The ISSM may set selected userids to have a time-out of up to 60 minutes in order to complete critical reports or transactions without timing out. Each exception must meet the following criteria:
The time-out exception cannot exceed 60 minutes.
A letter of justification fully documenting the user requirement(s) must be submitted and approved by the site ISSM. In addition, this letter must identify an alternate means of access control for the terminal(s) involved (e.g., a room that is locked at all times, a room with a cipher lock to limit access, a password protected screen saver set to 30 minutes or less, etc.).
The requirement must be revalidated on an annual basis.
c) If the SIGNMULTI keyword for ACIDs is restricted test and development use this is not a finding.
V-7120
True
ZCIC0042
a) Refer to the following report produced by the TSS Data Collection:
- TSSCMDS.RPT(@ACIDS)
Refer to the CICS Systems Programmer Worksheets filled out from previous vulnerability ZCIC0010.
NOTE: Note: Any ACID that does not have an OPTIME value specified will obtain its OPTIME value from the default value set in ZCIC0041. Any ACID that specifies an OPTIME value must meet the requirements specified below.
b) For all ACIDs authorized to access a CICS facility if the OPTIME field set to 15 minutes, this is not a finding.
NOTE: If the time-out limit is greater than 15 minutes, and the system is processing unclassified information, review the following items. If any of these is true, this is not a finding
If a session is not terminated, but instead is locked out after 15 minutes of inactivity, a process must be in place that requires user identification and authentication before the session is unlocked. Session lock-out will be implemented through system controls or terminal screen protection.
A system’s default time for terminal lock-out or session termination may be lengthened to 30 minutes at the discretion of the ISSM. The ISSM will maintain the documentation for each system with a time-out adjusted beyond the 15-minute recommendation to explain the basis for this decision.
The ISSM may set selected userids to have a time-out of up to 60 minutes in order to complete critical reports or transactions without timing out. Each exception must meet the following criteria:
The time-out exception cannot exceed 60 minutes.
A letter of justification fully documenting the user requirement(s) must be submitted and approved by the site ISSM. In addition, this letter must identify an alternate means of access control for the terminal(s) involved (e.g., a room that is locked at all times, a room with a cipher lock to limit access, a password protected screen saver set to 30 minutes or less, etc.).
The requirement must be revalidated on an annual basis.
c) If the SIGNMULTI keyword for ACIDs is restricted test and development use this is not a finding.
M
Information Assurance Officer
199