UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Libraries included in the system REXXLIB concatenation must be properly protected.


Overview

Finding ID Version Rule ID IA Controls Severity
V-71223 ACP00062 SV-85847r1_rule High
Description
The libraries included in the system REXXLIB concatenation can contain program modules which possess a significant level of security bypass capability. Unauthorized access could result in the compromise of the operating system environment, ACP, and customer data.
STIG Date
z/OS ACF2 STIG 2019-03-26

Details

Check Text ( C-71933r2_chk )
Refer to the following reports produced by the Data Set and Resource Data Collection:

- SENSITVE.RPT(REXXRPT)

Automated Analysis
Refer to the following report produced by the Data Set and Resource Data Collection:

- PDI(ACP00062)

The ACP data set rules for libraries in the REXXLIB concatenation restrict inappropriate (e.g., GLOBAL read) access.

The ACP data set rules for libraries in the REXXLIB concatenation restrict WRITE or greater access to only z/OS systems programming personnel.
The ACP data set rules for libraries in the REXXLIB concatenation restrict READ access to the following:

Appropriate Started Tasks
Auditors
The user-id defined in PARMLIB member AXR00 AXRUSER(user-id)

The ACP data set rules for libraries in the REXXLIB concatenation specify that all (i.e., failures and successes) WRITE or greater access will be logged.

If all of the above are true, this is not a finding.

If any of the above is not true, this is a finding.
Fix Text (F-77881r1_fix)
Evaluate the impact of correcting the deficiency. Develop a plan of action and implement the changes required to protect APF Authorized Libraries.

Ensure that WRITE or greater access to libraries included in the system REXXLIB concatenation is limited to system programmers only.
Ensure READ access is allowed on to appropriate Started Tasks and Auditors.
Ensure UPDATE and/or ALTER access (i.e., successes and failures) is logged.