Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-17469 | ZCTMT036 | SV-32051r1_rule | Medium |
Description |
---|
Improperly defined security controls for the BMC CONTROL-M could result in the compromise of the network, operating system, and customer data. |
STIG | Date |
---|---|
z/OS BMC CONTROL-M for TSS STIG | 2018-09-20 |
Check Text ( C-3188r1_chk ) |
---|
Refer to the following report produced by the TSS Data Collection: - TSSCMDS.RPT(FACLIST) - Preferred report containing all control option values in effect including default values - TSSCMDS.RPT(TSSPRMFL) - Alternate report containing only control option values explicitly coded at TSS startup Ensure the BMC CONTROL-M Facility Matrix table is defined as follows: FAC(USERxx=NAME=CONTROLM,PGM=CTM,ID=nn,ACTIVE,SHRPRF) FAC(CONTROLM=ASUBM,NOABEND,MULTIUSER,NOXDEF,SIGN(S)) FAC(CONTROLM=RES,LUMSG,STMSG,WARNPW,NORNDPW) FAC(CONTROLM=NOAUDIT,NOTSOC,MODE=FAIL) FAC(CONTROLM=LOG(SMF,INIT,MSG,SEC9),UIDACID=8,LOCKTIME=000) |
Fix Text (F-421r1_fix) |
---|
The BMC CONTROL-M system programmer and the IAO will ensure that the TOP SECRET Facility Matrix Table is properly defined using the following example: CONTROLM: FAC(USERxx=NAME=CONTROLM,PGM=CTM,ID=nn,ACTIVE,SHRPRF) FAC(CONTROLM=ASUBM,NOABEND,MULTIUSER,NOXDEF) FAC(CONTROLM=LUMSG,STMSG,SIGN(S),WARNPW,NORNDPW) FAC(CONTROLM=NOAUDIT,NOTSOC,MODE=FAIL) FAC(CONTROLM=LOG(SMF,INIT,MSG,SEC9),UIDACID=8,LOCKTIME=000) |