IBM z/OS UNIX security parameters in etc/profile must be properly specified.

Overview

Finding IDVersionRule IDIA ControlsSeverity
V-223617ACF2-US-000020SV-223617r958472_ruleCCI-000213medium
Description
Configuration settings are the set of parameters that can be changed in hardware, software, or firmware components of the system that affect the security posture and/or functionality of the system. Security-related parameters are those parameters impacting the security state of the system, including the parameters required to satisfy other security control requirements. Security-related parameters include, for example: registry settings; account, file, directory permission settings; and settings for functions, ports, protocols, services, and remote connections.
STIGDate
IBM z/OS ACF2 Security Technical Implementation Guide2025-06-24

Details

Check Text (C-223617r958472_chk)

From the ISPF COMMAND SHELL enter: ISHELL /etc/profile If the final or only instance of the UMASK command in /etc/profile is specified as "umask 077", this is not a finding. If the LOGNAME variable is marked read-only (i.e., "readonly LOGNAME") in /etc/profile, this is not a finding.

Fix Text (F-25278r500987_fix)

Configure the etc/profile to specify the UMASK command is executed with a value of 077 and the LOGNAME variable is marked read-only for the /etc/profile file, exceptions are documented with the ISSO.