IBM zSecure Suite Security Technical Implementation Guide

Overview

VersionDateFinding Count (11)Downloads
12025-03-05CAT I (High): 0CAT II (Medium): 11CAT III (Low): 0
STIG Description
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.
ClassifiedPublicSensitive
I - Mission Critical ClassifiedI - Mission Critical PublicI - Mission Critical Sensitive
II - Mission Support ClassifiedII - Mission Support PublicII - Mission Support Sensitive
III - Administrative ClassifiedIII - Administrative PublicIII - Administrative Sensitive

Findings - All

Finding IDSeverityTitleDescription
V-259728
LOWMEDIUMHIGH
Access to IBM Security zSecure installation data sets must be properly restricted and logged.If the zSecure application were to allow any user to make changes to software libraries, those changes might be implemented without undergoing the app...
V-259729
LOWMEDIUMHIGH
Access to IBM Security zSecure STC data sets must be properly restricted and logged.IBM Security zSecure STC have the ability to use privileged functions and/or have access to sensitive data. Failure to properly restrict access to the...
V-259730
LOWMEDIUMHIGH
Access to IBM Security zSecure user data sets must be properly restricted and logged.If zSecure were to allow inappropriate reading or updating of user data sets, sensitive information could be disclosed, or changes might result in inc...
V-259731
LOWMEDIUMHIGH
Started tasks for IBM Security zSecure products must be properly defined.Started tasks and batch job IDs can be automatically revoked accidentally if not properly protected. When properly protected STCs prevent any attempts...
V-259732
LOWMEDIUMHIGH
Access to IBM Security zSecure program resources must be limited to authorized users.Functional access (which is controlled with access to XFACILIT profiles) must not commingle multiple functions under a single resource profile....
V-259733
LOWMEDIUMHIGH
IBM Security zSecure must prevent nonprivileged users from executing privileged zSecure functions.Preventing nonprivileged users from executing privileged zSecure functions mitigates the risk that unauthorized individuals or processes may gain unne...
V-259734
LOWMEDIUMHIGH
The IBM Security zSecure programs CKFCOLL and CKGRACF, and the APF-authorized version of program CKRCARLA, must be restricted to security administrators, security batch jobs performing External Security Manager (ESM) maintenance, auditors, and systems programmers, and must be audited.Users authorized to use the zSecure program CKFCOLL can collect z/OS system information that is not accessible to regular users. Users authorized to...
V-259735
LOWMEDIUMHIGH
IBM Security zSecure must implement organization-defined automated security responses if baseline zSecure configurations are changed in an unauthorized manner.Unauthorized changes to the zSecure baseline configuration could make the system vulnerable to various attacks or allow unauthorized access to the sys...
V-259736
LOWMEDIUMHIGH
IBM Security zSecure must remove all upgraded/replaced zSecure software components that are no longer required for operation after updated versions have been installed.Previous versions of zSecure products and components that are not removed from the information system after updates have been installed may be exploit...
V-259737
LOWMEDIUMHIGH
IBM Security zSecure system administrators must install security-relevant zSecure software updates within the time period directed by an authoritative source (e.g., IAVMs, CTOs, DTMs, and STIGs).Security flaws with software applications are discovered daily. Vendors are constantly updating and patching their products to address newly discovere...
V-259738
LOWMEDIUMHIGH
XFACILIT class, or alternate class if specified in module CKRSITE, must be active.The zSecure resource class that is configured for the zSecure access checks must be active to receive valid Allow/Deny responses from external securit...