| V-237897 | | CA VM:Secure product Rules Facility must be installed and operating. | Enterprise environments make account management for operating systems challenging and complex. A manual process for account management functions adds ... |
| V-237898 | | The IBM z/VM TCP/IP DTCPARMS files must be properly configured to connect to an external security manager. | A comprehensive account management process such as provided by External Security Managers (ESM) which includes automation helps to ensure accounts des... |
| V-237911 | | CA VM:Secure product Password Encryption (PEF) option must be properly configured to store and transmit cryptographically-protected passwords. | Passwords need to be protected at all times, and encryption is the standard method for protecting passwords. If passwords are not encrypted, they can ... |
| V-237920 | | The IBM z/VM TCP/IP VMSSL command operands must be configured properly. | VMSSL services are initiated using the VMSSL command defined in the DTCPARMS file. Unapproved mechanisms that are used for authentication to the crypt... |
| V-237899 | | CA VM:Secure product must be installed and operating. | A comprehensive account management process such as provided by an External Security Manager (ESM) which includes automation helps to ensure accounts d... |
| V-237900 | | The IBM z/VM JOURNALING LOGON parameter must be set for lockout after 3 attempts for 15 minutes. | By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-force att... |
| V-237901 | | The CA VM:Secure JOURNAL Facility parameters must be set for lockout after 3 attempts. | By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-force att... |
| V-237902 | | The IBM z/VM LOGO Configuration file must be configured to display the Standard Mandatory DoD Notice and Consent Banner before granting local or remote access to the system. | Display of a standardized and approved use notification before granting access to the operating system ensures privacy and security notification verbi... |
| V-237903 | | The IBM z/VM TCP/IP FTP Server must be configured to display the Standard Mandatory DoD Notice and Consent Banner before granting local or remote access to the system and until users acknowledge the usage conditions and take explicit actions to log on for further access. | The banner must be acknowledged by the user prior to allowing the user access to the operating system. This provides assurance that the user has seen ... |
| V-237904 | | The IBM z/VM LOGO configuration file must be configured to display the Standard Mandatory DoD Notice and Consent Banner until users acknowledge the usage conditions and take explicit actions to log on for further access. | The banner must be acknowledged by the user prior to allowing the user access to the operating system. This provides assurance that the user has seen ... |
| V-237905 | | For FTP processing Z/VM TCP/IP FTP server Exit must be enabled. | Remote access services, such as those providing remote access to network devices and information systems, which lack automated monitoring capabilities... |
| V-237906 | | The IBM z/VM TCP/IP configuration must include an SSLSERVERID statement. | The Secure Socket Layer (SSL) server, provides processing support for secure (encrypted) communication between remote clients and z/VM TCP/IP applicat... |
| V-237907 | | CA VM:Secure product AUDIT file must be restricted to authorized personnel. | Unauthorized disclosure of audit records can reveal system and configuration data to attackers, thus compromising its confidentiality.
Audit informat... |
| V-237908 | | The IBM z/VM Journal option must be specified in the Product Configuration File. | Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlat... |
| V-237909 | | All digital certificates in use must have a valid path to a trusted Certification authority. | Without path validation, an informed trust decision by the relying party cannot be made when presented with any certificate not already explicitly tru... |
| V-237910 | | The IBM z/VM TCP/IP Key database for LDAP or SSL server must be created with the proper permissions. | If the private key is discovered, an attacker can use the key to authenticate as an authorized user and gain access to the network infrastructure.
Th... |
| V-237912 | | CA VM:Secure product AUTOEXP record in the Security Config File must be properly set. | Any password, no matter how complex, can eventually be cracked. Therefore, passwords need to be changed periodically. If the operating system does not... |
| V-237913 | | CA VM:Secure product PASSWORD user exit must be coded with the PWLIST option properly set. | Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. If the in... |
| V-237914 | | IBM zVM CA VM:Secure product PASSWORD user exit must be in use. | The shorter the password, the lower the number of possible combinations that need to be tested before the password is compromised.
Password complexit... |
| V-237915 | | IBM z/VM must be configured to disable non-essential capabilities. | It is detrimental for operating systems to provide, or install by default, functionality exceeding requirements or mission objectives. These unnecessa... |
| V-237916 | | CA VM:Secure product Config Delay LOG option must be set to 0. | IBM z/VM 6.4.0 made changes to obscure whether a logon is invalid due to the user ID or due to the password. Both the logon prompting sequence and the... |
| V-237917 | | CA VM:Secure product NORULE record in the SECURITY CONFIG file must be configured to REJECT. | To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DoD-approved PKIs, all DoD syst... |
| V-237918 | | All IBM z/VM TCP/IP Ports must be restricted to ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments. | In order to prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e., embedding of data types... |
| V-237919 | | The IBM z/VM Security Manager must provide a procedure to disable userIDs after 35 days of inactivity. | Inactive identifiers pose a risk to systems and applications because attackers may exploit an inactive identifier and potentially obtain undetected ac... |
| V-237921 | | The IBM z/VM TCP/IP ANONYMOU statement must not be coded in FTP configuration. | Operating systems utilizing encryption are required to use FIPS-compliant mechanisms for authenticating to cryptographic modules.... |
| V-237922 | | CA VM:Secure product ADMIN GLOBALS command must be restricted to systems programming personnel. | Operating system management functionality includes functions necessary for administration and requires privileged user access. Allowing non-privileged... |
| V-237923 | | CA VM:Secure must have a security group for Security Administrators only. | An isolation boundary provides access control and protects the integrity of the hardware, software, and firmware that perform security functions.
Sec... |
| V-237924 | | The IBM z/VM SYSTEM CONFIG file must be configured to clear TDISK on IPL. | Preventing unauthorized information transfers mitigates the risk of information, including encrypted representations of information, produced by the a... |
| V-237925 | | The IBM z/VM TCP/IP FOREIGNIPCONLIMIT statement must be properly configured. | DoS is a condition when a resource is not available for legitimate users. When this occurs, the organization either cannot accomplish its mission or m... |
| V-237926 | | The IBM z/VM TCP/IP PERSISTCONNECTIONLIMIT statement must be properly configured. | DoS is a condition when a resource is not available for legitimate users. When this occurs, the organization either cannot accomplish its mission or m... |
| V-237927 | | The IBM z/VM TCP/IP PENDINGCONNECTIONLIMIT statement must be properly configured. | DoS is a condition when a resource is not available for legitimate users. When this occurs, the organization either cannot accomplish its mission or m... |
| V-237928 | | IBM z/VM tapes must use Tape Encryption. | Information at rest refers to the state of information when it is located on a secondary storage device (e.g., disk drive and tape drive, when used fo... |
| V-237929 | | The IBM z/VM TCP/IP must be configured to display the mandatory DoD Notice and Consent banner before granting access to the system. | Display of a standardized and approved use notification before granting access to the publicly accessible operating system ensures privacy and securit... |
| V-237930 | | The IBM z/VM JOURNALING statement must be coded on the configuration file. | If auditing is enabled late in the start-up process, the actions of some start-up processes may not be audited. Some audit systems also maintain state... |
| V-237931 | | CA VM:Secure product SECURITY CONFIG file must be restricted to appropriate personnel. | Protecting audit information also includes identifying and protecting the tools used to view and manipulate log data. Therefore, protecting audit tool... |
| V-237932 | | The IBM z/VM AUDT and Journal Mini Disks must be restricted to the appropriate system administrators. | Protecting audit information also includes identifying and protecting the tools used to view and manipulate log data. Therefore, protecting audit tool... |
| V-237933 | | IBM z/VM must remove or disable emergency accounts after the crisis is resolved or 72 hours. | Emergency accounts are privileged accounts that are established in response to crisis situations where the need for rapid account activation is requir... |
| V-237934 | | The IBM z/VM must restrict link access to the disk on which system software resides. | If the operating system were to allow any user to make changes to software libraries, then those changes might be implemented without undergoing the a... |
| V-237935 | | The IBM z/VM Privilege command class A and Class B must be properly assigned. | Allowing regular users to install software, without explicit privileges, creates the risk that untested or potentially malicious software will be inst... |
| V-237936 | | CA VM:Secure AUTHORIZ CONFIG file must be properly configured. | Failure to provide logical access restrictions associated with changes to system configuration may have significant effects on the overall security of... |
| V-237937 | | The IBM z/VM journal minidisk space allocation must be large enough for one weeks worth of audit records. | In order to ensure operating systems have a sufficient storage capacity in which to write the audit logs, operating systems need to be able to allocat... |
| V-237938 | | CA VM:Secure product audit records must offload audit records to a different system or media. | Information stored in one location is vulnerable to accidental or incidental deletion or alteration.
Off-loading is a common process in information s... |
| V-237939 | | CA VM:Secure product audit records must be offloaded on a weekly basis. | Information stored in one location is vulnerable to accidental or incidental deletion or alteration.
Off-loading is a common process in information s... |
| V-237940 | | The IBM z/VM Portmapper server virtual machine userID must be included in the AUTOLOG statement of the TCP/IP server configuration file. | Without authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. Bidirectional authenticati... |
| V-237941 | | CA VM:Secure product MANAGE command must be restricted to system administrators. | Discretionary Access Control (DAC) is based on the notion that individual users are "owners" of objects and therefore have discretion over who should ... |
| V-237942 | | The CA VM:Secure LOGONBY command must be restricted to system administrators. | In certain situations, software applications/programs need to execute with elevated privileges to perform required functions. However, if the privileg... |
| V-237943 | | The IBM z/VM CP Privilege Class A, B, and D must be restricted to appropriate system operators. | Preventing non-privileged users from executing privileged functions mitigates the risk that unauthorized individuals or processes may gain unnecessary... |
| V-237944 | | The IBM z/VM JOURNALING statement must be properly configured. | By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-forcing, ... |
| V-237945 | | The IBM z/VM TCP/IP SECUREDATA option for FTP must be set to REQUIRED. | Information can be either unintentionally or maliciously disclosed or modified during preparation for transmission, for example, during aggregation, a... |
| V-237946 | | IBM z/VM TCP/IP config file INTERNALCLIENTPARMS statement must be properly configured. | Remote access services, such as those providing remote access to network devices and information systems, which lack automated control capabilities, i... |
| V-237947 | | All IBM z/VM TCP/IP servers must be configured for SSL/TLS connection. | Information can be either unintentionally or maliciously disclosed or modified during preparation for transmission, for example, during aggregation, a... |
| V-237948 | | The IBM z/VM TCP/IP SECURETELNETCLIENT option for telnet must be set to YES. | Information can be either unintentionally or maliciously disclosed or modified during preparation for transmission, for example, during aggregation, a... |
| V-237954 | | The IBM z/VM Privilege Classes C and E must be restricted to appropriate system administrators. | Preventing non-privileged users from executing privileged functions mitigates the risk that unauthorized individuals or processes may gain unnecessary... |
| V-237955 | | The IBM z/VM Privilege Class F must be restricted to service representatives and system administrators only. | Preventing non-privileged users from executing privileged functions mitigates the risk that unauthorized individuals or processes may gain unnecessary... |
| V-237956 | | The IBM z/VM ANY Privilege Class must not be listed for privilege commands. | Preventing non-privileged users from executing privileged functions mitigates the risk that unauthorized individuals or processes may gain unnecessary... |
| V-237957 | | CA VM:Secure product VMXRPI configuration file must be restricted to authorized personnel. | Configuring the operating system to implement organization-wide security implementation guides and security checklists ensures compliance with federal... |
| V-237958 | | CA VM:Secure product DASD CONFIG file must be restricted to appropriate personnel. | Configuring the operating system to implement organization-wide security implementation guides and security checklists ensures compliance with federal... |
| V-237959 | | CA VM:Secure product AUTHORIZ CONFIG file must be restricted to appropriate personnel. | Configuring the operating system to implement organization-wide security implementation guides and security checklists ensures compliance with federal... |
| V-237960 | | CA VM:Secure product CONFIG file must be restricted to appropriate personnel. | Configuration settings are the set of parameters that can be changed in hardware, software, or firmware components of the system that affect the secur... |
| V-237961 | | CA VM:Secure Product SFS configuration file must be restricted to appropriate personnel. | Configuring the operating system to implement organization-wide security implementation guides and security checklists ensures compliance with federal... |
| V-237962 | | CA VM:Secure product Rules Facility must be restricted to appropriate personnel. | Configuring the operating system to implement organization-wide security implementation guides and security checklists ensures compliance with federal... |
| V-237963 | | IBM z/VM must employ a Session manager. | A session manager controls the semi-permanent interactive information interchange, also known as a dialogue, between a user and z/VM. Without the use ... |
| V-237964 | | The IBM z/VM System administrator must develop a notification routine for account management. | Information system accounts are utilized for identifying individual users or for identifying the operating system processes themselves. In order to de... |
| V-237965 | | The IBM z/VM system administrator must develop routines and processes for the proper configuration and maintenance of Software. | Proper configuration management procedures for information systems provide for the proper configuration and maintenance in accordance with local polic... |
| V-237966 | | IBM z/VM must be protected by an external firewall that has a deny-all, allow-by-exception policy. | Firewalls protect computers from network attacks by blocking or limiting access to open network ports. Firewalls provide monitoring and control of com... |
| V-237967 | | The IBM z/VM System administrator must develop routines and processes for notification in the event of audit failure. | Audit processing failures include, for example, software/hardware errors, failures in the audit capturing mechanisms, and audit storage capacity being... |
| V-237968 | | The IBM z/VM system administrator must develop procedures maintaining information system operation in the event of anomalies. | If anomalies are not acted upon, security functions may fail to secure the system.... |
| V-237969 | | IBM z/VM system administrator must develop procedures to manually control temporary, interactive, and emergency accounts. | Proper handling of temporary, inactive, and emergency accounts require automatic notification and action rather than at the convenience of the systems... |
| V-237970 | | IBM z/VM must have access to an audit reduction tool that allows for central data review and analysis. | Audit reduction is a process that manipulates collected audit information and organizes such information in a summary format that is more meaningful t... |
| V-237971 | | The IBM z/VM system administrator must develop and perform a procedure to validate the correct operation of security functions. | Without verification of the security functions, security functions may not operate correctly and the failure may go unnoticed. Security function is de... |
| V-237972 | | IBM z/VM must employ Clock synchronization software. | Inaccurate time stamps make it more difficult to correlate events and can lead to an inaccurate analysis. Determining the correct time a particular ev... |
| V-237973 | | The IBM z/VM systems requiring data at rest must employ IBMs DS8000 for full disk encryption. | Operating systems handling data requiring "data at rest" protections must employ cryptographic mechanisms to prevent unauthorized disclosure and modif... |
| V-245530 | | The IBM z/VM TCP/IP NSLOOKUP statement for UFT servers must be properly configured. | If data origin authentication and data integrity verification are not performed, the resultant response could be forged, it may have come from a poiso... |
| V-245531 | | The IBM z/VM TCP/IP DOMAINLOOKUP statement must be properly configured. | If data origin authentication and data integrity verification are not performed, the resultant response could be forged, it may have come from a poiso... |
| V-245532 | | The IBM z/VM TCP/IP NSINTERADDR statement must be present in the TCPIP DATA configuration. | If data origin authentication and data integrity verification are not performed, the resultant response could be forged, it may have come from a poiso... |
| V-245533 | | The IBM z/VM CHECKSUM statement must be included in the TCP/IP configuration file. | If data origin authentication and data integrity verification are not performed, the resultant response could be forged, it may have come from a poiso... |
| V-245534 | | The IBM z/VM DOMAINSEARCH statement in the TCPIP DATA file must be configured with proper domain names for name resolution. | If data origin authentication and data integrity verification are not performed, the resultant response could be forged, it may have come from a poiso... |