IBM zVM Using CA VM:Secure Security Technical Implementation Guide

Overview

VersionDateFinding Count (77)Downloads
22022-08-31CAT I (High): 4CAT II (Medium): 73CAT III (Low): 0
STIG Description
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.
ClassifiedPublicSensitive
I - Mission Critical ClassifiedI - Mission Critical PublicI - Mission Critical Sensitive
II - Mission Support ClassifiedII - Mission Support PublicII - Mission Support Sensitive
III - Administrative ClassifiedIII - Administrative PublicIII - Administrative Sensitive

Findings - All

Finding IDSeverityTitleDescription
V-237897
LOWMEDIUMHIGH
CA VM:Secure product Rules Facility must be installed and operating.Enterprise environments make account management for operating systems challenging and complex. A manual process for account management functions adds ...
V-237898
LOWMEDIUMHIGH
The IBM z/VM TCP/IP DTCPARMS files must be properly configured to connect to an external security manager.A comprehensive account management process such as provided by External Security Managers (ESM) which includes automation helps to ensure accounts des...
V-237911
LOWMEDIUMHIGH
CA VM:Secure product Password Encryption (PEF) option must be properly configured to store and transmit cryptographically-protected passwords.Passwords need to be protected at all times, and encryption is the standard method for protecting passwords. If passwords are not encrypted, they can ...
V-237920
LOWMEDIUMHIGH
The IBM z/VM TCP/IP VMSSL command operands must be configured properly.VMSSL services are initiated using the VMSSL command defined in the DTCPARMS file. Unapproved mechanisms that are used for authentication to the crypt...
V-237899
LOWMEDIUMHIGH
CA VM:Secure product must be installed and operating.A comprehensive account management process such as provided by an External Security Manager (ESM) which includes automation helps to ensure accounts d...
V-237900
LOWMEDIUMHIGH
The IBM z/VM JOURNALING LOGON parameter must be set for lockout after 3 attempts for 15 minutes.By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-force att...
V-237901
LOWMEDIUMHIGH
The CA VM:Secure JOURNAL Facility parameters must be set for lockout after 3 attempts.By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-force att...
V-237902
LOWMEDIUMHIGH
The IBM z/VM LOGO Configuration file must be configured to display the Standard Mandatory DoD Notice and Consent Banner before granting local or remote access to the system.Display of a standardized and approved use notification before granting access to the operating system ensures privacy and security notification verbi...
V-237903
LOWMEDIUMHIGH
The IBM z/VM TCP/IP FTP Server must be configured to display the Standard Mandatory DoD Notice and Consent Banner before granting local or remote access to the system and until users acknowledge the usage conditions and take explicit actions to log on for further access.The banner must be acknowledged by the user prior to allowing the user access to the operating system. This provides assurance that the user has seen ...
V-237904
LOWMEDIUMHIGH
The IBM z/VM LOGO configuration file must be configured to display the Standard Mandatory DoD Notice and Consent Banner until users acknowledge the usage conditions and take explicit actions to log on for further access.The banner must be acknowledged by the user prior to allowing the user access to the operating system. This provides assurance that the user has seen ...
V-237905
LOWMEDIUMHIGH
For FTP processing Z/VM TCP/IP FTP server Exit must be enabled.Remote access services, such as those providing remote access to network devices and information systems, which lack automated monitoring capabilities...
V-237906
LOWMEDIUMHIGH
The IBM z/VM TCP/IP configuration must include an SSLSERVERID statement.The Secure Socket Layer (SSL) server, provides processing support for secure (encrypted) communication between remote clients and z/VM TCP/IP applicat...
V-237907
LOWMEDIUMHIGH
CA VM:Secure product AUDIT file must be restricted to authorized personnel.Unauthorized disclosure of audit records can reveal system and configuration data to attackers, thus compromising its confidentiality. Audit informat...
V-237908
LOWMEDIUMHIGH
The IBM z/VM Journal option must be specified in the Product Configuration File.Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlat...
V-237909
LOWMEDIUMHIGH
All digital certificates in use must have a valid path to a trusted Certification authority.Without path validation, an informed trust decision by the relying party cannot be made when presented with any certificate not already explicitly tru...
V-237910
LOWMEDIUMHIGH
The IBM z/VM TCP/IP Key database for LDAP or SSL server must be created with the proper permissions.If the private key is discovered, an attacker can use the key to authenticate as an authorized user and gain access to the network infrastructure. Th...
V-237912
LOWMEDIUMHIGH
CA VM:Secure product AUTOEXP record in the Security Config File must be properly set.Any password, no matter how complex, can eventually be cracked. Therefore, passwords need to be changed periodically. If the operating system does not...
V-237913
LOWMEDIUMHIGH
CA VM:Secure product PASSWORD user exit must be coded with the PWLIST option properly set.Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. If the in...
V-237914
LOWMEDIUMHIGH
IBM zVM CA VM:Secure product PASSWORD user exit must be in use.The shorter the password, the lower the number of possible combinations that need to be tested before the password is compromised. Password complexit...
V-237915
LOWMEDIUMHIGH
IBM z/VM must be configured to disable non-essential capabilities.It is detrimental for operating systems to provide, or install by default, functionality exceeding requirements or mission objectives. These unnecessa...
V-237916
LOWMEDIUMHIGH
CA VM:Secure product Config Delay LOG option must be set to 0.IBM z/VM 6.4.0 made changes to obscure whether a logon is invalid due to the user ID or due to the password. Both the logon prompting sequence and the...
V-237917
LOWMEDIUMHIGH
CA VM:Secure product NORULE record in the SECURITY CONFIG file must be configured to REJECT.To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DoD-approved PKIs, all DoD syst...
V-237918
LOWMEDIUMHIGH
All IBM z/VM TCP/IP Ports must be restricted to ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments.In order to prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e., embedding of data types...
V-237919
LOWMEDIUMHIGH
The IBM z/VM Security Manager must provide a procedure to disable userIDs after 35 days of inactivity.Inactive identifiers pose a risk to systems and applications because attackers may exploit an inactive identifier and potentially obtain undetected ac...
V-237921
LOWMEDIUMHIGH
The IBM z/VM TCP/IP ANONYMOU statement must not be coded in FTP configuration.Operating systems utilizing encryption are required to use FIPS-compliant mechanisms for authenticating to cryptographic modules....
V-237922
LOWMEDIUMHIGH
CA VM:Secure product ADMIN GLOBALS command must be restricted to systems programming personnel.Operating system management functionality includes functions necessary for administration and requires privileged user access. Allowing non-privileged...
V-237923
LOWMEDIUMHIGH
CA VM:Secure must have a security group for Security Administrators only.An isolation boundary provides access control and protects the integrity of the hardware, software, and firmware that perform security functions. Sec...
V-237924
LOWMEDIUMHIGH
The IBM z/VM SYSTEM CONFIG file must be configured to clear TDISK on IPL.Preventing unauthorized information transfers mitigates the risk of information, including encrypted representations of information, produced by the a...
V-237925
LOWMEDIUMHIGH
The IBM z/VM TCP/IP FOREIGNIPCONLIMIT statement must be properly configured.DoS is a condition when a resource is not available for legitimate users. When this occurs, the organization either cannot accomplish its mission or m...
V-237926
LOWMEDIUMHIGH
The IBM z/VM TCP/IP PERSISTCONNECTIONLIMIT statement must be properly configured.DoS is a condition when a resource is not available for legitimate users. When this occurs, the organization either cannot accomplish its mission or m...
V-237927
LOWMEDIUMHIGH
The IBM z/VM TCP/IP PENDINGCONNECTIONLIMIT statement must be properly configured.DoS is a condition when a resource is not available for legitimate users. When this occurs, the organization either cannot accomplish its mission or m...
V-237928
LOWMEDIUMHIGH
IBM z/VM tapes must use Tape Encryption.Information at rest refers to the state of information when it is located on a secondary storage device (e.g., disk drive and tape drive, when used fo...
V-237929
LOWMEDIUMHIGH
The IBM z/VM TCP/IP must be configured to display the mandatory DoD Notice and Consent banner before granting access to the system.Display of a standardized and approved use notification before granting access to the publicly accessible operating system ensures privacy and securit...
V-237930
LOWMEDIUMHIGH
The IBM z/VM JOURNALING statement must be coded on the configuration file.If auditing is enabled late in the start-up process, the actions of some start-up processes may not be audited. Some audit systems also maintain state...
V-237931
LOWMEDIUMHIGH
CA VM:Secure product SECURITY CONFIG file must be restricted to appropriate personnel.Protecting audit information also includes identifying and protecting the tools used to view and manipulate log data. Therefore, protecting audit tool...
V-237932
LOWMEDIUMHIGH
The IBM z/VM AUDT and Journal Mini Disks must be restricted to the appropriate system administrators.Protecting audit information also includes identifying and protecting the tools used to view and manipulate log data. Therefore, protecting audit tool...
V-237933
LOWMEDIUMHIGH
IBM z/VM must remove or disable emergency accounts after the crisis is resolved or 72 hours.Emergency accounts are privileged accounts that are established in response to crisis situations where the need for rapid account activation is requir...
V-237934
LOWMEDIUMHIGH
The IBM z/VM must restrict link access to the disk on which system software resides.If the operating system were to allow any user to make changes to software libraries, then those changes might be implemented without undergoing the a...
V-237935
LOWMEDIUMHIGH
The IBM z/VM Privilege command class A and Class B must be properly assigned.Allowing regular users to install software, without explicit privileges, creates the risk that untested or potentially malicious software will be inst...
V-237936
LOWMEDIUMHIGH
CA VM:Secure AUTHORIZ CONFIG file must be properly configured.Failure to provide logical access restrictions associated with changes to system configuration may have significant effects on the overall security of...
V-237937
LOWMEDIUMHIGH
The IBM z/VM journal minidisk space allocation must be large enough for one weeks worth of audit records.In order to ensure operating systems have a sufficient storage capacity in which to write the audit logs, operating systems need to be able to allocat...
V-237938
LOWMEDIUMHIGH
CA VM:Secure product audit records must offload audit records to a different system or media.Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common process in information s...
V-237939
LOWMEDIUMHIGH
CA VM:Secure product audit records must be offloaded on a weekly basis.Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common process in information s...
V-237940
LOWMEDIUMHIGH
The IBM z/VM Portmapper server virtual machine userID must be included in the AUTOLOG statement of the TCP/IP server configuration file.Without authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. Bidirectional authenticati...
V-237941
LOWMEDIUMHIGH
CA VM:Secure product MANAGE command must be restricted to system administrators.Discretionary Access Control (DAC) is based on the notion that individual users are "owners" of objects and therefore have discretion over who should ...
V-237942
LOWMEDIUMHIGH
The CA VM:Secure LOGONBY command must be restricted to system administrators.In certain situations, software applications/programs need to execute with elevated privileges to perform required functions. However, if the privileg...
V-237943
LOWMEDIUMHIGH
The IBM z/VM CP Privilege Class A, B, and D must be restricted to appropriate system operators.Preventing non-privileged users from executing privileged functions mitigates the risk that unauthorized individuals or processes may gain unnecessary...
V-237944
LOWMEDIUMHIGH
The IBM z/VM JOURNALING statement must be properly configured.By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-forcing, ...
V-237945
LOWMEDIUMHIGH
The IBM z/VM TCP/IP SECUREDATA option for FTP must be set to REQUIRED.Information can be either unintentionally or maliciously disclosed or modified during preparation for transmission, for example, during aggregation, a...
V-237946
LOWMEDIUMHIGH
IBM z/VM TCP/IP config file INTERNALCLIENTPARMS statement must be properly configured.Remote access services, such as those providing remote access to network devices and information systems, which lack automated control capabilities, i...
V-237947
LOWMEDIUMHIGH
All IBM z/VM TCP/IP servers must be configured for SSL/TLS connection.Information can be either unintentionally or maliciously disclosed or modified during preparation for transmission, for example, during aggregation, a...
V-237948
LOWMEDIUMHIGH
The IBM z/VM TCP/IP SECURETELNETCLIENT option for telnet must be set to YES.Information can be either unintentionally or maliciously disclosed or modified during preparation for transmission, for example, during aggregation, a...
V-237954
LOWMEDIUMHIGH
The IBM z/VM Privilege Classes C and E must be restricted to appropriate system administrators.Preventing non-privileged users from executing privileged functions mitigates the risk that unauthorized individuals or processes may gain unnecessary...
V-237955
LOWMEDIUMHIGH
The IBM z/VM Privilege Class F must be restricted to service representatives and system administrators only.Preventing non-privileged users from executing privileged functions mitigates the risk that unauthorized individuals or processes may gain unnecessary...
V-237956
LOWMEDIUMHIGH
The IBM z/VM ANY Privilege Class must not be listed for privilege commands.Preventing non-privileged users from executing privileged functions mitigates the risk that unauthorized individuals or processes may gain unnecessary...
V-237957
LOWMEDIUMHIGH
CA VM:Secure product VMXRPI configuration file must be restricted to authorized personnel.Configuring the operating system to implement organization-wide security implementation guides and security checklists ensures compliance with federal...
V-237958
LOWMEDIUMHIGH
CA VM:Secure product DASD CONFIG file must be restricted to appropriate personnel.Configuring the operating system to implement organization-wide security implementation guides and security checklists ensures compliance with federal...
V-237959
LOWMEDIUMHIGH
CA VM:Secure product AUTHORIZ CONFIG file must be restricted to appropriate personnel.Configuring the operating system to implement organization-wide security implementation guides and security checklists ensures compliance with federal...
V-237960
LOWMEDIUMHIGH
CA VM:Secure product CONFIG file must be restricted to appropriate personnel.Configuration settings are the set of parameters that can be changed in hardware, software, or firmware components of the system that affect the secur...
V-237961
LOWMEDIUMHIGH
CA VM:Secure Product SFS configuration file must be restricted to appropriate personnel.Configuring the operating system to implement organization-wide security implementation guides and security checklists ensures compliance with federal...
V-237962
LOWMEDIUMHIGH
CA VM:Secure product Rules Facility must be restricted to appropriate personnel.Configuring the operating system to implement organization-wide security implementation guides and security checklists ensures compliance with federal...
V-237963
LOWMEDIUMHIGH
IBM z/VM must employ a Session manager.A session manager controls the semi-permanent interactive information interchange, also known as a dialogue, between a user and z/VM. Without the use ...
V-237964
LOWMEDIUMHIGH
The IBM z/VM System administrator must develop a notification routine for account management.Information system accounts are utilized for identifying individual users or for identifying the operating system processes themselves. In order to de...
V-237965
LOWMEDIUMHIGH
The IBM z/VM system administrator must develop routines and processes for the proper configuration and maintenance of Software.Proper configuration management procedures for information systems provide for the proper configuration and maintenance in accordance with local polic...
V-237966
LOWMEDIUMHIGH
IBM z/VM must be protected by an external firewall that has a deny-all, allow-by-exception policy.Firewalls protect computers from network attacks by blocking or limiting access to open network ports. Firewalls provide monitoring and control of com...
V-237967
LOWMEDIUMHIGH
The IBM z/VM System administrator must develop routines and processes for notification in the event of audit failure.Audit processing failures include, for example, software/hardware errors, failures in the audit capturing mechanisms, and audit storage capacity being...
V-237968
LOWMEDIUMHIGH
The IBM z/VM system administrator must develop procedures maintaining information system operation in the event of anomalies.If anomalies are not acted upon, security functions may fail to secure the system....
V-237969
LOWMEDIUMHIGH
IBM z/VM system administrator must develop procedures to manually control temporary, interactive, and emergency accounts.Proper handling of temporary, inactive, and emergency accounts require automatic notification and action rather than at the convenience of the systems...
V-237970
LOWMEDIUMHIGH
IBM z/VM must have access to an audit reduction tool that allows for central data review and analysis.Audit reduction is a process that manipulates collected audit information and organizes such information in a summary format that is more meaningful t...
V-237971
LOWMEDIUMHIGH
The IBM z/VM system administrator must develop and perform a procedure to validate the correct operation of security functions.Without verification of the security functions, security functions may not operate correctly and the failure may go unnoticed. Security function is de...
V-237972
LOWMEDIUMHIGH
IBM z/VM must employ Clock synchronization software.Inaccurate time stamps make it more difficult to correlate events and can lead to an inaccurate analysis. Determining the correct time a particular ev...
V-237973
LOWMEDIUMHIGH
The IBM z/VM systems requiring data at rest must employ IBMs DS8000 for full disk encryption.Operating systems handling data requiring "data at rest" protections must employ cryptographic mechanisms to prevent unauthorized disclosure and modif...
V-245530
LOWMEDIUMHIGH
The IBM z/VM TCP/IP NSLOOKUP statement for UFT servers must be properly configured.If data origin authentication and data integrity verification are not performed, the resultant response could be forged, it may have come from a poiso...
V-245531
LOWMEDIUMHIGH
The IBM z/VM TCP/IP DOMAINLOOKUP statement must be properly configured.If data origin authentication and data integrity verification are not performed, the resultant response could be forged, it may have come from a poiso...
V-245532
LOWMEDIUMHIGH
The IBM z/VM TCP/IP NSINTERADDR statement must be present in the TCPIP DATA configuration.If data origin authentication and data integrity verification are not performed, the resultant response could be forged, it may have come from a poiso...
V-245533
LOWMEDIUMHIGH
The IBM z/VM CHECKSUM statement must be included in the TCP/IP configuration file.If data origin authentication and data integrity verification are not performed, the resultant response could be forged, it may have come from a poiso...
V-245534
LOWMEDIUMHIGH
The IBM z/VM DOMAINSEARCH statement in the TCPIP DATA file must be configured with proper domain names for name resolution.If data origin authentication and data integrity verification are not performed, the resultant response could be forged, it may have come from a poiso...