BMC CONTROL-D Started task(s) must be properly defined to the STARTED resource class for RACF.
Overview
| Finding ID | Version | Rule ID | IA Controls | Severity |
| V-224395 | ZCTDR032 | SV-224395r958482_rule | CCI-000764 | medium |
| Description | ||||
| Access to product resources should be restricted to only those individuals responsible for the application connectivity and who have a requirement to access these resources. Improper control of product resources could potentially compromise the operating system, ACP, and customer data. | ||||
| STIG | Date | |||
| z/OS BMC CONTROL-D for RACF Security Technical Implementation Guide | 2024-12-16 | |||
Details
Check Text (C-224395r958482_chk)
Refer to the following report produced by the RACF Data Collection:
- DSMON.RPT(RACSPT)
Automated Analysis
Refer to the following report produced by the RACF Data Collection:
- PDI(ZCTD0032)
Verify that the BMC CONTROL-D started task(s) is (are) defined to the STARTED resource class profile and/or ICHRIN03 table entry.
Fix Text (F-26060r518687_fix)
The BMC CONTROL-D system programmer and the IAO will ensure that a product's started task(s) is (are) properly identified and/or defined to the System ACP.
A unique userid must be assigned for the BMC CONTROL-D started task(s) thru a corresponding STARTED class entry.
The following sample set of commands is shown here as a guideline:
rdef started CONTROLD.** uacc(none) owner(admin) audit(all(read)) stdata(user(CONTROLD) group(stc))
setr racl(started) ref