CA MIM Resource Sharing Started task will be properly defined to the STARTED resource class for RACF.

Overview

Finding IDVersionRule IDIA ControlsSeverity
V-224443ZMIMR032SV-224443r958482_ruleCCI-000764medium
Description
Access to product resources should be restricted to only those individuals responsible for the application connectivity and who have a requirement to access these resources. Improper control of product resources could potentially compromise the operating system, ACP, and customer data.
STIGDate
z/OS CA MIM for RACF Security Technical Implementation Guide2025-02-24

Details

Check Text (C-224443r958482_chk)

Refer to the following report produced by the RACF Data Collection: - DSMON.RPT(RACSPT) Automated Analysis Refer to the following report produced by the RACF Data Collection: - PDI(ZMIM0032) If the CA MIM Resource Sharing started task(s) is (are) defined to the STARTED resource class profile and/or ICHRIN03 table entry, this is not a finding.

Fix Text (F-26108r868499_fix)

The ISSO working with the systems programmer will ensure the CA MIM Resource Sharing Started Task(s) is properly identified and/or defined to the System ACP. A unique userid must be assigned for the CA MIM Resource Sharing started task(s) thru a corresponding STARTED class entry. The following commands are provided as a sample for defining Started Task(s): rdef started MIMGR.** uacc(none) owner(admin) audit(all(read)) - stdata(user(MIMGR) group(stc)) setr racl(started) ref