z/OS TADz for RACF Security Technical Implementation Guide
Overview
| Version | Date | Finding Count (4) | Downloads | ||
| 7 | 2025-03-04 | CAT I (High): 0 | CAT II (Medium): 4 | CAT III (Low): 0 | |
| STIG Description |
| This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil. |
Findings - MAC III - Administrative Public
| Finding ID | Severity | Title | Description |
|---|---|---|---|
| V-224537 | Tivoli Asset Discovery for z/OS (TADz) Install data sets are not properly protected. | Tivoli Asset Discovery for z/OS (TADz) Install data sets provide the capability to use privileged functions and/or have access to sensitive data. Fail... | |
| V-224538 | Tivoli Asset Discovery for zOS (TADz) STC and/or batch data sets are not properly protected. | Tivoli Asset Discovery for zOS (TADz) STC and/or batch data sets provide the capability to use privileged functions and/or have access to sensitive da... | |
| V-224539 | Tivoli Asset Discovery for z/OS (TADz) Started Task name(s) must be properly identified / defined to the system ACP. | Tivoli Asset Discovery for z/OS (TADz) requires a started task(s) that will be restricted to certain resources, datasets and other system functions. B... | |
| V-224540 | IBM Tivoli Asset Discovery for zOS (TADz) Started task(s) must be properly defined to the STARTED resource class for RACF. | Access to product resources should be restricted to only those individuals responsible for the application connectivity and who have a requirement to ... |