zOS WebSphere MQ for TSS Security Technical Implementation Guide

Overview

VersionDateFinding Count (17)Downloads
V7R22025-09-28CAT I (High): 2CAT II (Medium): 15CAT III (Low): 0
STIG Description
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.
ClassifiedPublicSensitive
I - Mission Critical ClassifiedI - Mission Critical PublicI - Mission Critical Sensitive
II - Mission Support ClassifiedII - Mission Support PublicII - Mission Support Sensitive
III - Administrative ClassifiedIII - Administrative PublicIII - Administrative Sensitive

Findings - MAC III - Administrative Classified

Finding IDSeverityTitleDescription
V-225624
LOWMEDIUMHIGH
WebSphere MQ channel security is not implemented in accordance with security requirements.WebSphere MQ channel security can be configured to provide authentication, message privacy, and message integrity between queue managers. WebSphere MQ...
V-225625
LOWMEDIUMHIGH
Production WebSphere MQ Remotes must utilize Certified Name Filters (CNF).IBM WebSphere MQ can use a user ID associated with an ACP certificate as a channel user ID. When an entity at one end of an SSL channel receives a cer...
V-225626
LOWMEDIUMHIGH
User timeout parameter values for WebSphere MQ queue managers are not specified in accordance with security requirements.Users signed on to a WebSphere MQ queue manager could leave their terminals unattended for long periods of time. This may allow unauthorized individua...
V-225627
LOWMEDIUMHIGH
WebSphere MQ started tasks are not defined in accordance with the proper security requirements.Started tasks are used to execute WebSphere MQ queue manager services. Improperly defined WebSphere MQ started tasks may result in inappropriate acces...
V-225628
LOWMEDIUMHIGH
WebSphere MQ all update and alter access to MQSeries/WebSphere MQ product and system data sets are not properly restricted.MVS data sets provide the configuration, operational, and executable properties of WebSphere MQ. Some data sets are responsible for the security imple...
V-225629
LOWMEDIUMHIGH
WebSphere MQ security class(es) must not be defined improperly.WebSphere MQ resources allow for the control of administrator functions, connections, commands, queues, processes, and namelists. Some resources provi...
V-225631
LOWMEDIUMHIGH
WebSphere MQ connection class resources must be protected properly.WebSphere MQ resources allow for the control of administrator functions, connections, commands, queues, processes, and namelists. Some resources provi...
V-225632
LOWMEDIUMHIGH
WebSphere MQ dead letter and alias dead letter queues are not properly defined.WebSphere MQ resources allow for the control of administrator functions, connections, commands, queues, processes, and namelists. Some resources provi...
V-225633
LOWMEDIUMHIGH
WebSphere MQ queue resource defined to the appropriate resource class must be protected in accordance with security requirements.WebSphere MQ resources allow for the control of administrator functions, connections, commands, queues, processes, and namelists. Some resources provi...
V-225634
LOWMEDIUMHIGH
WebSphere MQ Process resources must be protected in accordance with security requirements.WebSphere MQ resources allow for the control of administrator functions, connections, commands, queues, processes, and namelists. Some resources provi...
V-225635
LOWMEDIUMHIGH
WebSphere MQ Namelist resources must be protected in accordance with security requirements.WebSphere MQ resources allow for the control of administrator functions, connections, commands, queues, processes, and namelists. Some resources provi...
V-225636
LOWMEDIUMHIGH
WebSphere MQ alternate user resources defined to appropriate ADMIN resource class must be protected in accordance with security requirements.WebSphere MQ resources allow for the control of administrator functions, connections, commands, queues, processes, and namelists. Some resources provi...
V-225637
LOWMEDIUMHIGH
WebSphere MQ context resources defined to the appropriate ADMIN resource class must be protected in accordance with security requirements.WebSphere MQ resources allow for the control of administrator functions, connections, commands, queues, processes, and namelists. Some resources provi...
V-225638
LOWMEDIUMHIGH
WebSphere MQ command resources defined to MQCMDS resource class are not protected in accordance with security requirements.WebSphere MQ resources allow for the control of administrator functions, connections, commands, queues, processes, and namelists. Some resources provi...
V-225639
LOWMEDIUMHIGH
WebSphere MQ RESLEVEL resources in the appropriate ADMIN resource class must be protected in accordance with security requirements.WebSphere MQ resources allow for the control of administrator functions, connections, commands, queues, processes, and namelists. Some resources provi...
V-225623
LOWMEDIUMHIGH
WebSphere MQ channel security must be implemented in accordance with security requirements.WebSphere MQ Channel security can be configured to provide authentication, message privacy, and message integrity between queue managers. Secure Socke...
V-225630
LOWMEDIUMHIGH
WebSphere MQ switch profiles must be properly defined to the appropriate ADMIN class.WebSphere MQ resources allow for the control of administrator functions, connections, commands, queues, processes, and namelists. Some resources provi...