zOS WebsphereMQ for ACF2 Security Technical Implementation Guide

Overview

VersionDateFinding Count (17)Downloads
72025-02-24CAT I (High): 2CAT II (Medium): 15CAT III (Low): 0
STIG Description
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.
ClassifiedPublicSensitive
I - Mission Critical ClassifiedI - Mission Critical PublicI - Mission Critical Sensitive
II - Mission Support ClassifiedII - Mission Support PublicII - Mission Support Sensitive
III - Administrative ClassifiedIII - Administrative PublicIII - Administrative Sensitive

Findings - MAC I - Mission Critical Sensitive

Finding IDSeverityTitleDescription
V-224355
LOWMEDIUMHIGH
WebSphere MQ channel security is not implemented in accordance with security requirements.WebSphere MQ channel security can be configured to provide authentication, message privacy, and message integrity between queue managers. WebSphere MQ...
V-224356
LOWMEDIUMHIGH
Production WebSphere MQ Remotes must utilize Certified Name Filters (CNF).IBM WebSphere MQ can use a user ID associated with an ACP certificate as a channel user ID. When an entity at one end of an SSL channel receives a cer...
V-224357
LOWMEDIUMHIGH
User timeout parameter values for WebSphere MQ queue managers are not specified in accordance with security requirements.Users signed on to a WebSphere MQ queue manager could leave their terminals unattended for long periods of time. This may allow unauthorized individua...
V-224358
LOWMEDIUMHIGH
WebSphere MQ started tasks are not defined in accordance with the proper security requirements.Started tasks are used to execute WebSphere MQ queue manager services. Improperly defined WebSphere MQ started tasks may result in inappropriate acce...
V-224359
LOWMEDIUMHIGH
WebSphere MQ all update and alter access to MQSeries/WebSphere MQ product and system data sets are not properly restricted.MVS data sets provide the configuration, operational, and executable properties of WebSphere MQ. Some data sets are responsible for the security imple...
V-224360
LOWMEDIUMHIGH
WebSphere MQ resource classes must be properly activated.WebSphere MQ resources allow for the control of administrator functions, connections, commands, queues, processes, and namelists. Some resources provi...
V-224362
LOWMEDIUMHIGH
WebSphere MQ connection class resources must be protected in accordance with security.WebSphere MQ resources allow for the control of administrator functions, connections, commands, queues, processes, and namelists. Some resources provi...
V-224363
LOWMEDIUMHIGH
WebSphere MQ dead letter and alias dead letter queues are not properly defined.WebSphere MQ resources allow for the control of administrator functions, connections, commands, queues, processes, and namelists. Some resources provi...
V-224364
LOWMEDIUMHIGH
WebSphere MQ queue resource defined to the MQQUEUE or MXQUEUE resource class must be protected in accordance with security requirements.WebSphere MQ resources allow for the control of administrator functions, connections, commands, queues, processes, and namelists. Some resources provi...
V-224365
LOWMEDIUMHIGH
WebSphere MQ Process resources must be protected in accordance with security requirements.WebSphere MQ resources allow for the control of administrator functions, connections, commands, queues, processes, and namelists. Some resources provi...
V-224366
LOWMEDIUMHIGH
WebSphere MQ Namelist resources must be protected in accordance with security requirements.WebSphere MQ resources allow for the control of administrator functions, connections, commands, queues, processes, and namelists. Some resources provi...
V-224367
LOWMEDIUMHIGH
WebSphere MQ alternate user resources defined to the appropriate resource class must be protected in accordance with security requirements.WebSphere MQ resources allow for the control of administrator functions, connections, commands, queues, processes, and namelists. Some resources provi...
V-224368
LOWMEDIUMHIGH
WebSphere MQ context resources defined to the appropriate resource class must be protected in accordance with security requirements.WebSphere MQ resources allow for the control of administrator functions, connections, commands, queues, processes, and namelists. Some resources provi...
V-224369
LOWMEDIUMHIGH
WebSphere MQ command resources defined to MQCMDS resource class are not protected in accordance with security requirements.WebSphere MQ resources allow for the control of administrator functions, connections, commands, queues, processes, and namelists. Some resources provi...
V-224370
LOWMEDIUMHIGH
WebSphere MQ RESLEVEL resources in the appropriate ADMIN resource class must be protected in accordance with security requirements.WebSphere MQ resources allow for the control of administrator functions, connections, commands, queues, processes, and namelists. Some resources provi...
V-224354
LOWMEDIUMHIGH
WebSphere MQ channel security must be implemented in accordance with security requirements.WebSphere MQ Channel security can be configured to provide authentication, message privacy, and message integrity between queue managers. Secure Socke...
V-224361
LOWMEDIUMHIGH
Websphere MQ switch profiles must be properly defined to the appropriate class.WebSphere MQ resources allow for the control of administrator functions, connections, commands, queues, processes, and namelists. Some resources provi...