zOS WebsphereMQ for RACF Security Technical Implementation Guide

Overview

VersionDateFinding Count (17)Downloads
72025-06-24CAT I (High): 2CAT II (Medium): 15CAT III (Low): 0
STIG Description
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.
ClassifiedPublicSensitive
I - Mission Critical ClassifiedI - Mission Critical PublicI - Mission Critical Sensitive
II - Mission Support ClassifiedII - Mission Support PublicII - Mission Support Sensitive
III - Administrative ClassifiedIII - Administrative PublicIII - Administrative Sensitive

Findings - MAC III - Administrative Classified

Finding IDSeverityTitleDescription
V-224552
LOWMEDIUMHIGH
WebSphere MQ channel security is not implemented in accordance with security requirements.WebSphere MQ channel security can be configured to provide authentication, message privacy, and message integrity between queue managers. WebSphere MQ...
V-224553
LOWMEDIUMHIGH
Production WebSphere MQ Remotes must utilize Certified Name Filters (CNF).IBM WebSphere MQ can use a user ID associated with an ACP certificate as a channel user ID. When an entity at one end of an SSL channel receives a cer...
V-224554
LOWMEDIUMHIGH
User timeout parameter values for WebSphere MQ queue managers are not specified in accordance with security requirements.Users signed on to a WebSphere MQ queue manager could leave their terminals unattended for long periods of time. This may allow unauthorized individu...
V-224555
LOWMEDIUMHIGH
WebSphere MQ started tasks are not defined in accordance with the proper security requirements.Started tasks are used to execute WebSphere MQ queue manager services. Improperly defined WebSphere MQ started tasks may result in inappropriate acce...
V-224556
LOWMEDIUMHIGH
WebSphere MQ all update and alter access to MQSeries/WebSphere MQ product and system data sets are not properly restricted.MVS data sets provide the configuration, operational, and executable properties of WebSphere MQ. Some data sets are responsible for the security imple...
V-224557
LOWMEDIUMHIGH
WebSphere MQ resource classes must be properly activated for security checking by the ESM.WebSphere MQ resources allow for the control of administrator functions, connections, commands, queues, processes, and namelists. Some resources provi...
V-224559
LOWMEDIUMHIGH
WebSphere MQ connection class resource definitions must be protected in accordance with security.WebSphere MQ resources allow for the control of administrator functions, connections, commands, queues, processes, and namelists. Some resources provi...
V-224560
LOWMEDIUMHIGH
WebSphere MQ dead letter and alias dead letter queues are not properly defined.WebSphere MQ resources allow for the control of administrator functions, connections, commands, queues, processes, and namelists. Some resources provi...
V-224561
LOWMEDIUMHIGH
WebSphere MQ MQQUEUE (Queue) resource profiles defined to the appropriate class must be protected in accordance with security requirements.WebSphere MQ resources allow for the control of administrator functions, connections, commands, queues, processes, and namelists. Some resources provi...
V-224562
LOWMEDIUMHIGH
WebSphere MQ Process resource profiles defined in the appropriate Class must be protected in accordance with security requirements.WebSphere MQ Process resources allow for the control of processes. Failure to properly protect WebSphere MQ resources may result in unauthorized acces...
V-224563
LOWMEDIUMHIGH
WebSphere MQ Namelist resource profiles defined in the appropriate class must be protected in accordance with security requirements.WebSphere MQ resources allow for the control of administrator functions, connections, commands, queues, processes, and namelists. Some resources provi...
V-224564
LOWMEDIUMHIGH
WebSphere MQ Alternate User resources defined to appropriate ADMIN resource class must be protected in accordance with security requirements.WebSphere MQ resources allow for the control of administrator functions, connections, commands, queues, processes, and namelists. Some resources provi...
V-224565
LOWMEDIUMHIGH
WebSphere MQ context resources defined to the appropriate ADMIN resource class must be protected in accordance with security requirements.Context security validates whether a userid has authority to pass or set identity and/or origin data for a message. Context security will be active to...
V-224566
LOWMEDIUMHIGH
WebSphere MQ command resources defined to MQCMDS resource class are not protected in accordance with security requirements.WebSphere MQ resources allow for the control of commands. Failure to properly protect WebSphere MQ Command resources may result in unauthorized acce...
V-224567
LOWMEDIUMHIGH
WebSphere MQ RESLEVEL resources in the appropriate ADMIN resource class must be protected in accordance with security requirements.RESLEVEL security profiles control the number of userids checked for API-resource security. RESLEVEL is a powerful option that can cause the bypassing...
V-224551
LOWMEDIUMHIGH
WebSphere MQ channel security must be implemented in accordance with security requirements.WebSphere MQ Channel security can be configured to provide authentication, message privacy, and message integrity between queue managers. Secure Socke...
V-224558
LOWMEDIUMHIGH
WebSphere MQ switch profiles must be properly defined to the appropriate ADMIN class.WebSphere MQ resources allow for the control of administrator functions, connections, commands, queues, processes, and namelists. Some resources provi...