UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

IBM z/OS BPX.SRV.user SURROGAT resources must be protected appropriately.


Overview

Finding ID Version Rule ID IA Controls Severity
V-97617 ACF2-ES-000410 SV-106721r1_rule Medium
Description
In certain situations, software applications/programs need to execute with elevated privileges to perform required functions. However, if the privileges required for execution are at a higher level than the privileges assigned to organizational users invoking such applications/programs, those users are indirectly provided with greater privileges than assigned by the organizations. Some programs and processes are required to operate at a higher privilege level and therefore should be excluded from the organization-defined software list after review.
STIG Date
IBM z/OS ACF2 Security Technical Implementation Guide 2020-06-29

Details

Check Text ( C-96451r1_chk )
From the ISPF Command Shell enter:
ACF
SET RESOURCE(SUR)
SET VERBOSE
LIST LIKE(BPX-)

If the ACF2 rules for all BPX.SRV.user TYPE(SUR) resources specify a default access of NONE, this is not a finding.

If the ACF2 rules for all BPX.SRV.user TYPE(SUR) resources restrict access to system software processes (e.g., web servers) that act as servers under z/OS UNIX, this is not a finding.
Fix Text (F-103293r1_fix)
Configure BPX. SRV.userid resources to be properly protected and access restricted to appropriate system tasks or systems programming personnel.

SURROGAT class BPX resources are used in conjunction with server applications that are performing tasks on behalf of client users that may not supply an authenticator to the server. This can be the case when clients are otherwise validated or when the requested service is performed from userids representing groups.

The default access for each BPX.SRV.userid resource must be no access. Access can be permitted only to system software processes that act as servers under OS/390 UNIX (e.g., web servers).

Example:
SET R(SUR)
$KEY(BPX) TYPE(SUR)
SRV.INTERNAL UID(FJB****STC******IMWEBSRV) SERVICE(READ) LOG
SRV.PRIVATE UID(FJB****STC******IMWEBSRV) SERVICE(READ) LOG
SRV.PUBLIC UID(FJB****STC******IMWEBSRV) SERVICE(READ) LOG
SRV.WEBADM UID(FJB****STC******IMWEBSRV) SERVICE(READ) LOG
- UID(*) PREVENT