UCF STIG Viewer Logo

IBM RACF LOGONIDs must not be defined to SYS1.UADS for non-emergency use.


Overview

Finding ID Version Rule ID IA Controls Severity
V-223837 RACF-TS-000020 SV-223837r604139_rule High
Description
Privileged functions include, for example, establishing accounts, performing system integrity checks, or administering cryptographic key management activities. Non-privileged users are individuals that do not possess appropriate authorizations. Circumventing intrusion detection and prevention mechanisms or malicious code protection mechanisms are examples of privileged functions that require protection from non-privileged users.
STIG Date
IBM z/OS RACF Security Technical Implementation Guide 2021-01-05

Details

Check Text ( C-25510r515199_chk )
Ask the system administrator to provide a list of all emergency userids available to the site along with the associated function of each.

If SYS1.UADS userids are limited and reserved for emergency purposes only, this is not a finding.
Fix Text (F-25498r515200_fix)
Configure the SYS1.UADS entries to ensure LOGONIDs defined include only those users required to support specific functions related to system recovery. Evaluate the impact of accomplishing the change.