UCF STIG Viewer Logo

IBM z/OS SYS1.PARMLIB must be properly protected.


Overview

Finding ID Version Rule ID IA Controls Severity
V-223697 RACF-ES-000500 SV-223697r604139_rule High
Description
Without the capability to restrict which roles and individuals can select which events are audited, unauthorized personnel may be able to prevent the auditing of critical events. Misconfigured audits may degrade the system's performance by overwhelming the audit log. Misconfigured audits may also make it more difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. SYS1.PARMLIB contains the parameters that control audit configuration. Unauthorized access could result in the compromise of the operating system environment, ACP, and customer data. Satisfies: SRG-OS-000063-GPOS-00032, SRG-OS-000080-GPOS-00048, SRG-OS-000259-GPOS-00100, SRG-OS-000324-GPOS-00125, SRG-OS-000337-GPOS-00129, SRG-OS-000362-GPOS-00149
STIG Date
IBM z/OS RACF Security Technical Implementation Guide 2021-07-05

Details

Check Text ( C-25370r514779_chk )
Execute a dataset list of access to SYS1.PARMLIB.

If the ESM data set rules for SYS1.PARMLIB allow inappropriate (e.g., global READ) access, this is a finding.

If data set rules for SYS1.PARMLIB do not restrict READ, WRITE or greater access to only systems programming personnel, this is a finding.

If data set rules for SYS1.PARMLIB do not restrict READ and UPDATE access to only domain level security administrators, this is a finding.

If data set rules for SYS1.PARMLIB do not restrict READ access to only system Level Started Tasks, authorized Data Center personnel, and auditors, this is a finding.

If data set rules for SYS1.PARMLIB do not specify that all (i.e., failures and successes) UPDATE and/or ALTER access will be logged, this is a finding.
Fix Text (F-25358r514780_fix)
Configure access rules for SYS1.PARMLIB as follows:

Systems programming personnel will be authorized to WRITE or greater the SYS1.PARMLIB concatenation.

Domain level security administrators can be authorized to update the SYS1.PARMLIB concatenation.

System Level Started Tasks, authorized Data Center personnel, and auditor can be authorized read access by the ISSO.

All WRITE or greater access is logged.