|Finding ID||Version||Rule ID||IA Controls||Severity|
|Without information that establishes the identity of the subjects (i.e., users or processes acting on behalf of users) associated with the events, security personnel cannot determine responsibility for the potentially harmful event.|
|IBM z/OS RACF Security Technical Implementation Guide||2022-09-19|
|Check Text ( C-25373r514788_chk )|
| From the ISPF Command Shell enter: |
If the REALDSN is enabled then the message "REAL DATA SET NAMES OPTION IS ACTIVE" will be displayed, this is not a finding.
If the message "REAL DATA SET NAMES OPTION IS INACTIVE" is displayed, this is a finding.
|Fix Text (F-25361r514789_fix)|
| Evaluate the impact associated with implementation of the control option. Configure control option as specified in the example below: |
The RACF Command SETR LIST will show the status of RACF Controls including the value for the REALDSN Option.
REALDSN is ACTIVATED by issuing the command SETR REALDSN.