Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-223837 | RACF-TS-000020 | SV-223837r877392_rule | High |
Description |
---|
Privileged functions include, for example, establishing accounts, performing system integrity checks, or administering cryptographic key management activities. Non-privileged users are individuals that do not possess appropriate authorizations. Circumventing intrusion detection and prevention mechanisms or malicious code protection mechanisms are examples of privileged functions that require protection from non-privileged users. |
STIG | Date |
---|---|
IBM z/OS RACF Security Technical Implementation Guide | 2023-12-27 |
Check Text ( C-25510r515199_chk ) |
---|
Ask the system administrator to provide a list of all emergency userids available to the site along with the associated function of each. If SYS1.UADS userids are limited and reserved for emergency purposes only, this is not a finding. |
Fix Text (F-25498r515200_fix) |
---|
Configure the SYS1.UADS entries to ensure LOGONIDs defined include only those users required to support specific functions related to system recovery. Evaluate the impact of accomplishing the change. |