UCF STIG Viewer Logo

The CA-TSS NPPTHRESH Control Option must be properly set.


Overview

Finding ID Version Rule ID IA Controls Severity
V-223880 TSS0-ES-000070 SV-223880r561402_rule Medium
Description
By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-force attacks, is reduced. Limits are imposed by locking the account.
STIG Date
IBM z/OS TSS Security Technical Implementation Guide 2021-03-30

Details

Check Text ( C-25553r516039_chk )
From the ISPF Command Shell enter:
TSS MODIFY STATUS

If the PTHRESH Control Option value is not set to NPPTHRESH(02), this is a finding.
Fix Text (F-25541r516040_fix)
Evaluate the impact associated with implementation of the control option. Develop a plan of action to implement the control option setting as specified following and proceed with the change.

NPPTHRESH(02)