UCF STIG Viewer Logo

The CA-TSS NPPTHRESH Control Option must be properly set.


Overview

Finding ID Version Rule ID IA Controls Severity
V-223878 TSS0-ES-000050 SV-223878r877719_rule Medium
Description
By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-force attacks, is reduced. Limits are imposed by locking the account.
STIG Date
IBM z/OS TSS Security Technical Implementation Guide 2022-12-14

Details

Check Text ( C-25551r516033_chk )
From the ISPF Command Shell enter:
TSS MODIFY STATUS

If the NPPTHRESH Control Option value is not set to NPWRTHRESH(02), this is a finding.
Fix Text (F-25539r516034_fix)
Evaluate the impact associated with implementation of the control option. Develop a plan of action to implement the control option setting as specified following and proceed with the change.

NPPTHRESH(02)