UCF STIG Viewer Logo

The CA-TSS INACTIVE Control Option must be properly set.


Overview

Finding ID Version Rule ID IA Controls Severity
V-223954 TSS0-ES-000810 SV-223954r877795_rule Medium
Description
Inactive identifiers pose a risk to systems and applications because attackers may exploit an inactive identifier and potentially obtain undetected access to the system. Owners of inactive accounts will not notice if unauthorized access to their user account has been obtained. Operating systems need to track periods of inactivity and disable application identifiers after 35 days of inactivity.
STIG Date
IBM z/OS TSS Security Technical Implementation Guide 2022-12-14

Details

Check Text ( C-25627r516261_chk )
From the ISPF Command Shell enter:
TSS MODIFY STATUS

If the INACTIVE Control Option is set to a value of "0", this is not a finding.
Fix Text (F-25615r516262_fix)
Evaluate the impact associated with implementation of the control option. Develop a plan of action to set the INACTIVE Control Option to a value of "0" days and proceed with the change.

The INACTIVE Control Option value is set properly with the command:

TSS MODIFY INACTIVE(0)