UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The IBM z/OS System Administrator must develop a process to notify appropriate personnel when accounts are modified.


Overview

Finding ID Version Rule ID IA Controls Severity
V-224014 TSS0-OS-000180 SV-224014r877854_rule Medium
Description
Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of reestablishing access. One way to accomplish this is for the attacker to create a new account. Notification of account creation is one method for mitigating this risk. A comprehensive account management process will ensure an audit trail which documents the creation of operating system user accounts and notifies administrators and ISSOs that it exists. Such a process greatly reduces the risk that accounts will be surreptitiously created and provides logging that can be used for forensic purposes. To address access requirements, many operating systems can be integrated with enterprise-level authentication/access/auditing mechanisms that meet or exceed access control policy requirements.
STIG Date
IBM z/OS TSS Security Technical Implementation Guide 2023-03-20

Details

Check Text ( C-25687r516441_chk )
Ask the system Administrator for the documented process to notify appropriate personnel when accounts are modified.

If there is no documented process, this is a finding.
Fix Text (F-25675r516442_fix)
Develop a documented process to notify appropriate personnel when accounts are modified.