UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The CA-TSS NPPTHRESH Control Option must be properly set.


Overview

Finding ID Version Rule ID IA Controls Severity
V-223878 TSS0-ES-000050 SV-223878r877719_rule Medium
Description
By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-force attacks, is reduced. Limits are imposed by locking the account.
STIG Date
IBM z/OS TSS Security Technical Implementation Guide 2024-02-22

Details

Check Text ( C-25551r516033_chk )
From the ISPF Command Shell enter:
TSS MODIFY STATUS

If the NPPTHRESH Control Option value is not set to NPWRTHRESH(02), this is a finding.
Fix Text (F-25539r516034_fix)
Evaluate the impact associated with implementation of the control option. Develop a plan of action to implement the control option setting as specified following and proceed with the change.

NPPTHRESH(02)