V-78887 | High | The IBM z/VM TCP/IP VMSSL command operands must be configured properly. | VMSSL services are initiated using the VMSSL command defined in the DTCPARMS file. Unapproved mechanisms that are used for authentication to the cryptographic module are not verified and therefore... |
V-78869 | High | CA VM:Secure product Password Encryption (PEF) option must be properly configured to store and transmit cryptographically-protected passwords. | Passwords need to be protected at all times, and encryption is the standard method for protecting passwords. If passwords are not encrypted, they can be plainly read (i.e., clear text) and easily... |
V-78841 | High | CA VM:Secure product Rules Facility must be installed and operating. | Enterprise environments make account management for operating systems challenging and complex. A manual process for account management functions adds the risk of a potential oversight or other... |
V-78843 | High | The IBM z/VM TCP/IP DTCPARMS files must be properly configured to connect to an external security manager. | A comprehensive account management process such as provided by External Security Managers (ESM) which includes automation helps to ensure accounts designated as requiring attention are... |
V-78849 | Medium | The CA VM:Secure JOURNAL Facility parameters must be set for lockout after 3 attempts. | By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-force attacks, is reduced. Limits are imposed by... |
V-78969 | Medium | CA VM:Secure Product SFS configuration file must be restricted to appropriate personnel. | Configuring the operating system to implement organization-wide security implementation guides and security checklists ensures compliance with federal standards and establishes a common security... |
V-78879 | Medium | CA VM:Secure product Config Delay LOG option must be set to 0. | IBM z/VM 6.4.0 made changes to obscure whether a logon is invalid due to the user ID or due to the password. Both the logon prompting sequence and the message HCPLGA050E were changed. However,... |
V-78845 | Medium | CA VM:Secure product must be installed and operating. | A comprehensive account management process such as provided by an External Security Manager (ESM) which includes automation helps to ensure accounts designated as requiring attention are... |
V-78993 | Medium | The IBM z/VM systems requiring data at rest must employ IBMs DS8000 for full disk encryption. | Operating systems handling data requiring "data at rest" protections must employ cryptographic mechanisms to prevent unauthorized disclosure and modification of the information at rest.
Selection... |
V-78927 | Medium | The IBM z/VM Portmapper server virtual machine userID must be included in the AUTOLOG statement of the TCP/IP server configuration file. | Without authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. Bidirectional authentication provides stronger safeguards to validate... |
V-78967 | Medium | CA VM:Secure product CONFIG file must be restricted to appropriate personnel. | Configuration settings are the set of parameters that can be changed in hardware, software, or firmware components of the system that affect the security posture and/or functionality of the... |
V-78921 | Medium | The IBM z/VM journal minidisk space allocation must be large enough for one weeks worth of audit records. | In order to ensure operating systems have a sufficient storage capacity in which to write the audit logs, operating systems need to be able to allocate audit record storage capacity.
The task of... |
V-78859 | Medium | The IBM z/VM TCP/IP configuration must include an SSLSERVERID statement. | The Secure Socket Layer (SSL) server, provides processing support for secure (encrypted) communication between remote clients and z/VM TCP/IP application servers that are configured for secure... |
V-78863 | Medium | The IBM z/VM Journal option must be specified in the Product Configuration File. | Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an... |
V-78857 | Medium | For FTP processing Z/VM TCP/IP FTP server Exit must be enabled. | Remote access services, such as those providing remote access to network devices and information systems, which lack automated monitoring capabilities, increase risk and make remote user access... |
V-78855 | Medium | The IBM z/VM LOGO configuration file must be configured to display the Standard Mandatory DoD Notice and Consent Banner until users acknowledge the usage conditions and take explicit actions to log on for further access. | The banner must be acknowledged by the user prior to allowing the user access to the operating system. This provides assurance that the user has seen the message and accepted the conditions for... |
V-78989 | Medium | The IBM z/VM system administrator must develop and perform a procedure to validate the correct operation of security functions. | Without verification of the security functions, security functions may not operate correctly and the failure may go unnoticed. Security function is defined as the hardware, software, and/or... |
V-78851 | Medium | The IBM z/VM LOGO Configuration file must be configured to display the Standard Mandatory DoD Notice and Consent Banner before granting local or remote access to the system. | Display of a standardized and approved use notification before granting access to the operating system ensures privacy and security notification verbiage used is consistent with applicable federal... |
V-78985 | Medium | IBM z/VM system administrator must develop procedures to manually control temporary, interactive, and emergency accounts. | Proper handling of temporary, inactive, and emergency accounts require automatic notification and action rather than at the convenience of the systems administrator. However in the absence of... |
V-78987 | Medium | IBM z/VM must have access to an audit reduction tool that allows for central data review and analysis. | Audit reduction is a process that manipulates collected audit information and organizes such information in a summary format that is more meaningful to analysts. Audit reduction and report... |
V-78903 | Medium | IBM z/VM tapes must use Tape Encryption. | Information at rest refers to the state of information when it is located on a secondary storage device (e.g., disk drive and tape drive, when used for backups) within an operating system.
Guest... |
V-78981 | Medium | The IBM z/VM System administrator must develop routines and processes for notification in the event of audit failure. | Audit processing failures include, for example, software/hardware errors, failures in the audit capturing mechanisms, and audit storage capacity being reached or exceeded. Without proper... |
V-78881 | Medium | CA VM:Secure product NORULE record in the SECURITY CONFIG file must be configured to REJECT. | To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DoD-approved PKIs, all DoD systems (e.g., web servers and web portals) must... |
V-78983 | Medium | The IBM z/VM system administrator must develop procedures maintaining information system operation in the event of anomalies. | If anomalies are not acted upon, security functions may fail to secure the system. |
V-78905 | Medium | The IBM z/VM TCP/IP must be configured to display the mandatory DoD Notice and Consent banner before granting access to the system. | Display of a standardized and approved use notification before granting access to the publicly accessible operating system ensures privacy and security notification verbiage used is consistent... |
V-78891 | Medium | CA VM:Secure product ADMIN GLOBALS command must be restricted to systems programming personnel. | Operating system management functionality includes functions necessary for administration and requires privileged user access. Allowing non-privileged users to access operating system management... |
V-78847 | Medium | The IBM z/VM JOURNALING LOGON parameter must be set for lockout after 3 attempts for 15 minutes. | By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-force attacks, is reduced. Limits are imposed by... |
V-78901 | Medium | The IBM z/VM TCP/IP PENDINGCONNECTIONLIMIT statement must be properly configured. | DoS is a condition when a resource is not available for legitimate users. When this occurs, the organization either cannot accomplish its mission or must operate at degraded capacity.
Managing... |
V-78895 | Medium | The IBM z/VM SYSTEM CONFIG file must be configured to clear TDISK on IPL. | Preventing unauthorized information transfers mitigates the risk of information, including encrypted representations of information, produced by the actions of prior users/roles (or the actions of... |
V-78941 | Medium | All IBM z/VM TCP/IP servers must be configured for SSL/TLS connection. | Information can be either unintentionally or maliciously disclosed or modified during preparation for transmission, for example, during aggregation, at protocol transformation points, and during... |
V-78943 | Medium | The IBM z/VM TCP/IP SECURETELNETCLIENT option for telnet must be set to YES. | Information can be either unintentionally or maliciously disclosed or modified during preparation for transmission, for example, during aggregation, at protocol transformation points, and during... |
V-78923 | Medium | CA VM:Secure product audit records must offload audit records to a different system or media. | Information stored in one location is vulnerable to accidental or incidental deletion or alteration.
Off-loading is a common process in information systems with limited audit storage capacity. |
V-78947 | Medium | The IBM z/VM TCP/IP DOMAINLOOKUP statement must be properly configured. | If data origin authentication and data integrity verification are not performed, the resultant response could be forged, it may have come from a poisoned cache, the packets could have been... |
V-78933 | Medium | The IBM z/VM CP Privilege Class A, B, and D must be restricted to appropriate system operators. | Preventing non-privileged users from executing privileged functions mitigates the risk that unauthorized individuals or processes may gain unnecessary access to information or... |
V-78939 | Medium | IBM z/VM TCP/IP config file INTERNALCLIENTPARMS statement must be properly configured. | Remote access services, such as those providing remote access to network devices and information systems, which lack automated control capabilities, increase risk and make remote user access... |
V-78937 | Medium | The IBM z/VM TCP/IP SECUREDATA option for FTP must be set to REQUIRED. | Information can be either unintentionally or maliciously disclosed or modified during preparation for transmission, for example, during aggregation, at protocol transformation points, and during... |
V-78963 | Medium | CA VM:Secure product DASD CONFIG file must be restricted to appropriate personnel. | Configuring the operating system to implement organization-wide security implementation guides and security checklists ensures compliance with federal standards and establishes a common security... |
V-78877 | Medium | IBM z/VM must be configured to disable non-essential capabilities. | It is detrimental for operating systems to provide, or install by default, functionality exceeding requirements or mission objectives. These unnecessary capabilities or services are often... |
V-78929 | Medium | CA VM:Secure product MANAGE command must be restricted to system administrators. | Discretionary Access Control (DAC) is based on the notion that individual users are "owners" of objects and therefore have discretion over who should be authorized to access the object and in... |
V-78907 | Medium | The IBM z/VM JOURNALING statement must be coded on the configuration file. | If auditing is enabled late in the start-up process, the actions of some start-up processes may not be audited. Some audit systems also maintain state information only available if auditing is... |
V-78961 | Medium | CA VM:Secure product VMXRPI configuration file must be restricted to authorized personnel. | Configuring the operating system to implement organization-wide security implementation guides and security checklists ensures compliance with federal standards and establishes a common security... |
V-78885 | Medium | The IBM z/VM Security Manager must provide a procedure to disable userIDs after 35 days of inactivity. | Inactive identifiers pose a risk to systems and applications because attackers may exploit an inactive identifier and potentially obtain undetected access to the system. Owners of inactive... |
V-78875 | Medium | IBM zVM CA VM:Secure product PASSWORD user exit must be in use. | The shorter the password, the lower the number of possible combinations that need to be tested before the password is compromised.
Password complexity, or strength, is a measure of the... |
V-78949 | Medium | The IBM z/VM TCP/IP NSINTERADDR statement must be present in the TCPIP DATA configuration. | If data origin authentication and data integrity verification are not performed, the resultant response could be forged, it may have come from a poisoned cache, the packets could have been... |
V-78945 | Medium | The IBM z/VM TCP/IP NSLOOKUP statement for UFT servers must be properly configured. | If data origin authentication and data integrity verification are not performed, the resultant response could be forged, it may have come from a poisoned cache, the packets could have been... |
V-78867 | Medium | The IBM z/VM TCP/IP Key database for LDAP or SSL server must be created with the proper permissions. | If the private key is discovered, an attacker can use the key to authenticate as an authorized user and gain access to the network infrastructure.
The cornerstone of the PKI is the private key... |
V-78865 | Medium | All digital certificates in use must have a valid path to a trusted Certification authority. | Without path validation, an informed trust decision by the relying party cannot be made when presented with any certificate not already explicitly trusted.
A trust anchor is an authoritative... |
V-78889 | Medium | The IBM z/VM TCP/IP ANONYMOU statement must not be coded in FTP configuration. | Operating systems utilizing encryption are required to use FIPS-compliant mechanisms for authenticating to cryptographic modules. |
V-78853 | Medium | The IBM z/VM TCP/IP FTP Server must be configured to display the Standard Mandatory DoD Notice and Consent Banner before granting local or remote access to the system and until users acknowledge the usage conditions and take explicit actions to log on for further access. | The banner must be acknowledged by the user prior to allowing the user access to the operating system. This provides assurance that the user has seen the message and accepted the conditions for... |
V-78975 | Medium | The IBM z/VM System administrator must develop a notification routine for account management. | Information system accounts are utilized for identifying individual users or for identifying the operating system processes themselves. In order to detect and respond to events affecting user... |
V-78897 | Medium | The IBM z/VM TCP/IP FOREIGNIPCONLIMIT statement must be properly configured. | DoS is a condition when a resource is not available for legitimate users. When this occurs, the organization either cannot accomplish its mission or must operate at degraded capacity.
Managing... |
V-78977 | Medium | The IBM z/VM system administrator must develop routines and processes for the proper configuration and maintenance of Software. | Proper configuration management procedures for information systems provide for the proper configuration and maintenance in accordance with local policies restrictions and/or rules. Failure to... |
V-78925 | Medium | CA VM:Secure product audit records must be offloaded on a weekly basis. | Information stored in one location is vulnerable to accidental or incidental deletion or alteration.
Off-loading is a common process in information systems with limited audit storage capacity. |
V-78971 | Medium | CA VM:Secure product Rules Facility must be restricted to appropriate personnel. | Configuring the operating system to implement organization-wide security implementation guides and security checklists ensures compliance with federal standards and establishes a common security... |
V-78959 | Medium | The IBM z/VM ANY Privilege Class must not be listed for privilege commands. | Preventing non-privileged users from executing privileged functions mitigates the risk that unauthorized individuals or processes may gain unnecessary access to information or... |
V-78973 | Medium | IBM z/VM must employ a Session manager. | A session manager controls the semi-permanent interactive information interchange, also known as a dialogue, between a user and z/VM. Without the use of a session manager these semi-permanent... |
V-78917 | Medium | The IBM z/VM Privilege command class A and Class B must be properly assigned. | Allowing regular users to install software, without explicit privileges, creates the risk that untested or potentially malicious software will be installed on the system. Explicit privileges... |
V-78893 | Medium | CA VM:Secure must have a security group for Security Administrators only. | An isolation boundary provides access control and protects the integrity of the hardware, software, and firmware that perform security functions.
Security functions are the hardware, software,... |
V-78965 | Medium | CA VM:Secure product AUTHORIZ CONFIG file must be restricted to appropriate personnel. | Configuring the operating system to implement organization-wide security implementation guides and security checklists ensures compliance with federal standards and establishes a common security... |
V-78979 | Medium | IBM z/VM must be protected by an external firewall that has a deny-all, allow-by-exception policy. | Firewalls protect computers from network attacks by blocking or limiting access to open network ports. Firewalls provide monitoring and control of communications at the external boundary of an... |
V-78883 | Medium | All IBM z/VM TCP/IP Ports must be restricted to ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments. | In order to prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e., embedding of data types within data types), organizations must... |
V-78991 | Medium | IBM z/VM must employ Clock synchronization software. | Inaccurate time stamps make it more difficult to correlate events and can lead to an inaccurate analysis. Determining the correct time a particular event occurred on a system is critical when... |
V-78871 | Medium | CA VM:Secure product AUTOEXP record in the Security Config File must be properly set. | Any password, no matter how complex, can eventually be cracked. Therefore, passwords need to be changed periodically. If the operating system does not limit the lifetime of passwords and force... |
V-78931 | Medium | The CA VM:Secure LOGONBY command must be restricted to system administrators. | In certain situations, software applications/programs need to execute with elevated privileges to perform required functions. However, if the privileges required for execution are at a higher... |
V-78915 | Medium | The IBM z/VM must restrict link access to the disk on which system software resides. | If the operating system were to allow any user to make changes to software libraries, then those changes might be implemented without undergoing the appropriate testing and approvals that are part... |
V-78899 | Medium | The IBM z/VM TCP/IP PERSISTCONNECTIONLIMIT statement must be properly configured. | DoS is a condition when a resource is not available for legitimate users. When this occurs, the organization either cannot accomplish its mission or must operate at degraded capacity.
Managing... |
V-78913 | Medium | IBM z/VM must remove or disable emergency accounts after the crisis is resolved or 72 hours. | Emergency accounts are privileged accounts that are established in response to crisis situations where the need for rapid account activation is required. Therefore, emergency account activation... |
V-78955 | Medium | The IBM z/VM Privilege Classes C and E must be restricted to appropriate system administrators. | Preventing non-privileged users from executing privileged functions mitigates the risk that unauthorized individuals or processes may gain unnecessary access to information or... |
V-78911 | Medium | The IBM z/VM AUDT and Journal Mini Disks must be restricted to the appropriate system administrators. | Protecting audit information also includes identifying and protecting the tools used to view and manipulate log data. Therefore, protecting audit tools is necessary to prevent unauthorized... |
V-78953 | Medium | The IBM z/VM DOMAINSEARCH statement in the TCPIP DATA file must be configured with proper domain names for name resolution. | If data origin authentication and data integrity verification are not performed, the resultant response could be forged, it may have come from a poisoned cache, the packets could have been... |
V-78909 | Medium | CA VM:Secure product SECURITY CONFIG file must be restricted to appropriate personnel. | Protecting audit information also includes identifying and protecting the tools used to view and manipulate log data. Therefore, protecting audit tools is necessary to prevent unauthorized... |
V-78951 | Medium | The IBM z/VM CHECKSUM statement must be included in the TCP/IP configuration file. | If data origin authentication and data integrity verification are not performed, the resultant response could be forged, it may have come from a poisoned cache, the packets could have been... |
V-78873 | Medium | CA VM:Secure product PASSWORD user exit must be coded with the PWLIST option properly set. | Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. If the information system or application allows the... |
V-78957 | Medium | The IBM z/VM Privilege Class F must be restricted to service representatives and system administrators only. | Preventing non-privileged users from executing privileged functions mitigates the risk that unauthorized individuals or processes may gain unnecessary access to information or... |
V-78935 | Medium | The IBM z/VM JOURNALING statement must be properly configured. | By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-forcing, is reduced. Limits are imposed by locking the account. |
V-78919 | Medium | CA VM:Secure AUTHORIZ CONFIG file must be properly configured. | Failure to provide logical access restrictions associated with changes to system configuration may have significant effects on the overall security of the system.
When dealing with access... |
V-78861 | Medium | CA VM:Secure product AUDIT file must be restricted to authorized personnel. | Unauthorized disclosure of audit records can reveal system and configuration data to attackers, thus compromising its confidentiality.
Audit information includes all information (e.g., audit... |