UCF STIG Viewer Logo

The CA VM:Secure LOGONBY command must be restricted to system administrators.


Overview

Finding ID Version Rule ID IA Controls Severity
V-237942 IBMZ-VM-000990 SV-237942r649666_rule Medium
Description
In certain situations, software applications/programs need to execute with elevated privileges to perform required functions. However, if the privileges required for execution are at a higher level than the privileges assigned to organizational users invoking such applications/programs, those users are indirectly provided with greater privileges than assigned by the organizations. The LOGONBY statement designates up to eight user IDs that can use their own passwords to log on to and use the virtual machine.
STIG Date
IBM zVM Using CA VM:Secure Security Technical Implementation Guide 2021-06-16

Details

Check Text ( C-41152r649664_chk )
Examine the CA VM:Secure Rules facility for “LOGONBY” rules.

If the “LOGONBY” rules specifies users that are not system administrators, this is a finding.
Fix Text (F-41111r649665_fix)
Assure that any “LOGONBY” rules in the CA VM:Secure Rules Facility only specifies users who are system administrators.