UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The IBM z/VM ANY Privilege Class must not be listed for privilege commands.


Overview

Finding ID Version Rule ID IA Controls Severity
V-237956 IBMZ-VM-001210 SV-237956r649708_rule Medium
Description
Preventing non-privileged users from executing privileged functions mitigates the risk that unauthorized individuals or processes may gain unnecessary access to information or privileges. Privileged functions include, for example, establishing accounts, performing system integrity checks, or administering cryptographic key management activities. Non-privileged users are individuals that do not possess appropriate authorizations. Circumventing intrusion detection and prevention mechanisms or malicious code protection mechanisms are examples of privileged functions that require protection from non-privileged users.
STIG Date
IBM zVM Using CA VM:Secure Security Technical Implementation Guide 2021-06-16

Details

Check Text ( C-41166r649706_chk )
Examine defined-privileged commands.

If any of the defined-privileged commands are defined with Privilege Class “ANY”, this is a finding.
Fix Text (F-41125r649707_fix)
Review the defined-privileged commands.

Assure that CP privileged commands are not defined with a Privilege Class of “ANY”.