UCF STIG Viewer Logo

The IBM z/VM CP Privilege Class A, B, and D must be restricted to appropriate system operators.


Overview

Finding ID Version Rule ID IA Controls Severity
V-237943 IBMZ-VM-001010 SV-237943r851951_rule Medium
Description
Preventing non-privileged users from executing privileged functions mitigates the risk that unauthorized individuals or processes may gain unnecessary access to information or privileges. Privileged functions include, for example, establishing accounts, performing system integrity checks, or administering cryptographic key management activities. Non-privileged users are individuals that do not possess appropriate authorizations. Circumventing intrusion detection and prevention mechanisms or malicious code protection mechanisms are examples of privileged functions that require protection from non-privileged users.
STIG Date
IBM zVM Using CA VM:Secure Security Technical Implementation Guide 2022-08-31

Details

Check Text ( C-41153r649667_chk )
Examine user directory definitions to determine CP Privilege class.

If CP Privilege Class A, B, or D is assigned to non-privilege users, this is a finding.
Fix Text (F-41112r649668_fix)
Ensure that non-privilege users are not assigned CP Privilege Class A, B, or D.