UCF STIG Viewer Logo

The Mainframe Product must protect against an individual (or process acting on behalf of an individual) falsely denying having performed actions defined in the site security plan to be covered by non-repudiation.


Overview

Finding ID Version Rule ID IA Controls Severity
V-68179 SRG-APP-000080-MFP-000102 SV-82669r1_rule Medium
Description
Without non-repudiation, it is impossible to positively attribute an action to an individual (or process acting on behalf of an individual). Non-repudiation services can be used to determine if information originated from a particular individual, or if an individual took specific actions (e.g., sending an email, signing a contract, approving a procurement request) or received specific information. Non-repudiation protects individuals against later claims by an author of not having authored a particular document, a sender of not having transmitted a message, a receiver of not having received a message, or a signatory of not having signed a document. The application will be configured to provide non-repudiation services for an organization-defined set of commands that are used by the user (or processes action on behalf of the user). DoD PKI provides for non-repudiation through the use of digital signatures. Non-repudiation requirements will vary from one application to another and will be defined based on application functionality, data sensitivity and mission requirements.
STIG Date
Mainframe Product Security Requirements Guide 2017-06-22

Details

Check Text ( C-68741r1_chk )
If the Mainframe Product does not perform tasks on the behalf of other users, this is not applicable.

Examine configuration settings.

Determine whether settings identify initiating user for authentication. If it does not, this is a finding.
Fix Text (F-74295r1_fix)
Configure the Mainframe Product to identify initiating user for authentication for all tasks.