UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Non-existent or inaccessible LINKLIST libraries.


Overview

Finding ID Version Rule ID IA Controls Severity
V-100 AAMV0350 SV-100r2_rule DCCS-1 DCCS-2 DCSL-1 Low
Description
LINKLIST libraries give a common access point for the general usage of modules. Many of the subsystems installed on a domain rely upon these modules for proper execution. If the list of libraries found in this LINKLIST is not properly maintained, the integrity of the operating environment is subject to compromise.
STIG Date
z/OS ACF2 STIG 2016-01-04

Details

Check Text ( C-20010r1_chk )
a) Refer to the following report produced by the z/OS Data Collection:

- PARMLIB.ACCESS(LNKLSTxx)

NOTE: The LNKLSTxx reports are only produced if inaccessible libraries exist. The report names represent the actual SYS1.PARMLIB members where inaccessible libraries are found. If these reports do not exist, there is NO FINDING.

Automated Analysis
Refer to the following report produced by the z/OS Data Collection:

- PDI(AAMV0350)

b) If no inaccessible LINKLIST libraries exist, there is NO FINDING.

c) If any inaccessible LINKLIST library exists, this is a FINDING.
Fix Text (F-16984r1_fix)
The systems programmer will ensure that only existing libraries are specified in the Linklist list of libraries.

Review all entries contained in the LINKLIST for the actual existence of each library. Develop a plan of action to correct deficiencies.

The Linklist is a default set of libraries that MVS searches for a specified program. This facility is used so that a user does not have to know the library names in which utility types of programs are stored. Control over membership in the Linklist is specified within the operating system. The data set SYS1.PARMLIB(LNKLSTxx) is used to specify the library names. (The xx is the suffix designated by the LNK parameter in the IEASYSxx member of SYS1.PARMLIB, or overridden by the computer operator at IPL.)

Use the following recommendations and techniques to control the exposures created by the LINKLIST facility:

(1) Avoid inclusion of sensitive libraries in the LNKLSTxx member unless absolutely required.

(2) The LNKLSTxx and PROGxx (LNKLST entries) members will contain only required libraries. On a semi annual basis, Software Support should review the volume serial numbers, and should verify them in accordance with the system catalog. Software Support will remove all non existent libraries. The IAO should modify and/or delete the rules associated with these libraries.