UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Procedures are not in place to ensure all LOGONIDs with the READALL attribute are used and controlled.


Overview

Finding ID Version Rule ID IA Controls Severity
V-175 ACF0790 SV-175r2_rule DCCS-1 DCCS-2 Medium
Description
READALL allows the individual to view any file and violates the principle of least privilege. This could result in the compromise of the confidentiality of customer data.
STIG Date
z/OS ACF2 STIG 2016-06-30

Details

Check Text ( C-269r1_chk )
a) Refer to the following report produced by the ACF2 Data Collection:

- ACF2CMDS.RPT(ATTREDAL)

b) If procedures are in place to ensure logonids with the READALL attribute are used and controlled in accordance with the DISA requirements, there is NO FINDING.

c) If procedures are not in place to ensure logonids with the READALL attribute are used and controlled in accordance with the DISA requirements, this is a FINDING.
Fix Text (F-17071r1_fix)
The IAO will ensure that procedures are in place to control Logonids with the READALL attribute.

The READALL privilege is available for actual auditing of system data. It gives the capability of looking at every data set on the system despite the data set rules. Its use is strongly discouraged. Always grant access through the use of standard data set access rules. Under no circumstances will the privilege be used as a convenience to the person maintaining the rule sets. Only use this privilege when absolutely necessary, and only give it to auditors. Remove the privilege once the audit is complete. Fully document the granting and revoking of the access.