UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

BPX resource(s) is(are) not protected in accordance with security requirements.


Overview

Finding ID Version Rule ID IA Controls Severity
V-6968 ZUSS0021 SV-7271r2_rule DCCS-1 DCCS-2 ECCD-1 ECCD-2 Medium
Description
OS/390 UNIX ACP-defined resources consist of sensitive capabilities including SUPERUSER, daemon, and numerous file manipulation privileges. Missing or inaccurate protection of these resources could allow a user to access sensitive data, modify or delete data and operating system controls, or issue commands that could negatively impact system availability.
STIG Date
z/OS ACF2 STIG 2017-03-22

Details

Check Text ( C-3879r1_chk )
a) Refer to the following report produced by the ACF2 Data Collection and Data Set and Resource Data Collection:

- SENSITVE.RPT(FACILITY)
- ACF2CMDS.RPT(RESOURCE) – Alternate report

Automated Analysis
Refer to the following report produced by the Data Set and Resource Data Collection:

- PDI(ZUSS0021)

b) Review the following items for the FACILITY resource class, TYPE(FAC):

1) The ACF2 rules for the BPX resource specify a default access of NONE.
2) There are no ACF2 rules that allow access to the BPX resource.
3) There is no ACF2 rule for BPX.SAFFASTPATH defined.
4) The ACF2 rules for each of the BPX resources listed in the General Facility Class BPX Resources Table, in the z/OS STIG Addendum, specify a default access of NONE.
5) The ACF2 rules for each of the BPX resources listed in the General Facility Class BPX Resources Table, in the z/OS STIG Addendum, restrict access to appropriate system tasks or systems programming personnel.

c) If any item in (b) is untrue, this is a FINDING.

d) If all items in (b) are true, this is NOT A FINDING.
Fix Text (F-18726r1_fix)
The Systems Programmer and IAO will ensure that BPX. Resources are properly protected and access is restricted to appropriate system tasks or systems programming personnel.

Ensure the following items for the FACILITY resource class, TYPE(FAC):

1) The ACF2 rules for the BPX resource specify a default access of NONE.

Example:

$KEY(BPX) TYPE(FAC)
- UID(*) PREVENT

2) There are no ACF2 rules that allow access to the BPX resource.

Example:

$KEY(BPX) TYPE(FAC)
- UID(*) PREVENT

3) There is no ACF2 rule for BPX.SAFFASTPATH defined.

Example:

$KEY(BPX) TYPE(FAC)
SAFFASTPATH UID(*) PREVENT

4) The ACF2 rules for each of the BPX resources listed in the General Facility Class BPX Resources Table, in the zOS STIG Addendum, specify a default access of NONE.

Example:

$KEY(BPX) TYPE(FAC)
DAEMON UID(*) PREVENT
DEBUG UID(*) PREVENT
FILEATTR.APF UID(*) PREVENT
FILEATTR.PROGCTL UID(*) PREVENT
JOBNAME UID(*) PREVENT
SAFFASTPATH UID(*) PREVENT
SERVER UID(*) PREVENT
SMF UID(*) PREVENT
STOR.SWAP UID(*) PREVENT
SUPERUSER UID(*) PREVENT
WLMSERVER UID(*) PREVENT

5) The ACF2 rules for each of the BPX resources listed in the General Facility Class BPX Resources Table, in the zOS STIG Addendum, restrict access to appropriate system tasks or systems programming personnel as specified.

Example:

$KEY(BPX) TYPE(FAC)
DAEMON UID(*******STC******FTPD) SERVICE(READ) LOG
DAEMON UID(*******STC******INETD) SERVICE(READ) LOG
DAEMON UID(*******STC******NAMED) SERVICE(READ) LOG
DAEMON UID(*******STC******OMVSKERN) SERVICE(READ) LOG
DAEMON UID(*******STC******OMVS) SERVICE(READ) LOG
DAEMON UID(*******STC******OROUTED) SERVICE(READ) LOG
DAEMON UID(*******STC******OSNMPD) SERVICE(READ) LOG