UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

CICS startup JCL statement is not specified in accordance with the proper security requirements.


Overview

Finding ID Version Rule ID IA Controls Severity
V-6893 ZCICA022 SV-7188r2_rule DCCS-1 DCCS-2 ECCD-1 ECCD-2 Medium
Description
The CICS SIT is used to define system operation and configuration parameters of a CICS system. Several of these parameters control the security within a CICS region. Failure to code the appropriate values could result in unexpected operations and degraded security. This exposure may result in unauthorized access impacting the confidentiality, integrity, and availability of the CICS region, applications, and customer data.
STIG Date
z/OS ACF2 STIG 2018-04-04

Details

Check Text ( C-20562r1_chk )
a) Refer to the following report produced by the z/OS Data Collection:

- EXAM.RPT(CICSPROC)

Refer to the CICS Systems Programmer Worksheets filled out from previous vulnerability ZCIC0010.

b) Ensure every CICS region on the system has the ACF2PARM DD statement in the CICS startup JCL.

c) If the item in (b) is true for each CICS region, there is NO FINDING.

d) If the item in (b) is untrue for a CICS region, this is a FINDING.
Fix Text (F-18513r1_fix)
The IAO will ensure that each CICS region procedure has the ACF2/CICS parameter dataset specified.

Ensure every CICS region on the system has the ACF2PARM DD statement in the CICS startup JCL.

View the started task proc for each CICS region in SYS3.PROCLIB using ISPF.