UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Users that have access to the CONSOLE resource in the TSOAUTH resource class are not properly defined.


Overview

Finding ID Version Rule ID IA Controls Severity
V-7488 ACP00294 SV-7930r2_rule DCCS-1 DCCS-2 ECCD-1 ECCD-2 Medium
Description
MCS consoles can be used to issue operator commands. Failure to properly control access to MCS consoles could result in unauthorized personnel issuing sensitive operator commands. This exposure may threaten the integrity and availability of the operating system environment, and compromise the confidentiality of customer data.
STIG Date
z/OS ACF2 STIG 2018-12-20

Details

Check Text ( C-19522r1_chk )
a) Refer to the following reports produced by the ACF2 Data Collection and Data Set and Resource Data Collection:

- SENSITVE.RPT(TSOAUTH)
- ACF2CMDS.RPT(ATTCONSL)
- ACF2CMDS.RPT(OPERPARM)
- SENSITVE.RPT(OPERCMDS)
- ACF2CMDS.RPT(RESOURCE) – Alternate report

NOTE: If CLASMAP defines TSOAUTH or OPERCMDS as anything other than the default of TYPE(TSO) or TYPE(OPR), replace TSO or OPR below with the appropriate three letters.

b) If the CONSOLE resource is not defined to the TSOAUTH resource class, there is NO FINDING.

c) At the discretion of the IAO, users may be allowed to issue z/OS system commands from a TSO session. With this in mind, ensure the following items are in effect for users granted the CONSOLE resource in the TSOAUTH resource class or users assigned the CONSOLE attribute:

1) Logonids are restricted to the INFO level on the AUTH field specified in the OPERPARM segment of the user profile record.
2) Logonids are restricted to READ access to the MVS.MCSOPER.userid resource defined in the OPERCMDS resource class (i.e., resource rules for TYPE(OPR)).

d) If all of the above are true, there is NO FINDING.

e) If any of the above are untrue, this is a FINDING.
Fix Text (F-17973r1_fix)
The IAO will ensure that all users that have access to the CONSOLE resource in the TSOAUTH resource class are properly defined.

Ensure the CONSOLE resource is not defined to the TSOAUTH resource class.

Example:

$KEY(CONSOLE) TYPE(TSO)
- UID(*) PREVENT

At the discretion of the IAO, users may be allowed to issue z/OS system commands from a TSO session. With this in mind, ensure the following items are in effect for users granted the CONSOLE resource in the TSOAUTH resource class or users assigned the CONSOLE attribute:

Logonids are restricted to the INFO level on the AUTH field specified in the OPERPARM segment of the user profile record.

Logonids are restricted to READ access to the MVS.MCSOPER.userid resource defined in the OPERCMDS resource class (i.e., resource rules for TYPE(OPR)).

Example:

$KEY(MVS) TYPE(OPR)
MCSOPER.logonid UID(syspaudt) SERVICE(READ) ALLOW

COMPILE ' ACF2.MVA.OPR(MVS)' STORE

F ACF2,REBUILD(OPR)