UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

BMC CONTROL-D security exits are not installed or configured properly.


Overview

Finding ID Version Rule ID IA Controls Severity
V-224107 ZCTD0060 SV-224107r518649_rule Medium
Description
The BMC CONTROL-D security exits enable access authorization checking to BMC CONTROL-D commands, features, and online functionality. If these exit(s) is (are) not in place, activities by unauthorized users may result. BMC CONTROL-D security exit(s) interface with the ACP. If an unauthorized exit was introduced into the operating environment, system security could be weakened or bypassed. These exposures may result in the compromise of the operating system environment, ACP, and customer data.
STIG Date
z/OS BMC CONTROL-D for ACF2 Security Technical Implementation Guide 2022-10-06

Details

Check Text ( C-25780r518647_chk )
Interview the systems programmer responsible for the BMC CONTROL-D. Determine if the site has modified the following security exit(s):

CTDSE01
CTDSE04
CTDSE08
CTDSE19
CTDSE24
CTDSE28

Ensure the above security exit(s) has (have) not been modified.

If the above security exit(s) has (have) been modified, ensure that the security exit(s) has (have) been approved by the site systems programmer and the approval is on file for examination.
Fix Text (F-25768r518648_fix)
The System programmer responsible for the BMC CONTROL-D will review the BMC CONTROL-D operating environment. Ensure that the following security exit(s) is (are) installed properly. Determine if the site has modified the following security exit(s):

CTDSE01
CTDSE04
CTDSE08
CTDSE19
CTDSE24
CTDSE28

Ensure that the security exit(s) has (have) not been modified.

If the security exit(s) has (have) been modified, ensure the security exit(s) has (have) been checked as to not violate any security integrity within the system and approval documentation is on file.