UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

z/OS CL/SuperSession for TSS Security Technical Implementation Guide


Overview

Date Finding Count (10)
2024-02-19 CAT I (High): 0 CAT II (Med): 10 CAT III (Low): 0
STIG Description
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.

Available Profiles



Findings (MAC III - Administrative Sensitive)

Finding ID Severity Title
V-224649 Medium CL/SuperSession profile options are set improperly.
V-224658 Medium CL/SuperSession APPCLASS member is not configured in accordance with the proper security requirements.
V-224656 Medium CL/SuperSession's Resouce Class is not defined or active in the ACP.
V-224657 Medium CL/SuperSession KLVINNAM member must be configured in accordance with security requirements.
V-224654 Medium CL/SuperSession Started task(s) must be properly defined to the Started Task Table ACID for Top Secret.
V-224655 Medium CL/SuperSession is not properly defined to the Facility Matrix Table for Top Secret.
V-224652 Medium CL/SuperSession STC data sets must be properly protected.
V-224653 Medium CL/SuperSession Started Task name is not properly identified / defined to the system ACP.
V-224650 Medium CL/SuperSession must be properly configured to generate SMF records for audit trail and accounting reports.
V-224651 Medium CL/SuperSession Install data sets must be properly protected.