Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-224477 | ZAIDR032 | SV-224477r868295_rule | Medium |
Description |
---|
Access to product resources should be restricted to only those individuals responsible for the application connectivity and who have a requirement to access these resources. Improper control of product resources could potentially compromise the operating system, ACP, and customer data. |
STIG | Date |
---|---|
z/OS Compuware Abend-AID for RACF Security Technical Implementation Guide | 2022-10-07 |
Check Text ( C-26160r868293_chk ) |
---|
Refer to the following report produced by the RACF Data Collection: - DSMON.RPT(RACSPT) Automated Analysis Refer to the following report produced by the RACF Data Collection: - PDI(ZAID0032) If the Compuware Abend-AID started task(s) is (are) defined to the STARTED resource class profile and/or ICHRIN03 table entry, this is not a finding. |
Fix Text (F-26148r868294_fix) |
---|
The ISSO working with the systems programmer will ensure the Compuware Abend-AID Started Task(s) is properly identified and/or defined to the System ACP. A unique userid must be assigned for the Compuware Abend-AID started task(s) thru a corresponding STARTED class entry. The following commands are provided as a sample for defining Started Task(s): rdef started AAVIEWER.** uacc(none) owner(admin) audit(all(read)) - stdata(user(AAVIEWER) group(stc)) rdef started BDCAS.** uacc(none) owner(admin) audit(all(read)) - stdata(user(BDCAS) group(stc)) rdef started TDCAS.** uacc(none) owner(admin) audit(all(read)) - stdata(user(TDCAS) group(stc)) setr racl(started) ref |