UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Sensitive CICS transactions are not protected in accordance with the proper security requirements.


Overview

Finding ID Version Rule ID IA Controls Severity
V-224313 ZCICA025 SV-224313r855160_rule Medium
Description
Sensitive CICS transactions offer the ability to circumvent transaction level controls for accessing resources under CICS. These transactions must be protected so that only authorized users can access them. Unauthorized use can result in the compromise of the confidentiality, integrity, and availability of the operating system or customer data.
STIG Date
z/OS IBM CICS Transaction Server for ACF2 Security Technical Implementation Guide 2022-10-06

Details

Check Text ( C-25990r520259_chk )
a) Refer to the following report produced by the z/OS Data Collection:

- EXAM.RPT(CICSPROC)

Refer to the CICS Systems Programmer Worksheets filled out from previous vulnerability ZCIC0010.

b) Browse the ACF2/CICS data set allocated by the ACF2PARM DD statement in the JCL of each CICS procedure.

c) If the PROTLIST parameter is not specified for all CICS regions, there is NO FINDING.

d) If the PROTLIST parameter is specified for any CICS region, this is a FINDING.
Fix Text (F-25978r520260_fix)
The Systems Programmer and IAO will ensure the ACF2/CICS parameter PROTLIST is not coded.

Browse the ACF2/CICS data set allocated by the ACF2PARM DD statement in the JCL of each CICS procedure.

Make sure the PROTLIST parameter is not specified for all CICS regions.