UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Quest NC-Pass will be used by Highly-Sensitive users.


Overview

Finding ID Version Rule ID IA Controls Severity
V-17947 ZNCPR020 SV-40870r1_rule ECCD-1 ECCD-2 Medium
Description
DISA has directed that Quest NC-Pass extended authentication be implemented on all domains. All users with update and alter access to sensitive system-level data sets and resources, or who possess special security privileges, are required to use NC-Pass for extended authentication. Typical personnel required to use NC-Pass include, but are not limited to, systems programming, security, operations, network/communications, storage management, and production control. Improper enforcement of extended authentication through NC-Pass could potentially compromise the operating system, ACP, and customer data.
STIG Date
z/OS Quest NC-Pass for RACF STIG 2015-01-15

Details

Check Text ( C-3299r1_chk )
Refer to the following reports produced by the RACF Data Collection:

- RACFCMDS.RPT(LISTUSER)
- RACFCMDS.RPT(LISTGRP)

If the SECURID group is defined and all sensitive users are connected to the SECURID group, this is not a finding.

NOTE: Sensitive users include systems programming personnel, security personnel, and other staff (e.g., DASD management, operations, auditors, technical support, etc.) with access to sensitive resources (e.g., operator commands, ACP privileges, etc.) that can modify the operating system and system software, and review/modify the security environment.
Fix Text (F-3263r1_fix)
The IAO will ensure that sensitive users are properly validated to Quest NC-Pass.

NOTE: Sensitive users include systems programming personnel, security personnel, and other staff (e.g., DASD management, operations, auditors, technical support, etc.) with access to sensitive resources (e.g., operator commands, ACP privileges, etc.) that can modify the operating system and system software, and review/modify the security environment.

Ensure SECURID is defined to RACF. Use the following RACF AddGroup command:

AG SECURID SUPGROUP(ADMIN) OWNER(ADMIN)

Ensure sensitive users that require NC-Pass validation is connected to the SECURID group. Use the following command:

CO userid GROUP(SECURID) OWNER(SECURID)