UCF STIG Viewer Logo

JES2 input sources are not properly controlled.


Overview

Finding ID Version Rule ID IA Controls Severity
V-6920 ZJES0022 SV-7221r3_rule DCCS-1 DCCS-2 ECCD-1 ECCD-2 Medium
Description
JES2 input sources provide a variety of channels for job submission. Failure to properly control the use of these input sources could result in unauthorized submission of work into the operating system. This exposure may threaten the integrity and availability of the operating system environment, and compromise the confidentiality of customer data.
STIG Date
z/OS RACF STIG 2015-03-27

Details

Check Text ( C-26022r4_chk )
Refer to the following report produced by the Data Set and Resource Data Collection:

ACF2
- SENSITVE.RPT(JESINPUT)
RACF
- SENSITVE.RPT(JESINPUT)
TSS
- SENSITVE.RPT(WHOHJESI)

Verify that the access authorizations of resources defined to the JESINPUT resource class are restricted to the appropriate personnel. If the guidance is true, this is not a finding.

NOTE: Use common sense during the analysis. For example, access to the offload input sources should be limited to systems personnel (e.g., operations staff).
Fix Text (F-35189r2_fix)
Verify with the IAO that access authorization for resources defined to the JESINPUT resource class is restricted to the appropriate personnel

Grant read access to authorized users for each of the following input sources:

INTRDR
nodename
OFFn.*
OFFn.JR
OFFn.SR
Rnnnn.RDm
RDRnn
STCINRDR
TSUINRDR and/or TSOINRDR

The resource definition will be generic if all of the resources of the same type have identical access controls (e.g., if all off load receivers are equivalent). The default access will be NONE except for sources that are permitted to submit jobs for all users. Those resources may be defined as either NONE or READ.