UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

IEASYMUP resource will be protected in accordance with proper security requirements.


Overview

Finding ID Version Rule ID IA Controls Severity
V-29532 ACP00350 SV-38886r5_rule ECCD-1 ECCD-2 Medium
Description
Failure to properly control access to the IEASYMUP resource could result in unauthorized personnel modifying sensitive z/OS symbolics. This exposure may threaten the integrity and availability of the operating system environment.
STIG Date
z/OS RACF STIG 2016-01-04

Details

Check Text ( C-39208r4_chk )
Refer to the following report produced by the Data Set and Resource Data Collection:

- SENSITVE.RPT(FACILITY)

Automated Analysis
Refer to the following report produced by the Data Set and Resource Data Collection:

- PDI(ACP00350)

Verify that the accesses for IEASYMUP resources and/or generic equivalent are properly restricted. If the following guidance is true, this is not a finding.

___ The RACF resources are defined with a default access of NONE.

___ The RACF resource access authorizations restrict UPDATE and/or greater access to DASD administrators, Tape Library personnel, and system programming personnel.

___ The RACF resource logging requirements are specified.

___ The RACF resource access authorizations are defined with UACC(NONE) and NOWARNING.
Fix Text (F-31250r4_fix)
The IAO will ensure that the System level symbolic resources are defined to the FACILITY resource class and protected. UPDATE access to the System level symbolic resources are limited to System Programmers, DASD Administrators, and/or Tape Library personnel. All access is logged. Ensure the guidelines for the resources and/or generic equivalent are followed.

Limit access to the IEASYMUP resources to above personnel with UPDATE and/or greater access.

The following commands are provided as a sample for implementing resource controls:

rdef facility ieasymup.* uacc(none) owner(admin) -
audit(all(read)) -
data('protected per acp00350')
rdef facility ieasymup.symbolname uacc(none) owner(admin) -
audit(all(read)) -
data('protected per acp00350')

pe ieasymup.symbolname cl(facility) id(pe ieasymup.symbolname cl(facility) id(pe ieasymup.symbolname cl(facility) id(