UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Users that have access to the CONSOLE resource in the TSOAUTH resource class are not properly defined.


Overview

Finding ID Version Rule ID IA Controls Severity
V-7488 ACP00294 SV-7931r2_rule DCCS-1 DCCS-2 ECCD-1 ECCD-2 Medium
Description
MCS consoles can be used to issue operator commands. Failure to properly control access to MCS consoles could result in unauthorized personnel issuing sensitive operator commands. This exposure may threaten the integrity and availability of the operating system environment, and compromise the confidentiality of customer data.
STIG Date
z/OS RACF STIG 2016-01-04

Details

Check Text ( C-5415r1_chk )
a) Refer to the following reports produced by the RACF Data Collection:

- RACFCMDS.RPT(LISTUSER)
- SENSITVE.RPT(OPERCMDS)
- SENSITVE.RPT(TSOAUTH)

b) If the CONSOLE privilege is not defined to the TSOAUTH resource class, there is NO FINDING.

c) At the discretion of the IAO, users may be allowed to issue z/OS system commands from a TSO session. With this in mind, ensure the following items are in effect for users granted the CONSOLE resource in the TSOAUTH resource class:

1) Userids are restricted to the INFO level on the AUTH parameter specified in the OPERPARM segment of their userid.
2) Userids are restricted to READ access to the MVS.MCSOPER.userid resource defined in the OPERCMDS resource class.
3) Userids and/or group IDs are restricted to READ access to the CONSOLE resource defined in the TSOAUTH resource class.

d) If all of the above in (c) are true, there is NO FINDING.

e) If any of the above in (c) are untrue, this is a FINDING.
Fix Text (F-18194r1_fix)
Evaluate the impact of correcting any deficiencies. Develop a plan of action and implement the required changes.
Ensure the following items are in effect for all MCS consoles:

1. Define a profile protecting the use of the CONSOLE command within TSO. A sample command to accomplish this is shown here: RDEF TSOAUTH CONSOLE UACC(NONE) OWNER(ADMIN) AUDIT(ALL(READ))

2. Permit only authorized users. A sample command to accomplish this is shown here: PE CONSOLE CL(TSOAUTH) ID()

3. Set up the OPERPARM segment in corresponding user-class entry. A sample command to accomplish this is shown here: ALU OPERPARM(AUTH(INFO))

4. Userids are restricted to READ access to the MVS.MCSOPER.userid resource defined in the OPERCMDS resource class. A sample command to accomplish this is shown here using the GLOBAL class:

RDEF GLOBAL OPERCMDS ADDMEM(MVS.MCSOPER.&RACUID/READ) OWNER(ADMIN)