UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Number of control ACIDs is not justified and properly assigned.


Overview

Finding ID Version Rule ID IA Controls Severity
V-239 TSS0910 SV-239r2_rule DCCS-1 DCCS-2 Medium
Description
Since the control ACIDs are the security administrators and can execute security modification commands, it is important that this level of access be restricted to a limited number of ACIDs. The fewer control ACIDs that there are, the more accountability and control there is over the security database.
STIG Date
z/OS TSS STIG 2017-06-26

Details

Check Text ( C-20050r1_chk )
a) Refer to the following report produced by the TSS Data Collection:

- TSSCMDS.RPT(@SCA)

b) TYPE=CENTRAL, TYPE=MASTER or also known as “SCA” and “MSCA” level of ACIDS shall adhere to the following restrictions based upon documented role/function an individual performs:

1) Domain level Information Assurance Officer (IAO) – full administrative authorities and access rights needed to perform required and documented role/responsibilities/function.
2) Assistance Domain Level Information Assurance Officer or “backup” or IAO (up to same access as b.1 ).
3) DISA FSO SRR Auditor, DoD IG Auditor, SAS70 Auditor – only “view” administrative authorities shall be granted and only for those roles/functions that have been formally documented as DISA, DoD IG or SAS70 Auditors and approved by the DISA DAA for those position/functions/roles.

Exception: Until scoping is worked out and resolved, DISA OST team members may be defined as TYPE=CENTRAL with limited authority such as ACID(INFO,MAINTAIN). All OST Team member ACIDS shall be changed to TYPE=LIMITED and scoped accordingly to allow password resets upon verification of users, yet to limit and eliminate any potential risk associated with resetting of MSCA or other SCA level accounts. NO Other exceptions shall exist.

c) Determine if TYPE=CENTRAL and TYPE=MASTER are assigned accordingly to (b.1) – (b.3) above.

d) If all are assigned according to (b.1) – (b.3) there is NO FINDING.

e) If any are NOT assigned according to (b.1) – (b.3), there is a FINDING.
Fix Text (F-18190r1_fix)
Review all security administrator ACIDs. Evaluate the impact of correcting the deficiency. Develop a plan of action and reduce the number of control ACIDs if not justified. Use information below as guidance.

TYPE=CENTRAL, TYPE=MASTER or also known as “SCA” and “MSCA” level of ACIDS shall adhere to the following restrictions based upon documented role/function an individual performs:

1) Domain level Information Assurance Officer (IAO) – full administrative authorities and access rights needed to perform required and documented role/responsibilities/function.
2) Assistance Domain Level Information Assurance Officer or “backup” or IAO (up to same access as 1 ).
3) DISA FSO SRR Auditor, DoD IG Auditor, SAS70 Auditor – only “view” administrative authorities shall be granted and only for those roles/functions that have been formally documented as DISA, DoD IG or SAS70 Auditors and approved by the DISA DAA for those position/functions/roles.

Exception: Until scoping is worked out and resolved, DISA OST team members may be defined as TYPE=CENTRAL with limited authority such as ACID(INFO,MAINTAIN). All OST Team member ACIDS shall be changed to TYPE=LIMITED and scoped accordingly to allow password resets upon verification of users, yet to limit and eliminate any potential risk associated with resetting of MSCA or other SCA level accounts. NO Other exceptions shall exist.