UCF STIG Viewer Logo

JES2 input sources must be properly controlled.


Overview

Finding ID Version Rule ID IA Controls Severity
V-6920 ZJES0022 SV-74867r1_rule Medium
Description
JES2 input sources provide a variety of channels for job submission. Failure to properly control the use of these input sources could result in unauthorized submission of work into the operating system. This exposure may threaten the integrity and availability of the operating system environment, and compromise the confidentiality of customer data.
STIG Date
z/OS TSS STIG 2019-12-12

Details

Check Text ( C-165r3_chk )
Refer to the following report produced by the Data Set and Resource Data Collection:

- SENSITVE.RPT(WHOHJESI)

Verify that the accesses for JESINPUT resources are restricted. If the guidance is true, this is not a finding.

___ The TSS JESINPUT resource class in the RDT has the DEFPROT attribute specified and/or the resources and/or generic equivalent identified below are owned.

___ The TSS resources and/or generic equivalent identified below will be defined with access restricted to the appropriate personnel:

INTRDR
nodename
OFFn.*
OFFn.JR
OFFn.SR
Rnnnn.RDm
RDRnn
STCINRDR
TSUINRDR and/or TSOINRDR

NOTE: Use common sense during the analysis. For example, access to the offload input sources should be limited to systems personnel (e.g., operations staff).
Fix Text (F-16909r3_fix)
Verify with the ISSO that access authorization for resources defined to the JESINPUT resource class is restricted to the appropriate personnel

Grant read access to authorized users for each of the following input sources:

INTRDR
nodename
OFFn.*
OFFn.JR
OFFn.SR
Rnnnn.RDm
RDRnn
STCINRDR
TSUINRDR and/or TSOINRDR

The resource definition will be generic if all of the resources of the same type have identical access controls (e.g., if all off load receivers are equivalent). The default access will be NONE except for sources that are permitted to submit jobs for all users. Those resources may be defined as either NONE or READ.