z/OS Catalog Solutions for RACF Security Technical Implementation Guide
Overview
Version | Date | Finding Count (2) | Downloads | ||
7 | 2024-12-16 | CAT I (High): 0 | CAT II (Medium): 2 | CAT III (Low): 0 | Excel JSON XML |
Stig Description |
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil. |
Findings - All
Finding ID | Severity | Title | Description |
V-224460 | Medium | Catalog Solutions resources must be properly defined and protected. | Catalog Solutions can run with sensitive system privileges, and potentially can circumvent system controls. Failure to properly control access to product resources could result in the compromise of the operating system environment, and compromise the confidentiality of customer data. Many utilities assign resource controls that can be granted to systems... |
V-224459 | Medium | Catalog Solutions Install data sets are not properly protected. | Catalog Solutions is a very powerful tool that can pose risks if not properly controlled. If security is not properly implemented, the users of the product could present data integrity exposures, bypass security for catalog datasets, other VSAM files, and aliases. Catalog Solutions Install data sets provide the capability to... |