The RACF System REXX IRRPWREX security data set must be properly protected.

From z/OS RACF STIG

Part of RACF0465

Associated with: CCI-000213 CCI-001499 CCI-002234 CCI-002357

SV-79293r1_rule The RACF System REXX IRRPWREX security data set must be properly protected.

Vulnerability discussion

The RACF System REXX named IRRPWREX contains sensitive access control and password information for the operating system environment and system resources. Unauthorized access could result in the compromise of passwords, the operating system environment, ACP (Access Control Program), and customer data.

Check content

Refer to the following report produced by the Data Set and Resource Data Collection: - SENSITVE.RPT(RACFREXX) Alternate source Refer to the zOS system REXXLIB concatenation found in SYS1. PARMLIB (AXR) for the data set that contains the REXX for Password exit named IRRPWREX and the defined AXRUSER. Automated Analysis Refer to the following report produced by the Data Set and Resource Data Collection: - PDI(RACF0465) Verify that the data set that contains IRRPWREX is properly restricted. If the following guidance is true, this is not a finding. ___ RACF data set access authorizations restrict READ to AXRUSER, z/OS systems programming personnel, security personnel, and auditors. ___ RACF data set access authorizations restrict UPDATE to security personnel using a documented change management procedure to provide a mechanism for access and revoking of access after use. ___ All (i.e., failures and successes) data set access authorities (i.e. READ, UPDATE, and CONTROL) is logged. ___ RACF data set access authorizations specify UACC(NONE) and NOWARNING.

Fix text

Ensure that read access is restricted to security administrators, systems programmers, and auditors. Ensure that there is a procedure documented with the ISSM that defines a change management process to provide mechanism for granting Update access to security administrators on an exception basis. The process should contain procedures to revoke access when documented update is completed. Ensure all failures and successes data set access authorities for RACF data set that contains the Password exit is logged. Examples: ad 'sys3.racf.rexxlib.**' uacc(none) owner(sys3) - audit(all(read)) Permit 'sys3.racf.rexxlib.**' id( AXRUSER) acc(r) Permit 'sys3.racf.rexxlib.**' id() acc(u)

Pro Tips

Lavender hyperlinks in small type off to the right (of CSS class id, if you view the page source) point to globally unique URIs for each document and item. Copy the link location and paste anywhere you need to talk unambiguously about these things.

You can obtain data about documents and items in other formats. Simply provide an HTTP header Accept: text/turtle or Accept: application/rdf+xml.

Powered by sagemincer