From z/OS CA 1 Tape Management for TSS STIG
Part of ZB000036
Associated with: CCI-000764
Improperly defined security controls for CA 1 Tape Management could result in the compromise of the network, operating system, and customer data.
Refer to the following report produced by the TSS Data Collection: - TSSCMDS.RPT(FACLIST) - Preferred report containing all control option values in effect including default values - TSSCMDS.RPT(TSSPRMFL) - Alternate report containing only control option values explicitly coded at TSS startup If the CA 1 Tape Management Facility Matrix table is defined as stated below, this is not a finding. FACILITY DISPLAY FOR CA1 INITPGM=TMS id=xx TYPE=099 ATTRIBUTES=IN-USE,ACTIVE,SHRPRF,NOASUBM,NOABEND,MULTIUSER,NOXDEF ATTRIBUTES=NOLUMSG,NOSTMSG,SIGN(M),INSTDATA,NORNDPW,AUTHINIT ATTRIBUTES=NOPROMPT,NOAUDIT,RES,NOWARNPW,NOTSOC,LCFCMD ATTRIBUTES=MSGLC,NOTRACE,NOEODINIT,IJU,NODORMPW,NONPWR ATTRIBUTES=LUUPD MODE=FAIL DOWN=GLOBAL LOGGING=INIT,SMF,MSG,SEC9 UIDACID=8 LOCKTIME=000 DEFACID=*NONE* KEY=8 MAXUSER=03000 PRFT=003
The IAO working with the systems programmer will ensure the Facility Matrix Table for CA 1 Tape Management is proper defined using the following example: *****CA1 FAC(USERxx=NAME=CA1,PGM=TMS,ID=nn,ACTIVE,NOASUBM) FAC(CA1=NOLUMSG,NOSTMSG,NORNDPW,NOWARNPW,MODE=FAIL) FAC(CA1=LOG(SMF,INIT,MSG,SEC9),UIDACID=8,LOCKTIME=000)
Lavender hyperlinks in small type off to the right (of CSS
class id
, if you view the page source) point to
globally unique URIs for each document and item. Copy the
link location and paste anywhere you need to talk
unambiguously about these things.
You can obtain data about documents and items in other
formats. Simply provide an HTTP header Accept:
text/turtle
or
Accept: application/rdf+xml
.
Powered by sagemincer