Users that have access to the CONSOLE resource in the TSOAUTH resource class are not properly defined.

From z/OS RACF STIG

Part of ACP00294

Associated with: CCI-000213

SV-7931r2_rule Users that have access to the CONSOLE resource in the TSOAUTH resource class are not properly defined.

Vulnerability discussion

MCS consoles can be used to issue operator commands. Failure to properly control access to MCS consoles could result in unauthorized personnel issuing sensitive operator commands. This exposure may threaten the integrity and availability of the operating system environment, and compromise the confidentiality of customer data.

Check content

a) Refer to the following reports produced by the RACF Data Collection: - RACFCMDS.RPT(LISTUSER) - SENSITVE.RPT(OPERCMDS) - SENSITVE.RPT(TSOAUTH) b) If the CONSOLE privilege is not defined to the TSOAUTH resource class, there is NO FINDING. c) At the discretion of the IAO, users may be allowed to issue z/OS system commands from a TSO session. With this in mind, ensure the following items are in effect for users granted the CONSOLE resource in the TSOAUTH resource class: 1) Userids are restricted to the INFO level on the AUTH parameter specified in the OPERPARM segment of their userid. 2) Userids are restricted to READ access to the MVS.MCSOPER.userid resource defined in the OPERCMDS resource class. 3) Userids and/or group IDs are restricted to READ access to the CONSOLE resource defined in the TSOAUTH resource class. d) If all of the above in (c) are true, there is NO FINDING. e) If any of the above in (c) are untrue, this is a FINDING.

Fix text

Evaluate the impact of correcting any deficiencies. Develop a plan of action and implement the required changes. Ensure the following items are in effect for all MCS consoles: 1. Define a profile protecting the use of the CONSOLE command within TSO. A sample command to accomplish this is shown here: RDEF TSOAUTH CONSOLE UACC(NONE) OWNER(ADMIN) AUDIT(ALL(READ)) 2. Permit only authorized users. A sample command to accomplish this is shown here: PE CONSOLE CL(TSOAUTH) ID() 3. Set up the OPERPARM segment in corresponding user-class entry. A sample command to accomplish this is shown here: ALU OPERPARM(AUTH(INFO)) 4. Userids are restricted to READ access to the MVS.MCSOPER.userid resource defined in the OPERCMDS resource class. A sample command to accomplish this is shown here using the GLOBAL class: RDEF GLOBAL OPERCMDS ADDMEM(MVS.MCSOPER.&RACUID/READ) OWNER(ADMIN)

Pro Tips

Lavender hyperlinks in small type off to the right (of CSS class id, if you view the page source) point to globally unique URIs for each document and item. Copy the link location and paste anywhere you need to talk unambiguously about these things.

You can obtain data about documents and items in other formats. Simply provide an HTTP header Accept: text/turtle or Accept: application/rdf+xml.

Powered by sagemincer