DFSMS STGADMIN Class resources are not protected in accordance with security requirements.

From z/OS RACF STIG

Part of ZSMS0010

Associated with IA controls: DCCS-1, ECCD-2, DCCS-2, ECCD-1

SV-7355r1_rule DFSMS STGADMIN Class resources are not protected in accordance with security requirements.

Vulnerability discussion

DFSMS provides data, storage, program, and device management functions for the operating system. Some DFSMS storage administration functions allow a user to obtain a privileged status and effectively bypass all ACP data set and volume controls. Failure to properly protect DFSMS resources may result in unauthorized access. This exposure could compromise the availability and integrity of the operating system environment, system services, and customer data.

Check content

a) Refer to the following report produced by the Data Set and Resource Data Collection: - SENSITVE.RPT(FACILITY) Automated Analysis Refer to the following report produced by the z/OS Data Collection: - PDI(ZSMS0010) b) Ensure that the following items are in effect: 1) The STGADMIN.** profile in the FACILITY resource class has a default access of NONE and grants no access at this level. 2) STGADMIN.DPDSRN.olddsname is restricted to System Programmers only. 3) Access to STGADMIN.DPDSRN.olddsname is not granted on production systems. 4) The STGADMIN.IGD.ACTIVATE.CONFIGURATION is restricted to System Programmers. 5) The STGADMIN.IGG.DEFDEL.UALIAS is restricted to System Programmers and Security personnel. 6) The following STGADMIN resource profiles may be allocated to the end-user. STGADMIN.ADR.COPY.CNCURRNT STGADMIN.ADR.COPY.TOLERATE.ENQF STGADMIN.ADR.DUMP.CNCURRNT STGADMIN.ADR.DUMP.TOLERATE.ENQF STGADMIN.ADR.RESTORE.TOLERATE.ENQF STGADMIN.ARC.ENDUSER STGADMIN.IGG.ALTER.SMS 7) STGADMIN resources are restricted to System programmers, DASD managers, and Application Production Support Team members. For STGADMIN.IDC.DCOLLECT, Automated Operations can have access also. STGADMIN.ARC.CANCEL STGADMIN.ARC.LIST STGADMIN.ARC.QUERY STGADMIN.ARC.REPORT STGADMIN.DMO.CONFIG STGADMIN.IDC.DCOLLECT STGADMIN.IFG.READVTOC STGADMIN.IGG.DELGDG.FORCE 8) STGADMIN resource profiles are controlled using the first two high-level resource name qualifiers at a minimum and restricted to System programmers and DASD managers. STGADMIN.ARC.ABACKUP STGADMIN.ARC.ARECOVER STGADMIN.ARC.ADDVOL STGADMIN.ARC.ALTERDS STGADMIN.ARC.AUDIT STGADMIN.ARC.AUTH STGADMIN.ARC.BACKDS STGADMIN.ARC.BACKVOL STGADMIN.ARC.BDELETE STGADMIN.ARC.DEFINE STGADMIN.ARC.DELETE STGADMIN.ARC.DELVOL STGADMIN.ARC.DISPLAY STGADMIN.ARC.EXPIREBV STGADMIN.ARC.FIXCDS STGADMIN.ARC.FREEVOL STGADMIN.ARC.FRBACKUP STGADMIN.ARC.FRDELETE STGADMIN.ARC.FRRECOV STGADMIN.ARC.HOLD STGADMIN.ARC.LIST STGADMIN.ARC.LOG STGADMIN.ARC.MIGRATE STGADMIN.ARC.PATCH STGADMIN.ARC.RECALL STGADMIN.ARC.RECOVER STGADMIN.ARC.RECYCLE STGADMIN.ARC.RELEASE STGADMIN.ARC.SETMIG STGADMIN.ARC.SETSYS STGADMIN.ARC.STOP STGADMIN.ARC.SWAPLOG STGADMIN.ARC.TAPECOPY STGADMIN.ARC.TAPEREPL STGADMIN.ARC.TRAP STGADMIN.ARC.UPDATEC STGADMIN.ADR.COPY.BYPASSACS STGADMIN.ADR.COPY.INCAT STGADMIN.ADR.COPY.PROCESS.SYS STGADMIN.ADR.CONVERTV STGADMIN.ADR.DEFRAG STGADMIN.ADR.DUMP.INCAT STGADMIN.ADR.DUMP.PROCESS.SYS STGADMIN.ADR.PATCH STGADMIN.ADR.RELEASE.PROCESS.SYS STGADMIN.ADR.RELEASE.INCAT STGADMIN.ADR.RESTORE.BYPASSACS STGADMIN.ADR.RESTORE.DELCATE STGADMIN.ADR.RESTORE.IMPORT STGADMIN.IDC.BINDDATA STGADMIN.IDC.DIAGNOSE.CATALOG STGADMIN.IDC.DIAGNOSE.VVDS STGADMIN.IDC.LISTDATA STGADMIN.IDC.LISTDATA.ACCESSCODE STGADMIN.IDC.SETCACHE STGADMIN.IDC.SETCACHE.DISCARDPINNED STGADMIN.IDC.SETCACHE.PENDINGOFF STGADMIN.IDC.SETCACHE.REINITIALIZE STGADMIN.IDC.SETCACHE.SUBSYSTEM STGADMIN.IGG.ALTER.UNCONVRT STGADMIN.IGG.LIBRARY STGADMIN.IGG.ALTBCS STGADMIN.IGG.DEFNVSAM.NOBCS STGADMIN.IGG.DEFNVSAM.NONVR STGADMIN.IGG.DELETE.NOSCRATCH STGADMIN.IGG.DELNVR.NOBCSCHK STGADMIN.IGG.DIRCAT STGADMIN.IGG.DLVVRNVR.NOCAT STGADMIN.IGWSHCDS.REPAIR 9) The following Storage Administrator functions are controlled using the first three high-level resource name qualifiers at a minimum; restricted to System programmers and DASD managers and all access is logged. STGADMIN.ADR.STGADMIN.BUILDSA STGADMIN.ADR.STGADMIN.COMPRESS STGADMIN.ADR.STGADMIN.COPY STGADMIN.ADR.STGADMIN.COPY.DELETE STGADMIN.ADR.STGADMIN.COPY.RENAME STGADMIN.ADR.STGADMIN.DEFRAG STGADMIN.ADR.STGADMIN.DUMP STGADMIN.ADR.STGADMIN.DUMP.DELETE STGADMIN.ADR.STGADMIN.PRINT STGADMIN.ADR.STGADMIN.RELEASE STGADMIN.ADR.STGADMIN.RESTORE STGADMIN.ADR.STGADMIN.RESTORE.RENAME 10) All access to the following STGADMIN resources are logged: STGADMIN.DPDSRN.olddsname STGADMIN.IGG.DEFDEL.UALIAS STGADMIN.IGD.ACTIVATE.CONFIGURATION c) If all items in b) above is true, there is NO FINDING. d) If any item in b) above is untrue, this is a FINDING.

Fix text

The IAO will ensure that no access is given to the high-level STGADMIN resource. The IAO will ensure that STGADMIN.DPDSRN.olddsname is restricted to system programmers on an as needed basis and all access will be logged. Ensure that the following items are in effect: 1) The STGADMIN.** profile in the FACILITY resource class has a default access of NONE and grants no access at this level. Sample command: RDEF FACILITY STGADMIN.** UACC(NONE) OWNER(ADMIN) AUDIT(ALL(READ)) 2) STGADMIN.DPDSRN.olddsname is restricted to System Programmers only. Sample Command: RDEF FACILITY STGADMIN.DPDSRN.olddsname UACC(NONE) OWNER(ADMIN) AUDIT(ALL(READ)) PE STGADMIN.DPDSRN.olddsname CL(FACILITY) ID() 3) Access to STGADMIN.DPDSRN.olddsname is not granted on production systems. 4) The STGADMIN.IGD.ACTIVATE.CONFIGURATION is restricted to System Programmers. Sample Command: RDEF FACILITY STGADMIN.IGD.ACTIVATE.CONFIGURATION UACC(NONE) OWNER(ADMIN) AUDIT(ALL(READ)) PE STGADMIN.IGD.ACTIVATE.CONFIGURATION CL(FACILITY) ID() 5) The STGADMIN.IGG.DEFDEL.UALIAS is restricted to System Programmers and Security personnel. Sample Command: RDEF FACILITY STGADMIN.IGG.DEFDEL.UALIAS UACC(NONE) OWNER(ADMIN) AUDIT(ALL(READ)) PE STGADMIN.IGG.DEFDEL.UALIAS CL(FACILITY) ID() 6) The following STGADMIN resource profiles may be allocated to the end-user. STGADMIN.ARC.ENDUSER STGADMIN.ADR.COPY.CNCURRNT STGADMIN.ADR.COPY.TOLERATE.ENQF STGADMIN.ADR.DUMP.CNCURRNT STGADMIN.ADR.DUMP.TOLERATE.ENQF STGADMIN.ADR.RESTORE.TOLERATE.ENQF STGADMIN.IGG.ALTER.SMS Sample Command: RDEF FACILITY UACC(NONE) OWNER(ADMIN) AUDIT(ALL(READ)) PE CL(FACILITY) ID() 7) STGADMIN resources are restricted to System programmers, DASD managers, and Application Production Support Team members. For STGADMIN.IDC.DCOLLECT, Automated Operations can have access also. STGADMIN.ARC.CANCEL STGADMIN.ARC.LIST STGADMIN.ARC.QUERY STGADMIN.ARC.REPORT STGADMIN.DMO.CONFIG STGADMIN.IDC.DCOLLECT STGADMIN.IFG.READVTOC STGADMIN.IGG.DELGDG.FORCE Sample Command: RDEF FACILITY UACC(NONE) OWNER(ADMIN) AUDIT(ALL(READ)) PE CL(FACILITY) ID() 8) STGADMIN resource profiles are controlled using the first two high-level resource name qualifiers at a minimum and restricted to System programmers and DASD managers. STGADMIN.ARC.ABACKUP STGADMIN.ARC.ARECOVER STGADMIN.ARC.ADDVOL STGADMIN.ARC.ALTERDS STGADMIN.ARC.AUDIT STGADMIN.ARC.AUTH STGADMIN.ARC.BACKDS STGADMIN.ARC.BACKVOL STGADMIN.ARC.BDELETE STGADMIN.ARC.DEFINE STGADMIN.ARC.DELETE STGADMIN.ARC.DELVOL STGADMIN.ARC.DISPLAY STGADMIN.ARC.EXPIREBV STGADMIN.ARC.FIXCDS STGADMIN.ARC.FREEVOL STGADMIN.ARC.FRBACKUP STGADMIN.ARC.FRDELETE STGADMIN.ARC.FRRECOV STGADMIN.ARC.HOLD STGADMIN.ARC.LIST STGADMIN.ARC.LOG STGADMIN.ARC.MIGRATE STGADMIN.ARC.PATCH STGADMIN.ARC.RECALL STGADMIN.ARC.RECOVER STGADMIN.ARC.RECYCLE STGADMIN.ARC.RELEASE STGADMIN.ARC.SETMIG STGADMIN.ARC.SETSYS STGADMIN.ARC.STOP STGADMIN.ARC.SWAPLOG STGADMIN.ARC.TAPECOPY STGADMIN.ARC.TAPEREPL STGADMIN.ARC.TRAP STGADMIN.ARC.UPDATEC STGADMIN.ADR.COPY.BYPASSACS STGADMIN.ADR.COPY.INCAT STGADMIN.ADR.COPY.PROCESS.SYS STGADMIN.ADR.CONVERTV STGADMIN.ADR.DEFRAG STGADMIN.ADR.DUMP.INCAT STGADMIN.ADR.DUMP.PROCESS.SYS STGADMIN.ADR.PATCH STGADMIN.ADR.RELEASE.PROCESS.SYS STGADMIN.ADR.RELEASE.INCAT STGADMIN.ADR.RESTORE.BYPASSACS STGADMIN.ADR.RESTORE.DELCATE STGADMIN.ADR.RESTORE.IMPORT STGADMIN.IDC.BINDDATA STGADMIN.IDC.DIAGNOSE.CATALOG STGADMIN.IDC.DIAGNOSE.VVDS STGADMIN.IDC.LISTDATA STGADMIN.IDC.LISTDATA.ACCESSCODE STGADMIN.IDC.SETCACHE STGADMIN.IDC.SETCACHE.DISCARDPINNED STGADMIN.IDC.SETCACHE.PENDINGOFF STGADMIN.IDC.SETCACHE.REINITIALIZE STGADMIN.IDC.SETCACHE.SUBSYSTEM STGADMIN.IGG.ALTER.UNCONVRT STGADMIN.IGG.LIBRARY STGADMIN.IGG.ALTBCS STGADMIN.IGG.DEFNVSAM.NOBCS STGADMIN.IGG.DEFNVSAM.NONVR STGADMIN.IGG.DELETE.NOSCRATCH STGADMIN.IGG.DELNVR.NOBCSCHK STGADMIN.IGG.DIRCAT STGADMIN.IGG.DLVVRNVR.NOCAT STGADMIN.IGWSHCDS.REPAIR Sample Command: RDEF FACILITY UACC(NONE) OWNER(ADMIN) AUDIT(ALL(READ)) PE CL(FACILITY) ID() 9) The following Storage Administrator functions are controlled using the first three high-level resource name qualifiers at a minimum; restricted to System programmers and DASD managers and all access is logged. STGADMIN.ADR.STGADMIN.BUILDSA STGADMIN.ADR.STGADMIN.COMPRESS STGADMIN.ADR.STGADMIN.COPY STGADMIN.ADR.STGADMIN.COPY.DELETE STGADMIN.ADR.STGADMIN.COPY.RENAME STGADMIN.ADR.STGADMIN.DEFRAG STGADMIN.ADR.STGADMIN.DUMP STGADMIN.ADR.STGADMIN.DUMP.DELETE STGADMIN.ADR.STGADMIN.PRINT STGADMIN.ADR.STGADMIN.RELEASE STGADMIN.ADR.STGADMIN.RESTORE STGADMIN.ADR.STGADMIN.RESTORE.RENAME Sample Command: RDEF FACILITY UACC(NONE) OWNER(ADMIN) AUDIT(ALL(READ)) PE CL(FACILITY) ID() 8) All access to the following STGADMIN resources is logged: STGADMIN.DPDSRN.olddsname STGADMIN.IGD.ACTIVATE.CONFIGURATION STGADMIN.IGG.DEFDEL.UALIAS Sample Command: RDEF FACILITY STGADMIN.DPDSRN.olddsname UACC(NONE) OWNER(ADMIN) AUDIT(ALL(READ)) RDEF FACILITY STGADMIN.IGD.ACTIVATE.CONFIGURATION UACC(NONE) OWNER(ADMIN) AUDIT(ALL(READ)) RDEF FACILITY STGADMIN.IGG.DEFDEL.UALIAS UACC(NONE) OWNER(ADMIN) AUDIT(ALL(READ))

Pro Tips

Lavender hyperlinks in small type off to the right (of CSS class id, if you view the page source) point to globally unique URIs for each document and item. Copy the link location and paste anywhere you need to talk unambiguously about these things.

You can obtain data about documents and items in other formats. Simply provide an HTTP header Accept: text/turtle or Accept: application/rdf+xml.

Powered by sagemincer