From z/OS TSS STIG
Part of TSS0930
Associated with IA controls: DCCS-1, DCCS-2
BLP is extremely sensitive, as it allows the circumvention of security access checking for the data. If an unauthorized user possesses BLP authority, they could potentially read any restricted tape and modify any information once it has been copied.
a) Refer to the following reports produced by the TSS Data Collection: - TSSCMDS.RPT(@ACIDS) - SENSITVE.RPT(WHOHVOL) b) Using the reports listed in (a) above, review the ACIDs that have BLP access. Verify that only authorized personnel have BLP access and that documentation for access is on file with the IAO. c) If (b) above is correct, there is NO FINDING. d) If (b) above is incorrect, this is a FINDING.
Review all ACIDs with the BLP attribute. Evaluate the impact of removing BLP access from unauthorized personnel. Develop a plan of action and remove BLP access from unauthorized ACIDs.
Lavender hyperlinks in small type off to the right (of CSS
class id
, if you view the page source) point to
globally unique URIs for each document and item. Copy the
link location and paste anywhere you need to talk
unambiguously about these things.
You can obtain data about documents and items in other
formats. Simply provide an HTTP header Accept:
text/turtle
or
Accept: application/rdf+xml
.
Powered by sagemincer