Os390-Stig-V5r1-Vol-2 Security
Os390-Stig-V5r1-Vol-2 Security
Version 5, Release 1
Volume 2 of 2
21 January 2005
                 UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                             DISA Field Security Operations
21 January 2005                                                               Developed by DISA for the DOD
ii
                                               UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                                                               DISA Field Security Operations
21 January 2005                                                                                                 Developed by DISA for the DOD
vi
                                                         UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                                                         DISA Field Security Operations
21 January 2005                                                                                           Developed by DISA for the DOD
               13.2.1.7.15 Offloaders..........................................................................................171
               13.2.1.7.16 MAS Members ..................................................................................172
               13.2.1.7.17 Job Classes ........................................................................................174
               13.2.1.7.18 Scheduling Environments..................................................................174
               13.2.1.7.19 WLM Resources................................................................................175
               13.2.1.7.20 System Requests................................................................................176
               13.2.1.7.21 WLM Enclaves..................................................................................177
               13.2.1.7.22 z/OS UNIX Processes .......................................................................178
               13.2.1.7.23 Spool Volumes ..................................................................................179
               13.2.1.7.24 Jobs, Output Groups, and SYSIN/SYSOUT Data Sets.....................180
               13.2.1.7.25 SDSF Server Operations ...................................................................182
               13.2.1.7.26 MQSeries for OS/390........................................................................183
                  13.2.1.7.26.1 Queue Protection ......................................................................184
                  13.2.1.7.26.2 Queue Definition Authority......................................................185
                  13.2.1.7.26.3 Connection Security .................................................................186
                  13.2.1.7.26.4 Context Security .......................................................................187
        13.2.2 ACF2 .....................................................................................................................187
           13.2.2.1 Data Set Controls..........................................................................................187
           13.2.2.2 Started Task Definitions...............................................................................187
           13.2.2.3 Resource Controls ........................................................................................188
               13.2.2.3.1 SDSF Group Membership Controls ....................................................189
               13.2.2.3.2 SDSF Resources Controls ...................................................................189
               13.2.2.3.3 MVS and JES2 Command Controls....................................................193
               13.2.2.3.4 Printer and Punch Controls..................................................................194
               13.2.2.3.5 Jobs, Output Group, SYSIN/SYSOUT Controls.................................195
               13.2.2.3.6 SDSF Server Controls .........................................................................195
               13.2.2.3.7 MQ Controls........................................................................................196
                  13.2.2.3.7.1 MQ Queue Protection.................................................................196
                  13.2.2.3.7.2 MQ Queue Definition Authority Protection...............................197
                  13.2.2.3.7.3 Connection Security Protection..................................................197
                  13.2.2.3.7.4 Context Security Protection........................................................198
        13.2.3 RACF.....................................................................................................................198
           13.2.3.1 Data Set Controls..........................................................................................198
           13.2.3.2 Started Task Definitions...............................................................................198
           13.2.3.3 Resource Controls ........................................................................................199
               13.2.3.3.1 SDSF Group Membership Controls ....................................................199
               13.2.3.3.2 SDSF Resources Controls ...................................................................200
               13.2.3.3.3 MVS and JES2 Command Controls....................................................204
               13.2.3.3.4 Printer and Punch Controls..................................................................208
               13.2.3.3.5 Jobs, Output Group, SYSIN/SYSOUT Controls.................................208
               13.2.3.3.6 SDSF Server Controls .........................................................................209
               13.2.3.3.7 MQ Controls........................................................................................209
                  13.2.3.3.7.1 MQ Queue Protection.................................................................209
                  13.2.3.3.7.2 MQ Queue Definition Authority Protection...............................210
                  13.2.3.3.7.3 Connection Security Protection..................................................211
                  13.2.3.3.7.4 Context Security Protection........................................................211
viii
                                                         UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                                                            DISA Field Security Operations
21 January 2005                                                                                              Developed by DISA for the DOD
APPENDIX E. FORMS..............................................................................................................311
x
                                                            UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                                                         DISA Field Security Operations
21 January 2005                                                                                           Developed by DISA for the DOD
                                                                                                                                        xi
                                                         UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                                                          DISA Field Security Operations
21 January 2005                                                                                            Developed by DISA for the DOD
xii
                                                          UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                                                                 DISA Field Security Operations
21 January 2005                                                                                                   Developed by DISA for the DOD
                                                                                                                                                xiii
                                                              UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                                                                 DISA Field Security Operations
21 January 2005                                                                                                   Developed by DISA for the DOD
Table B-43. SDSF SPOOL VOLUME SAF RESOURCES (13.2.1.7.23) ................................ 179
Table B-44. JES2 JOB SAF RESOURCES (13.2.1.7.24 a) ...................................................... 180
Table B-45. JES2 OUTPUT GROUP SAF RESOURCES (13.2.1.7.24 b)............................... 180
Table B-46. JES SYSIN/SYSOUT DATA SET SAF RESOURCES (13.2.1.7.24 c)............... 181
Table B-47. SDSF SERVER SAF RESOURCES (13.2.1.7.25) ............................................... 182
Table B-48. MQ QUEUE SAF RESOURCES (13.2.1.7.26.1) ................................................. 184
Table B-49. MQ QUEUE DEFINITION AUTHORITY SAF RESOURCES (13.2.1.7.26.2) . 185
Table B-50. MQ QUEUE CONNECTION SECURITY SAF RESOURCE (13.2.1.7.26.3) .... 186
Table B-51. MQ CONTEXT SECURITY SAF RESOURCE (13.2.1.7.26.4).......................... 187
Table B-53. IOA EXTENDED DEFINITION SECURITY CALLS (14.2.1 a)........................ 223
Table B-54. IOA SECURITY PARAMETERS FOR ALL ACP ENVIRONMENTS (14.2.1 b)
    ............................................................................................................................................. 224
Table B-55. REQUIRED CONTROL-O OPERATIONAL PARAMETERS (14.2.2 a) .......... 227
Table B-56. REQUIRED CONTROL-O EXTENDED DEFINITION SECURITY CALLS
    (14.2.2 b)............................................................................................................................. 228
Table B-57. REQUIRED CONTROL-O SECURITY PARAMETERS FOR ALL ACP
    ENVIRONMENTS (14.2.2 b) ............................................................................................ 230
Table B-58. CONTROL-M EXTENDED DEFINITION SECURITY CALLS (14.2.3 a) ....... 232
Table B-59. REQUIRED CONTROL-M SECURITY PARAMETERS FOR ALL ACP
    ENVIRONMENTS (14.2.3 b) ............................................................................................ 234
Table B-60. REQUIRED IOA SECURITY PARAMETERS FOR ACF2 EIVIRONMENTS
    (14.3.1)................................................................................................................................ 236
Table B-61. REQUIRED CONTROL-M SECURITY PARAMETERS FOR ACF2
    ENVIRONMENTS (14.3.3) ............................................................................................... 239
Table B-62. REQUIRED IOA SECURITY PARAMETERS FOR RACF ENVIRONMENTS
    (14.4.1)................................................................................................................................ 241
Table B-63. REQUIRED CONTROL-M SECURITY PARAMETERS FOR RACF
    ENVIRONMENTS (14.4.3) ............................................................................................... 245
Table B-64. REQUIRED IOA SECURITY PARAMETERS FOR TOP SECRET
    ENVIRONMENTS (14.5.1) ............................................................................................... 248
Table B-65. REQUIRED CONTROL-M SECURITY PARAMETERS FOR TOP SECRET
    ENVIRONMENTS (14.5.3) ............................................................................................... 252
Table B-66. CA-SYSVIEW/E DATA SETS (G.12.5.3.2.3) ..................................................... 335
Table B-67. CA-SYSVIEW/E RESOURCE ENTITIES (G.12.5.3.3.2) ................................... 337
xiv
                                                              UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                               DISA Field Security Operations
21 January 2005                                                                 Developed by DISA for the DOD
Changes in this document since the previous release (Version 4, Release 1) in July 2003 are
listed below beginning with Section 8 (see Volume 1 of the OS/390 STIG for changes to all
previous sections).
General
Minor wording, grammar, formatting, and typographical changes and corrections are not
included in the Summary of Changes.
The major changes to Volumes I and II involved the addition of bullets for the PDIs (Potential
Discrepancy Items) identified in the VMS database. These changes were made to keep the
OS/390 and z/OS STIG in line with the STIGs published for all other technologies. Additional
changes included the creation of new PDIs for breaking apart Roman Numeral PDIs.
The following sections contained in the STIG and not having any PDIs and not referenced in
any of the ACP Check Lists have been removed from the body of the STIG and placed in
Appendix F for future research and analysis.
IMS/DB/DC
MICS
FDR Fast Dump Restore
ICKDSF
CA Examine
CA Sysview
System Maintenance Software SMP/E
9.5      ORACLE             was removed since it was included in the Data Base STIG
15.2     XDC                was removed since it was no longer being used at any of the sites.
Changes were made to add new parameter setting for CA-1 Version 5.3
11.2.6 ACF2
Changes were made to add new parameter setting for CA-1 Version 5.3
11.2.7 RACF
Changes were made to add new parameter setting for CA-1 Version 5.3
                                                                                                            xv
                                              UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                     DISA Field Security Operations
21 January 2005                                                       Developed by DISA for the DOD
Changes were made to add new parameter setting for CA-1 Version 5.3
Appendix E. Forms
The Acknowledgment of Risk Letter(AORL) was removed from this section and this STIG.
xvi
                                          UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                            DISA Field Security Operations
21 January 2005                                                              Developed by DISA for the DOD
8. TRANSACTION PROCESSORS
Transaction processor software products provide programmers with the facilities required to
develop interactive and on-line applications. These systems may interact with other database
management systems. (Refer to Section 9, Database Management Systems, for further
information.)
Some transactions are powerful and offer the potential to breach security. These transactions are
generally used to manage and administer the system, or they provide a key function for an
interfacing product. Access to transactions of this magnitude are prohibited from general use,
and access is only granted to authorized personnel.
Product interfaces installed within transaction processor systems are carefully evaluated for
possible security exposures. These interfaces may offer their own internal security, provide the
capability to circumvent ACP security controls currently in place, or expose weaknesses in
protection.
Many transaction processor products comes with their own internal security. These features are
reviewed and analyzed to determine if implementation is warranted. However, ACP security
controls are never compromised by any internal security component.
Use the following recommendations when securing access to transaction processor systems:
(1)    Control access to software product data sets, and restrict access to system-level support
       personnel only.
(2)    All transaction processor systems in use at DOD sites perform I&A checking during the
       logon process. I&A validation is performed using the services of the ACP.
(3)    Restrict user access to resources within the transaction processor environment to those
       necessary for users to accomplish their assigned responsibilities. These resources include,
       but are not limited to, files, programs, transactions, and storage.
(4)    Product interfaces (e.g., debugging software, file management tools, Print management
       products, etc.) are reviewed for potential security exposures and documented. Notify DISA
       FSO and the vendor of any possible vulnerability resulting from the analysis.
                                                                                                          1
                                          UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                              DISA Field Security Operations
21 January 2005                                                                Developed by DISA for the DOD
(5)    Evaluate transaction processor internal security for possible use, providing it does not
       replace or compromise existing ACP security controls.
8.2 CICS
The Customer Information Control System (CICS) allows programmers to develop application
code to perform interactive processing, without the cumbersome overhead of writing the terminal
control language to support the interactive process. CICS, with the development of flexible,
multi-platform information systems and the implementation of easy to use high-level inquiry
languages, has evolved into a dynamic medium that can allow a wide community of terminal
access to major data systems.
Through the use of OS/390 System Authorization Facility (SAF) to route authorization requests
to the ACP, CICS can provide multi-leveled access and resource protection. Implement CICS
security management with an approved ACP. Apply the following recommendations to the
security implementation for each CICS region defined on a platform:
(1) A unique userid will be associated with each individual CICS region.
•     (ZCIC0040: CAT II) The IAO will ensure that each CICS region is associated with a unique
      userid and that userid is properly defined.
(1)    A CICS environment may include several data set types required for operation. Typically
       they are CICS product libraries, which are usually included in the STEPLIB concatenation
       but may be found in DD DFHRPL. CICS system data sets can be identified with DFH DD
       statements, other product system data sets, and application program libraries. Restrict alter
       and update access to CICS program libraries and all system data sets to systems
       programmers only. Other access must be documented and approved by the IAO. The site
       may determine access to application data sets included in the DD DFHRPL and CICS
       region startup JCL according to need. Ensure that procedures are established; documented,
       and followed that prevents the introduction of unauthorized or untested application
       programs into production application systems.
•     (ZCIC0010: CAT II) The IAO will ensure that update and allocate access to CICS program
      libraries and all system-level data sets is limited to system programmers only, unless a letter
      justifying access is filed with the IAO.
(2)    The CICS initialization program, DFHSIP, runs in an authorized state. It is typically
       installed in the SDFHAUTH library. This library is defined to the operating system as APF
       authorized. Refer to Section 2.1.2.1, Authorized Program Facility (APF), for security
       control information.
2
                                            UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                            DISA Field Security Operations
21 January 2005                                                              Developed by DISA for the DOD
(4)    Ensure security is enabled for the region. This will be done by coding the following
       parameter in either the SIT or the SYSIN startup parameter file for the region:
SEC=YES
•     (ZCIC0030: CAT II) The IAO will ensure that CICS System Initialization Table (SIT)
      parameter values are specified in accordance with STIG requirements.
(6)    Control terminal access validation to a particular CICS region by parameters associated
       with a person’s userid defined to the ACP. One access validation mechanism may be used
       for a group of CICS regions that constitute a Multiple Region Option (MRO) environment.
       However, ensure that access validation is maintained at attach time across all regions.
(7)    For non-terminal access (i.e., PLT processing and triggered transaction), ensure that a valid
       user is identified. This can be accomplished by the definition of a default user. Specify
       that the default userid for the region is set to a known, specific userid with very few
       privileges. The default userid for a region will under no circumstances be the same as the
       region's assigned userid, because this would pose a critical and immediate security risk to
       the entire domain.
(8)    The STIG standard for this userid will be specified as follows, and will be the same for all
       regions. This will be done by coding the following parameter in either the SIT or the
       SYSIN startup parameter file for the region:
DFLTUSER=CICSUSER
•     (ZCIC0030: CAT II) The IAO will ensure that CICS System Initialization Table (SIT)
      parameter values are specified in accordance with STIG requirements.
       The specified value was selected because CICS assigns this userid if none is specified in
       the region startup parameter list. Specifying this value mitigates the risk of inadvertent
       omission of the parameter during region startup.
       The default userid will be granted the absolute minimum privileges necessary. It should
       only require the following privileges:
       (a)    Access to transactions CESF and CESN and the transactions specified in the
              GMTRAN and GNTRAN parameters for the region
                                                                                                          3
                                           UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                            DISA Field Security Operations
21 January 2005                                                              Developed by DISA for the DOD
•     (ZCIC0041: CAT II) The IAO will ensure that the default CICS user is restricted and
      properly defined.
(9)    To further ensure that the default userid cannot be inadvertently misused, the default userid
       will require a surrogate profile. This will be enforced by coding the following parameter in
       either the SIT or the SYSIN startup parameter file for the region:
XUSER=YES
•     (ZCIC0030: CAT II) The IAO will ensure that CICS System Initialization Table (SIT)
      parameter values are specified in accordance with STIG requirements.
(10) Depending on the environment in which application code change control is handled,
     additional authorization checking may need to be implemented for files, programs,
     MRO/Inter-Systems Communication (ISC) connections, and other CICS-based resources.
     A thorough evaluation of the change control process is key to the necessity of
     implementing other resource verification.
(12) Enforce a CICS time-out time limit, which is implemented based on 15 minutes of user
     inactivity.
•     (ZCIC0042: CAT II) The IAO will ensure that all CICS users have a 15 minute time-out limit
      specified.
(13) The CICS multiple sign-on capability may be used in test regions for application
     development and debugging. This option is only authorized for test and development
     purposes. The IAO maintains the documentation describing the requirements and the
     justification for its use. The CICS multiple sign-on capability is not used in production
     regions.
(14) At a minimum, implement transaction-level checking in all CICS regions. Generally there
     are three major sources of transactions in a CICS environment:
       -   CICS-supplied transactions
       -   COTS-supplied transactions
       -   GOTS-supplied and site-developed transactions
4
                                          UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                                  DISA Field Security Operations
21 January 2005                                                                    Developed by DISA for the DOD
         (a)     CICS-supplied transactions are used in the initialization, operation, and control of a
                 region. These transactions offer the ability to circumvent ACP controls for resources
                 managed under CICS. These transactions can be divided into three categories:
                 -   Category 1 transactions are for CICS internal use only. Restrict access to CICS
                     region userids.
Table B-1. CATEGORY 1. TRANSACTIONS FOR CICS INTERNAL USE ONLY (8.2 a)
    CATA        CATD     CDBD        CDBF     CDBO      CDBQ   CDTS      CESC      CEX2          CFCL
    CFOR        CFQR     CFQS        CFSL     CFTL      CFTS   CGRP      CIOD      CIOF          CIOR
    CITS        CLSG     CMTS        COVR     CPLT      CRMD   CRMF      CRSQ      CRSY          CSFR
    CSFU        CSGX     CSHA        CSHQ     CSKP      CSNC   CSNE      CSOL      CSPQ          CSQC
    CSSX        CSSY     CSTE        CSTP     CSZI      CTSD   CWBG      CWXN      CXCU          CXRE
    CAFB        CAFF     CBAM        CDBC     CDBI      CDBM     CDBT      CDFS     CEBR1        CECI
    CECS        CEDA     CEDB        CEDC     CEDF      CEDX     CEHP      CEHS     CEMT*        CEOT2
    CESD        CEST     CETR        CIND     CIRP      CMAC     CMSG      CPMI     CREA         CREC
    CRPA        CRPC     CRPM        CRTE     CRTX      CSFE     CSGM      CSM1     CSM2         CSM3
    CSM5        CSMI     CTIN        CVMI     CWBA      CWBM     CWTO      DSNC
           * The CEMT transaction can be secured at the command level allowing for a more
             inclusive authorization. See Paragraph (12) below.
1
    Provide access to Application Development Staff.
2
    Provide access to Operations and Help Desk Staff.
                                                                                                                5
                                                  UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                                     DISA Field Security Operations
21 January 2005                                                                       Developed by DISA for the DOD
       (b)    COTS-supplied transactions are used to support and administer vendor products.
              Some of these transactions may offer the ability to bypass ACP controls for resources
              managed under CICS. These transactions are considered sensitive and are identified
              as Category 4 transactions. Category 4 transactions are restricted to systems
              programming personnel and are minimally described below:
                           TRANSACTION                    DESCRIPTION
                           ACFM                      CA-ACF2 Master Transaction
                           ACFA                      CA-ACF2
                           ACFT                      CA-ACF2
                           ACUL                      CA-ACF2
                           DBOC                      CA-DATACOM
                           LOOK                      CA-LOOK
                           OMON                      OMEGAMON/CICS
                           TMSU                      CA-1
                           TSEU                      CA-TOP SECRET
                           TSSC                      CA-TOP-SECRET
       (c)    GOTS-supplied and site-developed transactions are written generally to support user
              applications. These transactions are controlled at the discretion of the site IAO.
              Any GOTS-supplied and site-developed transaction that provides the ability to bypass
              ACP controls for resources managed under CICS are considered sensitive. Access to
              these transactions will be restricted to a minimum number of authorized personnel
              and documented with the IAO. Implementation of any sensitive transaction will be
              subject to the requirements as stated in Section 2.1.2, Software Integrity.
•    (ZCIC0050: CAT II) The IAO will ensure that CICS transactions for internal, terminal user,
     trusted and sensitive are protected in accordance with the above STIG requirements.
6
                                                   UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                          DISA Field Security Operations
21 January 2005                                                            Developed by DISA for the DOD
(15) To facilitate CICS administration, CICS provides the master terminal transaction (CEMT)
     as well as systems programming interface (SPI) commands. These SPI commands are for
     managing the CICS system and its resources. SPI commands either retrieve information
     about the system and its resources, or modify them. These commands provide a
     command-level equivalent to the function of CEMT and also the trace control transaction
     (CETR), and an alternative to the CEDA transaction for defining resources. This means
     that transaction can be written for administering the running CICS system.
       These master functions are extremely sensitive, but sensitivity can be diminished with the
       use XCMD and CMDSEC parameters. This allows application developers and other users
       partial use of CEMT functions, depending on their job and duty requirements. Use the
       following specifications:
In the SIT:
       The use of System Programming Interfaces are justified and evaluated by Security and
       CICS personnel to ensure CICS region security before access is granted.
8.2.1 ACF2
Every CICS region is secured using the ACF2/CICS sub-product. This allows both I&A
processing and the verification of resource access within CICS.
ACF2/CICS initialization is determined by checking for a privilege bit called ACF2CICS in the
CICS region logonid. All CICS region logonids will be granted the ACF2CICS privilege.
Restrict this privilege only to CICS region logonids.
To prevent privileges granted for one CICS region from applying to another region, assign every
CICS region a unique set of the following definitions:
(1) A unique @MUSASS and @MLID macro pair in the ACF2 ACFFDR for each region
•     (ZCICA021: CAT II) The IAO will ensure that each CICS region is associated with a unique
      @MUSASS and @MLID macro pair in the ACFFDR.
•     (ZCICA022: CAT II) The IAO will ensure that each CICS region procedure has the
      ACF2/CICS parameter dataset specified.
       (a)    Terminal
       (b)    Non-terminal
       (c)    Implicitly signed-on terminal
       (d)    MRO
       (a)    File
       (b)    Program
       (c)    Transaction
       (d)    Transient data
       (e)    Temporary storage
       (f)    PSB
       (g)    MRO System In
       (h)    MRO System Out
The ACF2/CICS parameter data set, associated with a given CICS region, controls the security
mechanisms in effect for that region. Protect the parameter data set via standard data set rules,
and restrict access only to systems and security personnel. Several key ACF2/CICS parameters
have the ability, depending on their setting, to corrupt the security posture of the CICS region.
To avoid this exposure, code the parameters listed below with the following keywords:
•     (ZCICA011: CAT II) The IAO will ensure that update and allocate access to the ACF2/CICS
      parameter data set is limited to system programmers and security personnel, unless a letter
      justifying access is filed with the IAO.
       **The default ACF2/CICS type for transactions is CKC, but is unique for each region, as
       specified above. An exception would be the situation where regions are grouped together
       in an MRO environment that may share a common transaction type with that unique MRO
       environment.
                                                                                                         9
                                         UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                          DISA Field Security Operations
21 January 2005                                                            Developed by DISA for the DOD
       *** Ensure that users cannot sign on more than once to a production CICS region within
       single sign-on within the same CICS region a single OS/390 image, or a sysplex.
•    (ZCICA023: CAT II) The Systems Programmer and IAO will ensure the ACF2/CICS
     parameters are coded with values specified in the above table.
•    (ZCIC0041: CAT II) The IAO will ensure that the default CICS user is restricted and
     properly defined.
Resources specified in the SAFELIST are not masked. All such resources are discretely
identified in the SAFELIST.
•    (ZCICA024: CAT II) The Systems Programmer and IAO will ensure the ACF2/CICS
     parameter SAFELIST are coded with values specified above.
PROTLIST processing should not be used, as all resources exempt from security validation is
discretely specified in a SAFELIST entry. Validate all resources not specified within a
SAFELIST parameter through standard resource verification, as specified in the associated
CICSKEY or USERKEY parameter.
•    (ZCICA025: CAT II) The Systems Programmer and IAO will ensure the ACF2/CICS
     parameter PROTLIST is not coded.
Strictly control the ability to update the SAFELIST and PROTLIST specifications for a CICS
region.
Logonid inheritance control is in effect for each CICS region. Under no circumstance will a
user's batch job submitted from a CICS region inherit the authority and privileges of the CICS
region logonid.
If the CICS region has the requirement to submit jobs on behalf of its users, the CICS region
logonid will have the JOBFROM attribute specified.
If the CICS region has the requirement to update information in the ACF2 database on behalf of
its users, the CICS region logonid will have the MUSUPDT attribute specified.
All CICS region logonids will have the MUSASS and NO-SMC attributes specified.
10
                                         UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                          DISA Field Security Operations
21 January 2005                                                            Developed by DISA for the DOD
•     (ZCIC0020: CAT II) The IAO will ensure that each CICS region is associated with a unique
      userid and that userid is properly defined.
Grant all logonids associated with a CICS region the minimum privileges necessary to
accomplish their functions. This applies equally to the region’s logonid and to the default
logonids associated with the region.
Strictly control CICS default logonids. Grant these logonids the minimum access authorities
necessary to perform their functions.
The following ACF2 logonid field and associated value will be specified for all CICS users to
include the CICS default user:
IDLE(15)
       Number of minutes that must elapse since the last terminal I/O before ACF2 performs
       password re-verification.
•     (ZCIC0042: CAT II) The IAO will ensure that all CICS users have a 15 minute time-out limit
      specified.
Transactions in Table B-1, Category 1. Transactions for CICS Internal Use Only (Section 8.2,
CICS), are only for CICS internal use. Access validation to these transactions are performed
using the CICS region logonid, not the CICS end-user logonid. Define these transactions with
the following specifications:
(2) CICS transaction resource definitions use RESSEC (NO) and CMDSEC (NO.
Transactions in Table B-2, Category 2. CICS and Other Product Transactions (Section 8.2,
CICS), have an explicitly defined resource rule restricting them as noted in the table.
Transactions identified in Table B-3, Category 3. Transactions Exempt from Security Checking
(Trusted Transactions) (Section 8.2, CICS), are eligible for exemption from validation due to
CICS functional requirements. Their exemption is defined by placing them in the ACF2/CICS
SAFELIST system initialization parameter using the SAFELIST RESOURCE=TRANS
ENTRY=xxxx keyword. CICS transaction resource definitions may use RESSEC(NO) and
CMDSEC(NO).
                                                                                                       11
                                         UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                             DISA Field Security Operations
21 January 2005                                                               Developed by DISA for the DOD
Other transactions that execute within CICS and do not run under the authority of a user may
also be included in the list. Examples of such transactions may include the OMEGAMON/CICS
background task or the task that performs print services. In such cases, these transactions may be
added, but, as an example, the transaction that actually initiates the print transaction is protected.
All other transactions are validated.
The use of the SAFELIST list should be kept to a minimum. Only transactions that do not
present a security exposure (e.g., sign-on/sign-off, menus, etc.) should be included. Transactions
for applications and COTS software should be placed in unique resource rules. Where required,
multiple resource rules should be created to provide for more granular control and separation of
capabilities. For example, for a COTS product that provides administrative, technical support,
and user transactions, each of these functional areas would be provided with a separate resource
rule to allow the assignment of access based on functional requirements.
The ACF2/CICS master terminal transaction (ACFM) provides the on-line, real-time capability
to effect changes to the security environment of the CICS region. Protect the transaction via
ACF2 resource rules, and restrict its use to security and Systems staff.
The ACF2/CICS environmental utility transaction (ACFE) provides the capability to examine
CICS security-related information. Restrict access to the ACFE transaction only to security
staff.
8.2.2 RACF
CICS external security utilizing RACF is accomplished in the manner described in this section.
Use the recommendations and guidelines outlined in the following sections to control access to
CICS.
(1)    Associate a unique userid with each individual CICS region. If the region is run as a
       started task, define it to the STARTED resource class with a matching profile. For
       example:
(2)    Specify the following CICS system initialization parameter and associated values for each
       CICS region:
       Specify one of the following values appropriate for the CICS region configuration. Ensure
       that users cannot sign on to more than one CICS production region within the scope of a
       single CICS region, a single OS/390 image, or a sysplex:
       SNSCOPE=NONE                   Multiple sign-on within the same CICS region (use only
                                      with test or development regions)
NOTE: Region identity is maintained between multiple regions regarding resource rule
           definitions. Therefore, XTRAN=YES may only be used if SECPRFX=YES is
           specified.
NOTE: Refer to Section 8.2.2, RACF, for information on defining CICS transaction resource
           class names.
•     (ZCIC0030: CAT II) The IAO will ensure that CICS System Initialization Table (SIT)
      parameter values are specified in accordance with STIG requirements.
(3)    Implement CICS transaction security by utilizing two distinct and unique RACF resource
       classes (i.e., member and grouping) within each CICS region. If several CICS regions are
       grouped in an MRO environment, it is permissible for those grouped regions to share a
       common pair of resource classes. Member classes contain a RACF discrete profile for
       each transaction. Grouping classes contain groups of transactions requiring equal
       protection under RACF. Ideally, member classes contain no profiles, and all transactions
       are defined by groups in a grouping class.
                                                                                                       13
                                          UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                           DISA Field Security Operations
21 January 2005                                                             Developed by DISA for the DOD
       Specify the following CICS system initialization parameters and their associated values for
       each CICS region:
XTRAN=ssrrTRN
       Resource class names should be similar to the following sample naming standard. Each
       class name can be in the form of xssrrTRN, where:
           x - RACF prefixes a letter to the XTRAN= value to build the RACF member and
           grouping class names. The possible values are as follows:
•     (ZCICR021: CAT II) The IAO will ensure that each CICS transaction resource class pair is
      active.
(4)    MRO partner regions have appropriate profiles in the RACF Facility. Facility class must
       be active and prevent the binding of unauthorized CICS regions. User authorization is
       controlled by the ATTACHSEC=IDENTIFY.
Utilize propagation control for each CICS region. Under no circumstance should a user's batch
job submitted from a CICS region execute under that CICS region's userid. To prevent this from
occurring, define a profile in the PROPCNTL resource class for each CICS region. The
following is an example:
The PROPCNTL class must be active and RACLISTed for this protection to be in effect:
•     (ZCICR041: CAT II) The IAO will ensure that each CICS region userid is defined to the
      PROPCNTL resource class.
Surrogate job submission is used to allow CICS to submit jobs while specifying another userid in
the job's JCL. If CICS automatic journal archiving is used, a profile is defined to the
SURROGAT resource class using the userid specified in the archive JCL. For example:
Permit the CICS region's userid to submit the archive job using the archive-userid as the job's
execution userid:
The SURROGAT class must be active and RACLISTed for this protection to be in effect:
NOTE: SURROGAT authority is restricted only to the CICS region userid. Any exceptions are
           documented describing the requirements and justification for its use.
(1) All CICS region userids are defined as PROTECTED userids For example:
(2)    Grant all userids associated with a CICS region the minimum privileges necessary to
       accomplish their functions. This applies equally to the CICS region userid and any CICS
       default userids. Under no circumstance should the OPERATIONS attribute be granted to
       the CICS region userid.
(3)    Strictly control CICS default userids. Grant these userids the minimum access authorities
       necessary to perform their functions.
(4)    All CICS terminal-user data is defined in the CICS segment of RACF user profiles. The
       following CICS segment parameter and associated value will be specified for all CICS
       users to include the CICS default user:
TIMEOUT(0015)
       The TIMEOUT parameter specifies the elapsed time since the user last used the terminal
       before CICS times out the terminal.
•     (ZCIC0042: CAT II) The IAO will ensure that all CICS users have a 15 minute time-out limit
      specified.
                                                                                                         15
                                          UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                            DISA Field Security Operations
21 January 2005                                                              Developed by DISA for the DOD
The STIG requirement is to run with SEC=YES and XTRAN=YES (or XTRAN=ssrrTRN)
specified in the CICS system initialization parameters. With these values, CICS issues a security
check to validate access authority for every transaction.
The following lists of transactions have specific and unique access authorization requirements:
(1)    Transactions in Table B-1 are only for CICS internal use. Access validation to these
       transactions are performed using the CICS region userid, not the CICS end-user userid.
       Define these transactions with the following specifications:
RACF profiles:
       UACC(NONE)
       Restrict read authority only to CICS region userids.
           RESSEC(NO)
           CMDSEC(NO)
(2)    The transactions in Table B-3 may be exempt from security checking, and CICS permits
       any terminal user to initiate these transactions. RACF profiles for these transactions do not
       affect processing:
       Define these transactions with the following CICS transaction resource definition
       specifications:
           RESSEC(NO)
           CMDSEC(NO)
(3)    Other transactions may exist that execute within CICS and do not run under the authority
       of an individual user (e.g., background transactions). If so, these transactions should be
       fully documented and may be defined with the following specifications:
RACF profile:
UACC(READ)
           RESSEC(NO)
           CMDSEC(NO)
16
                                          UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                           DISA Field Security Operations
21 January 2005                                                             Developed by DISA for the DOD
Uniquely define each CICS region to the Facility Matrix Table. All controls for CICS security is
specified using the Facility Matrix options. The CICS SIT table is not used to specify security
requirements for an individual region.
Every CICS region processes in FAIL mode using the TSS installation options. Access to an
individual CICS region or a group of CICS regions defined in an MRO environment is
determined by having access to the appropriate facility. A user-defined facility is modified to
perform CICS security controls for each region or MRO grouped regions.
Ensure that users cannot sign on to more than one CICS production region within the scope of a
single CICS region, a single OS/390 image, or a sysplex.
                                                                                                        17
                                         UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                           DISA Field Security Operations
21 January 2005                                                             Developed by DISA for the DOD
•     (ZCICT050: CAT II) The IAO will ensure that control options for the Top Secret CICS
      facilities meets minimum requirements.
The CICS initialization program, DFHSIP, runs in an authorized state. It is typically installed in
the SDFHAUTH library. This library is defined to the operating system as APF authorized.
Refer to Section 2.1.2.1, Authorized Program Facility (APF), for security control information.
Utilize propagation control for each CICS region. Under no circumstance should a user's batch
job submitted from a CICS region execute under that CICS region's ACID. To prevent this from
occurring, define each CICS region ACID to the PROPCNTL resource class.
The following command example shows a CICS region ACID being owned to the PROPCNTL
resource class:
•     (ZCICT041: CAT II) The IAO will ensure that each CICS region userid is defined to the
      PROPCNTL resource class.
(1)    Grant all ACIDs associated with a CICS region the minimum privileges necessary to
       accomplish their functions. This applies equally to the CICS region ACID and any CICS
       default ACIDs. Under no circumstance should the BYPASS privilege be granted to the
       CICS region ACID. Strictly control CICS default ACIDs. Refer to Section 8.2, CICS,
       Paragraph (8).
(2)    For all CICS users, to include the CICS default user, specify the parameter OPTIME=15 in
       the user’s ACID. When the OPTIME threshold is reached, CICS takes action accordingly
       as specified in the terminals’ TYPETERM SIGNOFF parameter.
•     (ZCIC0042: CAT II) The IAO will ensure that all CICS users have a 15 minute time-out limit
      specified.
(3) The IAO will maintain documentation regarding any deviations from this requirement.
18
                                         UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                           DISA Field Security Operations
21 January 2005                                                             Developed by DISA for the DOD
The following lists of transactions have specific and unique access authorization requirements:
(1)    Transactions in Table B-1 are only for CICS internal use. Access validation to these
       transactions is be performed using the CICS region ACID, not the CICS end-user ACID.
(a) TOP SECRET rule(s) restrict access only to CICS region ACIDs.
(b) CICS transaction resource definitions use RESSEC (NO) and CMDSEC (NO).
(2)    Transactions in Table B-2 have an explicitly defined resource rule restricting them as noted
       in the table.
(3)    The transactions in Table B-3 may be exempt from security checking, and CICS permits
       any terminal user to initiate these transactions. They should be accessible to all CICS
       users. Define these transactions with the following specifications:
       (a)    Exempt from security checking by placing them in the TOP SECRET BYPASS
              TRANIDS list.
(b) CICS transaction resource definitions may use RESSEC (NO) and CMDSEC (NO).
(4)    Other transactions may exist that execute within CICS and do not run under the authority
       of an individual user (e.g., background transactions). If so, these transactions are fully
       documented and may be exempt from access validation. Define them in the TOP SECRET
       BYPASS TRANIDS list.
(5)    The TOP SECRET environmental utility transaction TSEU provides the capability to
       examine CICS security-related information. Restrict access to TSEU transaction only to
       Security personnel.
                                                                                                        19
                                          UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                            DISA Field Security Operations
21 January 2005                                                              Developed by DISA for the DOD
The use of the BYPASS list should be kept to a minimum. Only transactions that do not present
a security exposure (e.g., sign-on/sign-off, menus, etc.) are included. Transactions for
applications and COTS software are placed in unique profiles. Where required, multiple profiles
are created to provide for more granular control and separation of capabilities. For example, for
a COTS product that provides administrative, technical support, and user transactions, each of
these functional areas would be provided with a separate profile to allow the assignment of
access based on functional requirements.
(1)    Non-suspend status to prevent the region from being disabled if the default userid is
       inadvertently suspended.
(2)    A non-expiring password to prevent the region from being disabled if the default userid’s
       password is subjected to a denial-of-service attack.
20
                                          UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                              DISA Field Security Operations
21 January 2005                                                                Developed by DISA for the DOD
Database management systems (DBMSs) provide the facilities to design, create, update, access,
and manage database files. Information is stored in multiple files with various users accessing
the data for many reasons. A single person (an Administrator) typically manages these files for
all the database users.
Most database management systems require users to identify themselves by supplying a logonid
and password before accessing the database system. This method provides a good defense
against unauthorized access to the system.
Securing the use of database options, resources, and processes is crucial. All database functions
(such as commands, transactions, and interactive options) should be reviewed for potential
security exposures and to prevent unauthorized use. For example, only the database
administrator should be allowed access to all the internal facilities used to manage and
administer the database management system.
The informational data in the database should be protected against unauthorized access.
Operating system-level data set controls for the database data sets are essential, but these
controls are not enough. Users should not have complete access to all the data in a DBMS just
because they have access to the OS data sets. Consideration should be given to securing the
internal data structures, such as tables or files, within the OS data sets. This level of protection is
usually handled by the internal security within the database product.
Use the following recommendations when securing access to database management systems:
(1)    Control user access to the software product's data sets, and restrict access only to
       authorized personnel.
(2)    All database systems in use at the DOD sites will interface with the system ACP to perform
       I&A validation. Any DBMS incapable of using the ACP to accomplish I&A will be
       phased out.
•     (ZDBM0010: CAT II) The IAO will ensure that Database systems interface with the system
      ACP to perform I&A (Identification and Authentication).
(3)    Review database user access, and restrict it to various options or processes within the
       database management system. Depending on the particular database product, this includes,
       but is not limited to, areas such as regions, transactions, options, and commands.
(4)    Determine access to data structures within the database, and only grant it to eligible
       database users.
                                                                                                           21
                                           UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                            DISA Field Security Operations
21 January 2005                                                              Developed by DISA for the DOD
9.2 IDMS
IDMS security starts with load module RHDCSRTT, also known as the SRTT (Security
Resource Type Table). This module comes with IDMS and initially contains default values.
The values the module contains are changed through modification and assembly of the
#SECRTT macro. Entries are made in the SRTT that specify what resources are to be secured
and how they are to be secured. The SRTT is loaded at IDMS system start-up, and can be
reloaded dynamically by issuing a DCMT VARY NUCLEUS command for module
RHDCSRTT. The scope of the SRTT extends over one or more CA-IDMS systems, depending
on the security scheme. Generally, the following is defined in the SRTT:
• The system that enforces security on the resource (internal IDMS or external ACP)
•    For resources to be secured externally, information that the external security system needs to
     service a security check request on the resource
Resource rules are written for the ACP to arbitrate access to the IDMS regions (central versions
[CVs]) based on the resource classes and names specified in the SRTT.
•    (ZIDM0010: CAT II) The IAO will ensure that IDMS is using external security and that the
     resource to be protected is configured properly to the IDMS-CV.
Control all IDMS system data sets so that only authorized users can access these data sets and
only with the appropriate levels of permission.
•    (ZIDM0020: CAT II) The IAO will ensure that IDMS data set access authorization restricts
     UPDATE and/or ALLOCATE access to systems programming personnel and justification for
     any additional access is provided.
22
                                          UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                         DISA Field Security Operations
21 January 2005                                                           Developed by DISA for the DOD
IDMS can be run as either a batch job or an STC. In either case, a unique userid will be
associated with each IDMS region or CV. No default userids will be used. Each CV’s userid
will only have access to those resources required by IDMS to perform its function.
•   (ZIDM0030: CAT II) The IAO will ensure that IDMS regions (central versions) are defined
    with a unique userid and is properly defined to the ACP.
To assign Signon processing to an external ACP, entries are added to the SRTT for the sign-on
resource type SGON. A new SRTT is generated by use of the #SECRTT macro. The first
#SECRTT macro initializes SRTT values for all IDMS resources. The value of the TYPE
parameter on the first macro must be INITIAL. Do not change this macro.
Code the second #SECRTT macro coded as follows to specify the resource class:
The STIG recommended resource class is SGO for ACF2, #IDMSGON for RACF, and
IDMSSGON for TOP SECRET. This field, also referred to as a resource type, is used when
coding ACP security rules.
•   (ZIDM0010: CAT II) The IAO will ensure that the IDMS resource class is properly defined
    and protected in the ACP.
IDMS also requires that the last entry made in the #SECRTT macro must specify TYPE=FINAL.
Do not change this macro.
Please refer to the CA-IDMS Security Administration Guide for further details on coding the
#SECRTT macro.
In addition to the resource class, the value for what is generally referred to as resource name
must be specified. The resource name uniquely identifies each IDMS CV, and is the value
specified for SYSTEM ID on the SYSTEM statement specified when the IDMS CV is generated.
This SYSTEM ID should match the userid assigned to the CV. The SYSTEM statement is
coded as follows:
                                                                                                      23
                                        UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                          DISA Field Security Operations
21 January 2005                                                            Developed by DISA for the DOD
Each CV will have a unique name within the LPAR so that access granted for a specific CV does
not automatically give access to other CVs.
•    (ZIDM0014: CAT II) The IAO will ensure that each IDMS CV is uniquely defined to the
     ACP IDMS resource class.
9.2.1.4 APPLIDs
9.2.2 ACF2
Control all IDMS system data sets so that only authorized users can access these data sets and
only with the appropriate levels of permission.
Following is an example of the ACF2 rule set that needs to be coded to allow a user access to an
IDMS CV:
9.2.2.4 APPLIDs
24
                                         UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                          DISA Field Security Operations
21 January 2005                                                            Developed by DISA for the DOD
9.2.3 RACF
Control all IDMS system data sets so that only authorized users can access these data sets and
only with the appropriate levels of permission.
A unique userid is associated with each IDMS region or CV. All IDMS CV userids are defined
as PROTECTED userids. For example:
Propagation control must be implemented for each region/CV to ensure that the CV's userid is
not propagated to batch jobs submitted by that region. This is done by defining in the
PROPCNTL class profiles whose names match those of each region (CV). (Note that, as
specified in Section 9.4.1.3, IDMS Resource, each CV’s userid matches the resource name
associated with the region.) The following is an example of the steps necessary to ensure that
propagation control is activated for the regions. Do the following for each region/CV userid:
    For example, if the resource name (IDMS region's userid) is IDMSD, then the command
    would be as follows:
SETROPTS CLASSACT(PROPCNTL)
• Ensure that SETROPTS RACLIST processing is active for the PROPCNTL class:
SETROPTS RACLIST(PROPCNTL)
•   (ZIDMR032: CAT II) The IAO will ensure that each IDMS CV userids are defined to the
    PROPCNTL resource class.
                                                                                                       25
                                         UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                          DISA Field Security Operations
21 January 2005                                                            Developed by DISA for the DOD
All IDMS CVs that run as STCs has a matching profile defined to the STARTED resource class
as shown in the following example:
Add a new class to the RACF Class Descriptor Table and the RACF Router Table for classname
#IDMSGON. Following are examples of the two macros required to achieve this:
       ICHERCDE CLASS=#IDMSGON,
                 DFTUACC=NONE,
                 FIRST=ALPHA,
                 ID=nnn,
                 MAXLNTH=8,
                 OPER=NO,
                 OTHER=ANY,
                 POSIT=nnn
       ICHRFRTB CLASS=#IDMSGON,
                 ACTION=RACF
Following is an example of the RACF rule that needs to be coded to allow a user access to an
IDMS CV:
9.2.3.4 APPLIDs
Control all IDMS system data sets so that only authorized users can access these data sets and
only with the appropriate levels of permission.
26
                                         UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                         DISA Field Security Operations
21 January 2005                                                           Developed by DISA for the DOD
Associate each IDMS CV with a unique ACID using the following examples:
(3)    Additionally, if executed as an STC, add the ACID above to the STC record using the
       following example:
(4)    Propagation control must be implemented for each region/CV to ensure that the CV's
       ACID is not propagated to batch jobs submitted by that region. This is accomplished by
       defining each IDMS CV ACID to the PROPCNTL resource class.
       The following command example shows an IDMS CV ACID being owned to the
       PROPCNTL resource class:
•     (ZIDMT032: CAT II) The IAO will ensure that each IDMS CV userids are defined to the
      PROPCNTL resource class.
(1)    Add resource class IDMSSGON to the Resource Description Table (RDT) using the
       following example:
                                                                                                      27
                                         UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                        DISA Field Security Operations
21 January 2005                                                          Developed by DISA for the DOD
(2)    Add the resource names to resource class IDMSSGON, and permit users access to them as
       in the following example:
(3)    Define each IDMS CV in the TOP SECRET Facilities Matrix Table using the following
       example:
           * IDMSD IDMS CV
           FAC(USERxx=NAME=IDMSD,PGM=IDM,ID=xx,KEY=n,TYPE=IDMS)
           FAC(IDMSD=ACTIVE,SHRPRF,NOASUBM,NOABEND,MULTIUSER,
               NOXDEF)
           FAC(IDMSD=LUMSG,STMSG,SIGN(M),NOINSTDATA,NORNDPW,
               AUTHINIT)
           FAC(IDMSD=NOPROMPT,NOAUDIT,NORES|RES,WARNPW,NOTSOC)
           FAC(IDMSD=NOTRACE,MODE=FAIL,LOG(SMF,INIT,MSG,SEC9))
           FAC(IDMSD=UIDACID=8,LOCKTIME=000)
•     (ZIDMT040: CAT II) The IAO will ensure that IDMS Top Secret facilities are properly
      defined.
(1)    Copy the load module TSSIDMS from the TSS load library into the IDMS program load
       library.
(2) Define the program TSSIDMS in the IDMS system generation as follows:
(1)    Copy the load module TSSMAI from the TOP SECRET load library into the IDMS
       program library.
28
                                           UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                     DISA Field Security Operations
21 January 2005                                                       Developed by DISA for the DOD
(2) Define the program TSSMAI in the IDMS system generation as follows:
9.2.4.6 APPLIDs
                                                                                                  29
                                       UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                             DISA Field Security Operations
21 January 2005                                                               Developed by DISA for the DOD
30
                                               UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                             DISA Field Security Operations
21 January 2005                                                               Developed by DISA for the DOD
DASD management software products perform storage management functions. They provide
many effective services for users in an OS/390 installation. For example, these products
determine data placement, move data between device types, control DASD space usage, and
manage and automate data backup. Based on installation policy, they automatically assign
specific data definition attributes to data sets when they are created. DASD management
software products also help users to define performance goals and data availability requirements.
DASD management software products may have unlimited access to DASD resources and carry
with them many powerful management features and capabilities. Therefore they are properly
protected and only accessed by authorized users. Improper protection of these products can
cause serious problems, such as destruction of production data, improper access of sensitive
information, system data integrity exposures, etc.
Use the following recommendations when implementing security controls for DASD
management software products:
(1)    The services of an ACP are used primarily for security control. However, sometimes it
       may not be possible to provide a secure environment using only ACP controls. In this case,
       the use of product internal security may be warranted and is to be investigated for possible
       use. Product internal security facilities are not allowed to compromise existing ACP
       security controls under any circumstances.
(2)    Access to all data sets relative to software products (e.g., executable code and cataloged
       procedures, definition/configuration data, and exit routines) are controlled and restricted
       only to authorized personnel. General users are not allowed to access these data sets.
(3)    Access to all commands, to batch and on-line utilities, and to production and maintenance
       jobs relative to software products are protected and restricted only to authorized personnel.
(4)    Access to all DASD volumes and to users' data sets managed by software products are
       secured and restricted only to authorized personnel.
(5)    Review product interfaces for potential security exposures. Document any potential
       security exposures. Notify DISA FSO and the vendor.
The following sections provide detailed information concerning the protection of DASD
management software products.
                                                                                                          31
                                           UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                         DISA Field Security Operations
21 January 2005                                                           Developed by DISA for the DOD
10.2 DFSMS
•     DFSMSdfp (Data Facility Product) provides the storage, program, data, and device
      management functions of MVS/ESA. The Storage Management Subsystem (SMS)
      component of DFSMSdfp is fundamental in providing these functions. DFSMSdfp provides
      the foundation for distributed data access, using the Distributed File Manager to support
      remote access of MVS/ESA data and storage resources from workstations, personal
      computers, or other authorized systems in an SNA LU 6.2 network. Use the DFSMS/MVS
      Network File System server to enable an MVS/ESA system to act as a file server to
      workstations, personal computers, and other authorized systems in a TCP/IP network.
•     DFSMSdss (Data Set Services) provides data movement, copy, dump, and restore,
      converting data sets and volumes to and from SMS management and space management
      functions for MVS/ESA.
The latest release of DFSMS from IBM has moved virtually all of the system storage I/O and
management into this product, along with additional functionality. This is a major change in the
OS/390 environment. Because of these extensive changes, it is important to note that the steps
outlined here reflect the minimum allowable security for implementing this product.
(1) Validate authorization to access DFSMS via the ACP and its standard resources.
(2)    Control DFSMS via the Facility, Storage, Management, and Program resource classes.
       Control these resource classes via the ACP.
32
                                         UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                             DISA Field Security Operations
21 January 2005                                                               Developed by DISA for the DOD
(3)    Only grant users access to those DFSMS resources necessary to perform their normal job
       functions.
SMS classes and groups are lists of traits and characteristics associated with or assigned to data
sets, objects, and volumes. Automatic Class Selection (ACS) routines assign classes to data,
based on its requirements and attributes, and selects the target storage group. An SMS
configuration can contain the following types of classes and groups:
• Data Class
      Defines attributes about the data set that would normally be associated with the SPACE,
      DCB, or AMP parameters in standard JCL.
• Storage Class
      Defines the data set as being SMS-managed. The storage class assignment affects which
      SMS-controlled volume is selected to hold that data set.
• Management Class
      Defines space and availability management attributes of the data set. This includes how
      often to perform backups and how many backup versions are kept. A management class can
      only be associated with an SMS-controlled data set.
• Storage Group
      Defines a list of volumes and manages them as if they were one large, single volume. SMS
      applies the properties assigned to a storage group to all the volumes within the storage group.
Of these, the resident ACP controls the Storage (STORCLAS) and Management (MGMTCLAS)
classes.
This section discusses the controls used to protect DFSMS/MVS functions and commands. The
single term “functions” may be used throughout this section to imply both functions and
commands. As with all general sections in the OS/390 STIG, the discussion may use
RACF-oriented language. Each topic discussed is addressed in an ACP-specific section
demonstrating how to meet DOD requirements using ACP command examples.
                                                                                                          33
                                           UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                            DISA Field Security Operations
21 January 2005                                                              Developed by DISA for the DOD
The ability to perform functions associated with DFSMS/MVS will be controlled using SAF.
STGADMIN resources defined to the FACILITY resource class used to control access to these
functions. Although a number of STGADMIN resources are used specifically to protect the
Storage Management Subsystem, resource checking is still performed in environments where
system-managed storage is not in use. Some DFSMS/MVS functions are allowed by default and
require a STGADMIN resource to be defined to prevent its use. A generic resource will be
defined to the FACILITY resource class with no user access by default. This will ensure access
to sensitive functions is protected from unauthorized personnel.
STGADMIN resources protect a wide range of DFSMS/MVS functions from the DFSMSdfp,
DFSMSdss, DFSMShsm, and DFSMSrmm components. Some sites may have specialized
systems programming groups responsible for these different functions or aspects of storage
management. The requirements in the STIG regarding access authorization to STGADMIN
resources may refer to a single group, that is “systems programming personnel responsible for
storage management.” Depending on your site’s organizational structure and the function being
protected, this single group reference may apply to different specialized groups within the
systems programming department. Each site should maintain a document, such as an SOP, that
outlines the structure of the system-level support area including the roles and responsibilities of
each department and group within this area. In the absence of such a document, the IAO will be
responsible for ensuring appropriate documentation (such as a DD Form 2875) is maintained
justifying the access to sensitive STGADMIN functions.
The ACP resources used to control all DFSMS/MVS functions begin with the high-level
qualifier STGADMIN. To distinguish these functions and ensure authorization is restricted to
the appropriate personnel, access to STGADMIN resources will be controlled using the first two
high-level resource name qualifiers at a minimum. The exception will be DFSMSdss
Administrator resources that will be controlled using the first three high-level resource name
qualifiers at a minimum.
•    (ZSMS0010: CAT II) The IAO will ensure that no access is given to the high-level
     STGADMIN resource.
DFSMSdfp is the core component of DFSMS/MVS. It performs the essential data, storage,
program, and device management functions of the operating system. DFSMSdfp includes
Access Method Services (AMS), OPEN/CLOSE/EOV routines, catalog management, DADSM
(DASD space control) utilities, IDCAMS, SMS, NFS, ISMF, and other functions. Many of the
functions offered with these services and utilities are intended for storage administration only
and must be restricted to appropriate personnel.
The DFSMSdfp resources in this section are grouped together by functional support, such as
SMS configuration or catalog maintenance. Please note that all DFSMSdfp resources are
protected using the FACILITY resource class.
There is one unique DFSMSdfp resource that does not fit well into a group. This resource is
named STGADMIN.DPDSRN.olddsname, where olddsname is up to 23 characters of the
34
                                          UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                             DISA Field Security Operations
21 January 2005                                                               Developed by DISA for the DOD
existing data set name. It controls the ability to scratch or rename a data set that is allocated to
another address space in the system or sysplex. To preserve data integrity, this functionality
should not be allowed. However there are times when you may need to scratch or rename a data
set that has the same name as a data set used by another address space, for example, when
building a new system. Access to STGADMIN.DPDSRN.olddsname resources will be restricted
to systems programming personnel on an as needed basis only. Permanent access to these
resources will not be permitted and will not be granted on a production system. All
STGADMIN.DPDSRN.olddsname resources will be defined to the ACP as fully qualified and
not generic, all access will be logged. Appropriate documentation justifying access requirements
to STGADMIN.DPDSRN.olddsname resources will be maintained by the IAO.
DFSMSdfp can be used to manage storage control unit characteristics. The following table lists
the SAF resource information relative to the protection of DFSMSdfp functions specific to
DASD cache configuration support:
                                                                                                          35
                                           UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                         DISA Field Security Operations
21 January 2005                                                           Developed by DISA for the DOD
All DFSMSdfp DASD cache controller SAF resources identified in the above table will be
defined to the FACILITY resource class with no user access by default. Access to these resource
will be restricted to systems programming personnel responsible for storage management only.
•    (ZSMS0010: CAT II) The IAO will ensure that all access to the resources in the above table
     will be restricted to systems programming personnel responsible for storage management.
DFSMSdfp can be used to manage SMS configuration characteristics. The following table lists
the SAF resource information relative to the protection of DFSMSdfp functions specific to SMS
configuration support:
                          Table B-6. DFSMSdpf SAF RESOURCES (10.2.2.1.2)
                                     DFSMSdfp SAF RESOURCES
                     SMS CONFIGURATION SUPPORT
            RESOURCE NAME                     DESCRIPTION                                 ACCESS
 STGADMIN.IDC.DCOLLECT                Collect data set and volume                         READ
                                      statistics and information,
                                      and SMS configuration data
 STGADMIN.IGD.ACTIVATE.CONFIGURATION Activate an SMS                                      READ
                                      configuration from the
                                      Interactive Storage
                                      Management Facility
                                      (ISMF) application
 STGADMIN.IGG.ALTER.SMS               Alter the storage class and                         READ
                                      management class of an
                                      SMS-managed data set
 STGADMIN.IGG.ALTER.UNCONVRT          Alter an SMS-managed                                READ
                                      VSAM data set to an
                                      unmanaged VSAM data set
 STGADMIN.IGG.LIBRARY                 Define, delete, or alter                            READ
                                      library and volume entries
                                      in a tape library
 STGADMIN.IGWSHCDS.REPAIR             Use AMS SHCDS                                       READ
                                      command to manage
                                      SMSVSAM recovery
All DFSMSdfp SMS configuration SAF resources identified in the above table will be defined to
the FACILITY resource class with no user access by default. Access to these resource will be
restricted to systems programming personnel responsible for storage management only.
•    (ZSMS0010: CAT II) The IAO will ensure that all access to the resources in the above table
     will be restricted to systems programming personnel responsible for storage management.
36
                                           UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                           DISA Field Security Operations
21 January 2005                                                             Developed by DISA for the DOD
                                                                                                        37
                                         UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                         DISA Field Security Operations
21 January 2005                                                           Developed by DISA for the DOD
DFSMSdfp can be used to manage ICF catalog characteristics. An ICF catalog consists of two
separate kinds of data sets, a Basic Catalog Structure (BCS) and a VSAM Volume Data Set
(VVDS). The following table lists the SAF resource information relative to the protection of
DFSMSdfp functions specific to Integrated Catalog Facility (ICF) catalog maintenance:
All DFSMSdfp ICF catalog maintenance SAF resources identified in the above table will be
defined to the FACILITY resource class with no user access by default. Access to these resource
will be restricted to systems programming personnel responsible for storage management only.
•    (ZSMS0010: CAT II) The IAO will ensure that all access to the resources in the above table
     will be restricted to systems programming personnel responsible for storage management.
38
                                           UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                            DISA Field Security Operations
21 January 2005                                                              Developed by DISA for the DOD
Section 3.1.5.1, Data Set Controls, restricts alter and update data set access to the System Master
Catalog to systems programming personnel. In the past, security personnel required these levels
of access to the System Master Catalog to DEFINE and DELETE user catalog aliases as part of
maintaining user accounts on the system. The alter access is excessive given the sensitive nature
of the System Master Catalog. To allow security personnel to adequately maintain user catalog
aliases, the FACILITY resource class can be used instead of assigning alter and update data set
access to the System Master Catalog.
DFSMSdss is a DASD data and space management tool. DFSMSdss utilities can be used to
copy and move data sets between volumes, dump and restore data sets and volumes, convert data
sets and volumes to and from SMS management, compress partitioned data sets, and many other
DASD management functions.
DFSMSdss resources can be grouped into two categories. One group of resources respects
existing ACP controls, such as data set and volume resource rules, before allowing the
DFSMSdss function. Because additional ACP controls may be in effect, access authorization to
some DFSMSdss functions outside the systems programming group responsible for storage
management will be permitted. These resources protect Non-Administrator functions.
The other group of resources provides the authority required to perform system storage
administration tasks. The authority associated with these functions allows a user to obtain a
privileged status and effectively bypass all ACP data set and volume controls. Access
authorization to these resources will be restricted to systems programming personnel responsible
for storage management.
                                                                                                         39
                                          UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                        DISA Field Security Operations
21 January 2005                                                          Developed by DISA for the DOD
The following table lists the SAF resource information relative to the protection of DFSMSdss
Non-Administrator functions:
                          Table B-8. DFSMSdss SAF RESOURCES (10.2.2.2 a)
                                     DFSMSdss SAF RESOURCES
                       Non-Administrator Functions
         RESOURCE NAME              DESCRIPTION                          ACCESS          USERS
 STGADMIN.ADR.COPY.BYPASSACS        Use DFSMSdss                         READ            Sysprogs
                                    COPY command with
                                    user-specified storage
                                    and management
                                    classes
 STGADMIN.ADR.COPY.CNCURRNT         Use DFSMSdss                         READ            Sysprogs
                                    COPY command with                                    End-users
                                    quick data set
                                    serialization
 STGADMIN.ADR.COPY.INCAT            Use DFSMSdss                         READ             Sysprogs
                                    COPY command
                                    altering the catalog
                                    search sequence
 STGADMIN.ADR.COPY.PROCESS.SYS      Use DFSMSdss                         READ            Sysprogs
                                    COPY command on
                                    SYS1 data sets
 STGADMIN.ADR.COPY.TOLERATE.        Use DFSMSdss                         READ            Sysprogs
 ENQF                               COPY command                                         End-users
                                    while data set is in use
 STGADMIN.ADR.CONVERTV              Use DFSMSdss                         READ             Sysprogs
                                    CONVERTV
                                    command to convert
                                    existing volumes to
                                    and from SMS
 STGADMIN.ADR.DEFRAG                Use DFSMSdss                         READ             Sysprogs
                                    DEFRAG command to
                                    relocate data extents
                                    on a DASD volume
 STGADMIN.ADR.DUMP.CNCURRNT         Use DFSMSdss                         READ            Sysprogs
                                    DUMP command with                                    End-users
                                    quick data set
                                    serialization
 STGADMIN.ADR.DUMP.INCAT            Use DFSMSdss                         READ             Sysprogs
                                    DUMP command
                                    altering the catalog
                                    search sequence
40
                                           UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                               DISA Field Security Operations
21 January 2005                                                 Developed by DISA for the DOD
                                                                                            41
                                           UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                         DISA Field Security Operations
21 January 2005                                                           Developed by DISA for the DOD
All DFSMSdss Non-Administrator functions identified in the above table will be defined to the
FACILITY resource class with no user access by default. Access to these resource will be
restricted to systems programming personnel responsible for storage management and authorized
end-users as indicated in the table. Fully qualified resource names for all access authorizations
permitted to end-users will be defined by the IAO.
•    (ZSMS0010: CAT II) The IAO will ensure that all access to the resources in the above table
     will be restricted to systems programming personnel and end-users.
The following table lists the SAF resource information relative to the protection of DFSMSdss
Administrator functions:
42
                                           UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                          DISA Field Security Operations
21 January 2005                                                            Developed by DISA for the DOD
All DFSMSdss Administrator functions identified in the above table will be defined to the
FACILITY resource class with no user access by default. Access to these resource will be
restricted to systems programming personnel responsible for storage management. DFSMSdss
SAF resources for Administrator functions will be defined using the first three high-level
resource name qualifiers at a minimum. All access to these resources will be logged using the
ACP.
•   (ZSMS0010: CAT II) The IAO will ensure that all access to at least the first three high-level
    qualifiers of the resources in the above table will be restricted to systems programming
    personnel responsible for storage management and will be logged.
This section was not completed at the time this document was prepared. Guidance for this
product will be added in a future update to this document.
                                                                                                       43
                                           UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                              DISA Field Security Operations
21 January 2005                                                                Developed by DISA for the DOD
DFSMSrmm is a product that manages removable media. There are no current plans to develop
guidance for DFSMSrmm in this document.
Use the PROGRAM resource class to prevent unauthorized users from running selected
Interactive Storage Management Facility (ISMF) programs. Details on this protection can be
found in the associated IBM documentation.
The PROGRAM resource class is used to protect programs used to modify or change SMS.
Restrict these programs only to personnel who provide DASD management, system security, and
systems programming. These programs all begin with DGT and reside in SYS1.DGTLLIB and
SYS1.DFQLLIB data sets. The default user access to these programs will be specified as
NONE.
•     (ZSMS0012: CAT II) The IAO will ensure that the DGT* program resource is defined to the
      ACP with no user access by default and only authorized user are given access.
(1)    Restrict update and alter access to the following control data sets only to systems
       programming personnel who are responsible for DASD management:
       (a)    Source Control Data Set (SCDS) contains an SMS configuration, which defines a
              storage management policy.
       (b)    Active Control Data Set (ACDS) contains a copy of the most recently activated
              configuration. All systems in an SMS complex use this configuration to manage
              storage.
       (c)    Communications Data Set (COMMDS) contains the name of the ACDS containing
              the currently active storage management policy, the current utilization statistics for
              each system-managed volume, and other system information.
(2) The ACDS data set will reside on a different volume than the COMMDS data set.
•     (ZSMS0022: CAT II) The IAO will ensure that SMS control data set(s) are placed on
      separate volumes.
(3)    Allocate backup copies of the ADCS and COMMDS data sets on a different shared volume
       from the primary ADCS and COMMDS data sets.
44
                                            UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                           DISA Field Security Operations
21 January 2005                                                             Developed by DISA for the DOD
(4)    The ACS Routine Source Data Sets contain clist-like routines that define actions to be
       taken when a new data set is allocated. The SMS-managed classes are selected by the
       Automatic Class Selection (ACS) routines:
(5)    The ACS Routine Test Library contains partitioned data set(s) whose members are ACS
       test cases.
•     (ZSMS0020: CAT II) The IAO will ensure that DFSMS control data sets restrict Update or
      Allocate access to system programmers responsible for dasd management. Justification is
      required for any additional access.
The use of SMS management classes and storage classes can be controlled using the ACP. The
product default is to use the resource owner value, which is based on the high-level qualifier of
the data set name, to control access to management and storage classes. As an alternative, the
user allocating the data set can be used to control access to these classes. This option is
controlled with the USE_RESOWNER parameter. Refer to Section 10.2.5.2, System Parmlib
Members, for additional information.
•     (ZSMS0014: CAT II) The IAO will ensure that if USE_RESOWNER(YES) is in effect, a
      resource owner (RESOWNER) in the DFP segment of all ACP data set profiles is defined.
(1)    In member IEASYSxx, the SMS=xx parameter indicates the member name of the
       IGDSMSxx within SYS1.PARMLIB that is used for initialization. For example, if
       SMS=00 in IEASYSxx, the IGDSMS00 member of SYS1.PARMLIB is used during
       initialization.
                                                                                                        45
                                          UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                           DISA Field Security Operations
21 January 2005                                                             Developed by DISA for the DOD
46
                                          UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                       DISA Field Security Operations
21 January 2005                                                         Developed by DISA for the DOD
The parameter settings for member IGDSMSxx are at the discretion of the site. Parameter
default values may change with product maintenance and newer releases of software. Therefore
all optional parameter settings in Table B-9, SMS INITIALIZATION PARAMETERS (in
IGDSMSxx) are explicitly coded to ensure desired operations.
•     (ZSMS0032: CAT II) The systems programmer will ensure that the parameters in the above
      table are defined in the IDGSMSxx members in parmlib.
•
(3)    Member IEFSSNxx activates the SMS subsystem to MVS.
       IEFSSNxx is used to define SMS to MVS. The following is the keyword syntax for
       defining IEFSSNxx:
           SUBSYS SUBNAME(SMS)
           [INITRTN(IGDSSIIN) [INITPARM(‘ID=yy,PROMPT={NO   }’]]
                                                       YES ]]
                                                       [DISPLAY]]
                                                                                                    47
                                        UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                             DISA Field Security Operations
21 January 2005                                                               Developed by DISA for the DOD
•     (ZSMS0030: CAT II) The systems programmer will ensure that SMS IGDSSIIN parameters
      are defined in the IEFSSNxx member in parmlib.
10.2.6 ACF2
(1) Use the default CLASMAP definitions for MGMTCLAS and STORCLAS.
(2)    Define resource rules for the MGMTCLAS resource class. The following is an example
       resource rule, replacing management class with a one to eight-character management class
       and uid with the user's UID string:
           SET RESOURCE(MGM)
           COMPILE * STORE
           $KEY(management class) TYPE(MGM)
           UID(uid) ALLOW
(3)    Define resource rules for the STORCLAS resource class. The following is an example
       resource rule, replacing storage class with a one to eight-character storage class and uid
       with the user's UID string:
           SET RESOURCE(STR)
           COMPILE * STORE
           $KEY(storage class) TYPE(STR)
           UID(uid) ALLOW
•     (ZSMSA008: CAT II) The IAO will ensure that the MGMTCLAS and STORCLAS resource
      classes are defined to the GSO CLASSMAP record.
(4)    Ensure that the MGM and STR resource types of r-rmgm and r-rstr are defined within the
       GSO INFODIR. To find out if these resource types are defined in INFODIR, issue the
       SHOW ACF2 command. If the resource type is not defined, issue the following ACF2
       commands:
           ACF
           SET CONTROL(GSO)
           CHANGE INFODIR TYPE(R-RMGM R-RSTR) ADD
48
                                           UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                          DISA Field Security Operations
21 January 2005                                                            Developed by DISA for the DOD
•   (ZSMSA004: CAT II) The IAO will ensure that r-rmgm, r-rstr, r-rfac and r-rpgm resource
    types are defined within the GSO INFODIR.
Issue the following Operator command to refresh the in-storage resource directory:
F ACF2,REFRESH(INFODIR)
This section illustrates the rules required to implement the controls for DFSMS/MVS resources
discussed throughout Section 10.2.2, DFSMS/MVS Functions and Commands in an ACF2
environment.
ACF2 processes SAF calls to the FACILITY resource class by default using the STIG
recommended resource type FAC. No additional SAFDEF or CLASMAP definitions are
required.
•   (ZSMSA006: CAT II) The IAO will ensure that Facility and Program resource classes are
    defined to the ACF2 GSO SAFDEF record.
The following rule may be used to establish default protection for all DFSMS/MVS resources:
       $KEY(STGADMIN) TYPE(FAC)
       - UID(-) PREVENT DATA(DEFAULT ACCESS TO ALL DFSMS -
           RESOURCES)
The following rules may be used to control access to the DFSMSdfp resources discussed in
Section 10.2.2.1, DFSMSdfp Resource Protection:
       $KEY(STGADMIN) TYPE(FAC)
       DPDSRN.olddsname UID(sysprog-group) SERVICE(READ) LOG -
          DATA(DFSMSDFP BYPASS DATA SET INTEGRITY CHECKING)
       IDC.- UID(sysprog-group, storage-mgmt-group) SERVICE(READ) ALLOW -
          DATA(DFSMSDFP VARIOUS ACCESS METHOD SERVICES)
       IGD.ACTIVATE.CONFIGURATION -
          UID(sysprog-group, storage-mgmt-group) SERVICE(READ) LOG -
              DATA(DFSMSDFP ACTIVATE SMS CONFIGURATION)
       IGG.- UID(sysprog-group, storage-mgmt-group) SERVICE(READ) ALLOW -
          DATA(DFSMSDFP VARIOUS CATALOG MANAGEMENT -
              FUNCTIONS)
       IGG.DEFDEL.UALIAS UID(sysprog-group, storage-mgmt-group, -
          security-group) SERVICE(READ) LOG DATA(DFSMSDFP DEFINE -
              AND DELETE USER ALIASES IN THE MASTER CATALOG)
                                                                                                       49
                                         UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                        DISA Field Security Operations
21 January 2005                                                          Developed by DISA for the DOD
The following rules may be used to control access to the DFSMSdss resources discussed in
Section 10.2.2.2, DFSMSdss Resource Protection:
       $KEY(STGADMIN) TYPE(FAC)
       ADR.- UID(sysprog-group, storage-mgmt-group) SERVICE(READ) ALLOW -
         DATA(DFSMSDSS NON ADMINISTRATOR FUNCTIONS)
       ADR.COPY.CNCURRNT UID(end-user-group) SERVICE(READ) ALLOW -
         DATA(DFSMSDSS COPY COMMAND USING QUICK -
             SERIALIZATION)
       ADR.COPY.TOLERATE.ENQF UID(end-user-group) SERVICE(READ) -
         ALLOW DATA(DFSMSDSS COPY COMMAND WHILE DATA SET IS -
             IN USE)
       ADR.DUMP.CNCURRNT UID(end-user-group) SERVICE(READ) -
         ALLOW DATA(DFSMSDSS DUMP COMMAND USING QUICK -
             SERIALIZATION)
       ADR.DUMP.TOLERATE.ENQF UID(end-user-group) SERVICE(READ) -
         ALLOW DATA(DFSMSDSS DUMP COMMAND WHILE DATA SET -
             IS IN USE)
       ADR.RESTORE.TOLERATE.ENQF UID(end-user-group) -
         SERVICE(READ) ALLOW DATA(DFSMSDSS RESTORE COMMAND -
             WHILE DATA SET IS IN USE)
       ADR.STGADMIN.- UID(sysprog-group, storage-mgmt-group) -
         SERVICE(READ) LOG DATA(DFSMSDSS ADMINISTRATOR -
             FUNCTIONS)
(1) Ensure that an SAFDEF record is defined with the following information:
•     (ZSMSA006: CAT II) The IAO will ensure that Facility and Program resource classes are
      defined to the ACF2 GSO SAFDEF record.
50
                                        UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                          DISA Field Security Operations
21 January 2005                                                            Developed by DISA for the DOD
(2)    Define resource rules for the PROGRAM resource class. The following is an example
       resource rule that may be entered:
           SET RESOURCE(PGM)
           COMPILE * STORE
           $KEY(DGT*****) TYPE(PGM)
           UID(SYS) ALLOW
           UID(*) PREVENT
(3)    Ensure that the PGM resource type of r-rpgm is defined within the GSO INFODIR. To
       find out if this resource type is defined in INFODIR, issue the SHOW ACF2 command. If
       the resource type is not defined, issue the following ACF2 commands:
           ACF
           SET CONTROL(GSO)
           CHANGE INFODIR TYPE(R-RPGM) ADD
•     (ZSMSA004: CAT II) The IAO will ensure that r-rmgm, r-rstr, r-rfac and r-rpgm resource
      types are defined within the GSO INFODIR.
Issue the following Operator command to refresh the in-storage resource directory:
F ACF2,REFRESH(INFODIR)
The data sets described in Section 10.2.4, SMS Data Set Controls, are protected from
unauthorized access to prevent the possible compromise of the SMS environment.
The following ACF2 commands can be used to protect these data sets, replacing hlq with the
data set high-level qualifier, and name with the remaining portion of the data set name or mask
(i.e., SMS.-.-) and replacing uid with the UID string:
           SET RULE
           $KEY(hlq)
           name UID(uid) READ(A) WRITE(L) EXEC(A)
(2) Grant access to personnel who perform file maintenance on the SMS data sets:
           SET RULE
           $KEY(hlq)
           name UID(uid) READ(A) WRITE(L) ALLOC(L) EXEC(A)
                                                                                                       51
                                          UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                           DISA Field Security Operations
21 January 2005                                                             Developed by DISA for the DOD
(3)    Grant access to all other personnel with a need to review or access the information within
       these SMS data sets, as required:
           SET RULE
           $KEY(hlq)
           name UID(uid) READ(A) EXEC(A)
For all data set profiles under SMS control, a resource owner is defined within the DFP segment
using the following command as an example. Replace hlq with the data set high-level qualifier,
name with the remaining portion of the data set name or mask, dfp name with the name of the
DFP segment name, and resowner with the owner of this data set resource:
       SET RULE
       $KEY(SYS1)
       $RESOWNER(SYSTEMS)
       PARMLIB UID(SYS) READ(A) WRITE(L) ALLOC(L) EXEC(A)
Standard controls are maintained over the system parmlib, as defined in Section 2, OS/390
Integrity. No additional ACP controls are required at this time.
10.2.7 RACF
52
                                            UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                           DISA Field Security Operations
21 January 2005                                                             Developed by DISA for the DOD
(1)    Activate RACF general resource classes MGMTCLAS and STORCLAS, and place these
       resources in the RACLIST:
(2)    Define the profile, where class is MGMTCLAS or STORCLAS, and value is the one to
       eight-character entry for the management class or storage class that is to be protected:
(3)    Selectively allow access to users requiring access to SMS. Use the following as a sample,
       replacing user-id with the userid of the user or a RACF Group:
(4) Refresh the RACLIST to effect the changes made to these resources:
•     (ZSMSR008: CAT II) The IAO will ensure that MGMTCLAS, STORCLAS, PROGRAM, and
      FACILITY resource classes are active and refreshed.
This section illustrates the commands required to implement the controls for DFSMS/MVS
resources discussed throughout Section 10.2.2, DFSMS/MVS Functions and Commands in a
RACF environment.
The FACILITY resource class is used by several other products to control resource access and
may already be configured properly. Ensure the FACILITY resource class is enabled for generic
processing and is active.
The following commands may be used to activate generic processing for the FACILITY resource
class:
       SETROPTS GENERIC(FACILITY)
       SETROPTS GENCMD(FACILITY)
                                                                                                        53
                                          UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                          DISA Field Security Operations
21 January 2005                                                            Developed by DISA for the DOD
After all the necessary resource profiles are defined, activate the FACILITY resource class to
enable SAF protection. The following command may be used to activate the FACILITY
resource class:
SETROPTS CLASSACT(FACILITY)
•    (ZSMSR008: CAT II) The IAO will ensure that MGMTCLAS, STORCLAS, PROGRAM, and
     FACILITY resource classes are active and refreshed.
The following command may be used to establish default protection for all DFSMS/MVS
resources:
The following commands may be used to control access to the DFSMSdfp resources discussed in
Section 10.2.2.1, DFSMSdfp Resource Protection:
54
                                         UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                     DISA Field Security Operations
21 January 2005                                                       Developed by DISA for the DOD
The following commands may be used to control access to the DFSMSdss resources discussed in
Section 10.2.2.2, DFSMSdss Resource Protection:
                                                                                                  55
                                      UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                            DISA Field Security Operations
21 January 2005                                                              Developed by DISA for the DOD
After all the necessary resource profiles are defined, activate the PROGRAM resource class to
enable SAF protection. The following command may be used to activate the PROGRAM
resource class:
SETROPTS CLASSACT(PROGRAM)
•     (ZSMSR008: CAT II) The IAO will ensure that MGMTCLAS, STORCLAS, PROGRAM, and
      FACILITY resource classes are active and refreshed.
Define a PROGRAM profile to protect SMS programs. Protect the SMS programs and grant
access to users as required, replacing user-id with the userid of the user or a RACF Group:
Protect the data sets described in Section 10.2.4, SMS Data Set Controls, from unauthorized
access to prevent the possible compromise of the SMS environment.
(1)    Assign default protection for these data sets, replacing data name with the fully qualified
       data set name or a generic prefix (e.g., SYS1.SMS.**):
56
                                           UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                               DISA Field Security Operations
21 January 2005                                                                 Developed by DISA for the DOD
NOTE:: The above commands are only issued if the data set has not already been defined in a
           RACF data set profile.
(2)    Permit access to those personnel who manage the SMS environment, replacing user-id with
       the userid of the user or a RACF Group:
(3) Permit access to those personnel who perform maintenance on these data sets:
NOTE:: Issue the SECURITY command from the command line of the ISMF Data Set
           Application to protect these data sets.
For all data set profiles under SMS control, define a resource owner within the DFP segment
using the following command as an example. Replace data-set with the data set name or a
generic prefix, user-id with the userid of the user or a RACF Group of the resource owner, and
access with the default access for the data set:
Standard controls are maintained over the system parmlib, as defined in Section 2, OS/390
Integrity. No additional ACP controls are required at this time.
       IBMFAC              -   FACILITY Resource Class (Not to be confused with the TSS resource.)
       PROGRAM             -   PROGRAM Resource Class
       STORCLAS            -   STORCLAS Resource Class
       MGMTCLAS            -   MGMTCLAS Resource Class
(1)    Assign the MGMTCLAS and STORCLAS resources for SMS to those personnel who
       administer access to them, replacing user-id with a user, department, or division and class
       name with the one to eight-character management or storage class:
                                                                                                            57
                                               UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                           DISA Field Security Operations
21 January 2005                                                             Developed by DISA for the DOD
(2)    Selectively allow access to users requiring access to SMS, replacing user-id with the userid
       of the user, or a Group profile:
This section illustrates the commands required to implement the controls for DFSMS/MVS
resources discussed throughout Section 10.2.2, DFSMS/MVS Functions and Commands in a TOP
SECRET environment.
The FACILITY resource class used by IBM is identified by the IBMFAC resource class when
using TOP SECRET. The IBMFAC resource class is predefined in the TOP SECRET RDT. No
additional configuration of the IBMFAC entry in the RDT is required.
The following command may be used to establish default protection for all DFSMS/MVS
resources:
The following commands may be used to control access to the DFSMSdfp resources discussed in
Section 10.2.2.1, DFSMSdfp Resource Protection:
58
                                          UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                           DISA Field Security Operations
21 January 2005                                                             Developed by DISA for the DOD
The following commands may be used to control access to the DFSMSdss resources discussed in
Section 10.2.2.2, DFSMSdss Resource Protection:
(1)    Assign ownership of the PROGRAM resource class for the ISMF programs to those
       personnel who administer access to them, replacing user-id with a user, department, or
       division:
(2)    Selectively grant access to the SMS programs, replacing user-id with the userid of the user
       or a Group profile or the ALL profile, and program with a program name or prefix:
                                                                                                        59
                                          UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                           DISA Field Security Operations
21 January 2005                                                             Developed by DISA for the DOD
The data sets described in Section 10.2.4, SMS Data Set Controls, are protected from
unauthorized access to prevent the possible compromise of the SMS environment.
(1)    Assign ownership of the data sets, replacing user-id with a user, department, or division
       that administer access to the SMS control data sets, and data name with the prefix of the
       SMS control data sets:
(2)    Permit access to those personnel who manage the SMS environment, replacing user-id with
       the userid of the user or a Group profile:
(3) Permit access to those personnel that perform maintenance on these data sets:
For all data set profiles under SMS control, define a resource owner within the DFP segment
using the following command as an example. Replace user-id with a user, department, or
division, data name with the prefix of the SMS controlled data sets, and resource-id with a
userid or control-type user:
Standard controls are maintained over the system parmlib, as defined in Section 2, OS/390
Integrity. No additional ACP controls are required at this time.
60
                                          UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                             DISA Field Security Operations
21 January 2005                                                               Developed by DISA for the DOD
Tape management software products provide the facilities to control and manage the tape storage
environment. They typically offer features such as real-time processing, tape data set retention,
on-line inquiry and update, tape library maintenance, and scratch pool management.
Consideration should be given to securing the data sets that comprise the tape management
system. Data sets containing the software product and information regarding the tape storage
environment should be protected from unauthorized access and are restricted only to authorized
personnel.
If an interactive application is available to access the tape management system, thought must be
given to securing this facility. Access to on-line applications are prohibited from general use;
access is granted only to authorized personnel. Some commands and features within the
application provide the ability to modify the tape storage environment. These items are strictly
controlled and restricted to individual(s) responsible for tape storage control, such as the tape
librarian.
All security and product interfaces are carefully evaluated for possible system and data integrity
problems and for potential security exposures. These include interfaces delivered with the tape
management software, and interfaces offered by other software packages that may interact with
the tape management system. These interfaces may offer their own internal security, provide the
potential to circumvent ACP security controls, or expose weaknesses in protection.
Depending on the product, access authority can be controlled in one of the following three
methods:
Use ACP controls whenever possible. However, it may not be possible to provide a totally
secure environment using only ACP controls. In this case, the use of internal security may be
warranted and investigated for possible use. If it is determined that an enhanced level of
protection is gained that the ACP does not provide, the internal security may be activated. It is
important to remember that base-level ACP controls are not to be compromised.
Use the following recommendations when securing access to tape management software:
(1)    Control access to the software product's data sets, and restrict access only to authorized
       personnel.
                                                                                                          61
                                           UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                              DISA Field Security Operations
21 January 2005                                                                Developed by DISA for the DOD
(2)    Strictly enforce access to the on-line applications, and restrict access only to authorized
       personnel.
(3)    Rigidly control the use of commands, options, and functions within the products, and
       restrict it to those functions necessary for users to accomplish their assigned
       responsibilities.
(4)    Review all interfaces for possible system and data integrity problems, and for potential
       security exposures. Document any potential security exposures. Notify DISA FSO and the
       vendor.
(5)    The ACP controls access authority. Evaluate internal security for possible use, providing it
       does not replace or compromise existing ACP security controls.
11.2 CA-1
NOTE:: All the information in this section pertains to CA-1, Version 5.0 and above.
To establish this level of functionality, CA-1 takes advantage of several OS/390 facilities and
performs dynamic modifications to the OS/390 operating system, including the following items:
(1)    CA-1 X and Y SVCs are dynamically installed during initialization. Refer to Section
       2.1.2.4, Supervisor Calls (SVCs), for security guidelines.
(2)    CA-1 module TMSSMF83 dynamically front-ends SMF exit IEFU83. Refer to Section
       2.1.2.6, OS/390 and Other Product Exits, for security guidelines.
(3)    CA-1 modules dynamically replace IBM label editor routines. Refer to Section 2.1.2,
       Software Integrity, for general security guidelines.
(4)    The subsystem entry, TMS, is dynamically established during initialization rather than
       explicitly defined in SYS1.PARMLIB member IEFSSNxx. Refer to Section 2.1.2,
       Software Integrity, for general security guidelines.
NOTE:: By product design, the dynamic functions mentioned above are not performed by CA-1
           modules. They are established by the CAIRIM component of the Computer Associates
           CA-90s product on behalf of CA-1.
62
                                           UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                           DISA Field Security Operations
21 January 2005                                                             Developed by DISA for the DOD
(5)    Several CA-1 modules require LPA residency. Refer to Section 2.1.2.8, Link Pack Area,
       for security guidelines.
(6)    The CA-1 load library is specified in the system Linklist, and APF authorization is
       required. Refer to Section 2.1.2.1, Authorized Program Facility (APF), and Section
       2.1.2.9, Linklist, for security guidelines.
Implement CA-1 security management by using a combination of ACP and internal product
security controls.
(1)    Use the CA-1 system password when deactivating, batch activating, and reinitializing
       CA-1. When executing TMSINIT after an operating system IPL, the IEFTMS0 WTOR
       message is displayed on the system console. The proper response is the CA-1 system
       password.
       Starting with CA-1, Version 5.1, use an additional security check using the ACP. Refer to
       Section 11.2.2, External Security, for further information about TMSINIT security.
NOTE: The CA-1 default system password is common with all CA-1 systems. The default
           system password will be changed to a unique password.
•     (ZCA10020: CAT II) The systems programmer/IAO will ensure that the CA-1 default system
      password is changed.
(2)    Use CA-1 internal passwords to access the CA-1 ISPF application or the TIQ command
       processor. The CA-1 system password allows complete access to all on-line functions.
       Additional passwords with different degrees of functionality are defined by default, and are
       common to all CA-1 systems (as is the system password).
       Use ACP controls to validate the authority to use the CA-1 internal passwords. Refer to
       Section 11.2.2, External Security, for further information about password security.
(3)    Use the CA-1 system password when executing the TMSUDSNB utility to perform updates
       to TMC and Audit Control records and to TMC DSNB records.
       Use ACP controls to supplement access authorization validation to these data sets. Refer to
       Section 11.2.2, External Security, for further information about the Y SVC and BATCH
       security interfaces.
(4) Do not implement CA-1 internal security for data set password protection.
                                                                                                        63
                                          UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                            DISA Field Security Operations
21 January 2005                                                              Developed by DISA for the DOD
CA-1 ACP security interfaces are controlled by options coded in CAI.PPOPTION, member
TMOOPTxx. The specific required option settings are dependent on the ACP in use on the
system. The STIG required settings are detailed in the CA-1 ACP-specific sections.
• CATSEC Option
     This option’s purpose is to handle tape cataloging and un-cataloging as an external security
     call even if the external security system is not active.
• OCEOV Option
• PMASK Option
     This option is used by foreign Countries that do not support the special character
     masking specified by CA. Our recommendation is not to use this or to change
     the default specified by CA.
• DSNB Option
     This option controls data set access authority for secondary data set(s) on a tape and works
     with the OCEOV option. When a secondary data set is opened, an access authorization
     check is performed on the primary, or first, data set on the tape along with the standard
     OCEOV call for the secondary data set.
     The access authority is the same as used with the OCEOV call for the secondary data set
     (e.g., read, update, or data set creation).
NOTE: This option may conflict with software products that conserve volume usage by
           stacking data sets on tapes. If this is the case, DSNB processing must be turned OFF in
           the TMOOPT00 options member.
64
                                          UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                            DISA Field Security Operations
21 January 2005                                                              Developed by DISA for the DOD
• YSVC Option
    This option controls access to the Y SVC programs, which perform all direct access to the
    TMC and Audit data sets. It applies only to batch jobs and on-line users, and does not affect
    real-time tape processing.
    Two different resource names are checked to validate a user's access to the TMC and Audit
    data sets. YSVCUNCD is used for unconditional access and YSVCCOND is used for
    conditional access. Each can be checked for read and update authorities. For example, a
    user may have read access to YSVCUNCD and update access to YSVCCOND. This allows
    the user to read any record in the TMC and Audit data sets, and allows the user conditional
    update access to these same records. The resource class is CATAPE for both resources.
    Unconditional access authority allows a user to perform the desired function without further
    security processing. Conditional access authority allows a user to perform the desired
    function if the user also has the same level of access to the data set name in the TMC record
    being accessed.
• BATCH Option
    This option controls direct access to the Volume and DSNB records within the TMC. It
    applies only to batch jobs and on-line users, and does not affect real-time tape processing. It
    works along with Y SVC processing when conditional access has been granted. This check
    is bypassed for users granted Y SVC unconditional access.
• PSWD Option
    This option controls the use of CA-1 internal passwords for on-line access. The resource
    class is set to CATAPE, and the entity name is the actual CA-1 password itself.
• CMD Option
    This option controls the use of CA-1 commands under the CA-1 ISPF and TSO on-line
    applications. This is accomplished by setting the resource class to CACMD and the entity
    name to L0, followed by the first six characters of the command name.
                                                                                                         65
                                          UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                           DISA Field Security Operations
21 January 2005                                                             Developed by DISA for the DOD
           ADD
           CLEAN
           CHECKIN
           CHECKOUT
           DELETE
           ERASE
           EXTEND
           EXPIRE
           RETAIN
           SCRATCH
• FUNC Option
     This option controls the use of special real-time functions such as foreign tape processing
     (EXPDT=98000) and label processing (NL, NSL, BLP). The resource class is set to
     CATAPE. Based on the volume serial number, the entity name is the type of tape label
     followed by RES (defined to CA-1) or NORES (unknown to CA-1). Possible entity names
     are as follows:
           NLRES
           NLNORES
           NSLRES
           NSLNORES
           BLPRES
           BLPNORES
     The same applies to foreign tape processing. The entity name, FORNORES, is used for
     foreign tapes. The entity name, FORRES, is used when specifying EXPDT=98000 for tapes
     defined to the CA-1 system.
• SCRTCH Option
     When active, this option passes control to the user security exit, TMSUXnS, when
     TMSCLEAN flags a tape as scratch or deletes a DSNB record.
• UNDEF Option
     This option instructs CA-1 how to react if it encounters an undefined resource or if the ACP
     is not active. If this option is set to ALLOW, an ACP return code of 04 is changed to 00 and
     CA-1 processing continues as normal. If set to FAIL, an ACP return code of 04 is changed
     to 08, and CA-1 issues an error message and abends the task requiring CA-1 processing.
66
                                          UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                            DISA Field Security Operations
21 January 2005                                                              Developed by DISA for the DOD
• CREATE Option
    This option controls the level of access authority needed to create a data set on tape. Each
    ACP has a unique value for data set creation (e.g., ACF2 is ALLOCATE, RACF is ALTER,
    and TOP SECRET is CREATE). Specifying these ACP-specific values for the CREATE
    option instructs tape data set creation to be processed in a manner similar to that of DASD
    data sets, including volume serial number access authorization checking. Setting this option
    to UPDATE allows tape data set creations to be handled with the access authority level of
    update, bypassing volume serial number checking.
• SECWTO Option
    This option controls execution access to the TMSINIT program following the initial CA-1
    startup at IPL time. Additional WTOR messages are displayed at the system console
    requesting the issuer's ACP logonid and password to verify the authority to reinitialize, stop,
    or batch activate CA-1. The resource class set is CATAPE with possible entity names of
    REINIT, BATCH, and DEACT.
    This option only applies to CA-1, Version 5.2 and above. With CA-1, Version 5.1, these
    WTOR messages are always issued, unless modified by the TMSUXnS exit.
• UX0AUPD Option
    This option will eliminate a need to change the TMSUX2A exit. If yes is specified. Yes
    would allow you to alter fields in the TMC and would require that the TMSUX2A exit would
    need to be changed, which would require that it would need to be reviewed by FSO.
•   (ZCA10010: CAT II) The systems programmer/IAO will ensure that the CA-1 external
    security options are specified in accordance with the above STIG requirements.
SMP/E is used to perform the installation and maintenance of CA-1. During SMP/E processing,
CA-1 elements are installed in many data sets. Some may be shared with other CA software
products.
A typical installation requires many CA-1 modules to reside in the operating system LPA and a
Linklist data set with APF authorization. Refer to Section 2.1.2.1, Authorized Program Facility
(APF), Section 2.1.2.8, Link Pack Area, and Section 2.1.2.9, Linklist, for security information
regarding these areas.
                                                                                                         67
                                          UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                            DISA Field Security Operations
21 January 2005                                                              Developed by DISA for the DOD
Control access to CA-1 data sets, and restrict access only to authorized personnel. Use the
following recommendations to control access to CA-1 data sets:
(1)    Restrict users who need to access tape data set information (e.g., block size, counts) and
       information about creating jobs (e.g., jobname, stepname, or ddname) to the following:
       However, due to the unique file structure of the TMC and Audit data sets, CA-1 uses the
       YSVC programs to handle all direct I/O activity. Because standard OPEN/CLOSE macros
       are not used, typical data set security checks are not performed. Even if a user does not
       have read authority to these data sets, the YSVC programs can enable that user to read and
       update records within these files.
       Therefore, control read access authority to the TMC and Audit data sets by the
       YSVCUNCD and YSVCCOND resource names. Typical users should be restricted to
       conditional read access. For further information about TMC and Audit data set access
       control, refer to Section 11.2.2, External Security (specifically, YSVC Option and BATCH
       Option).
If these users execute under an ISPF environment, grant additional access authority:
       Read authority to the CA-1 ISPF application (i.e., panel, message, skeleton, and table data
       sets)
Program execute only authority to the CA-1 ISPF application load library
•     (ZCA10030: CAT II) The IAO will ensure that update and allocate access to CA-1 product
      data sets are limited to system programmers only, unless a letter justifying access is filed
      with the IAO.
(2)    Restrict tape librarians, CA-1 batch production jobs, and CA-1 started tasks to the
       following access authority:
       Unconditional read and update authorities to the TMC, Audit, Retention, and Vault Pattern
       Description data sets
NOTE: Read and update authority to the TMC and Audit data sets are controlled by the
           YSVCUNCD and YSVCCOND resource names, and by standard ACP data set
           controls, because some CA-1 utilities use conventional OPEN/CLOSE methods.
68
                                           UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                              DISA Field Security Operations
21 January 2005                                                                Developed by DISA for the DOD
       Read authority to the CA-1 ISPF application (i.e., panel, message, skeleton, and table data
       sets)
       Program execute only authority to the CA-1 Linklist library and the ISPF application load
       library
        CA-1 offers over 50 different batch utilities to help with the administration and support of
        the product. Some of these utilities allocate unique data set names within the JCL. They
        are non-SMP/E data sets with no pre-defined rules regarding CA-1 naming conventions.
        Review all CA-1 production JCL for unique data set names to ensure the appropriate access
        authority is granted to the job ID.
•     (ZCA10030: CAT II) The IAO will ensure that update and allocate access to CA-1 product
      data sets are limited to system programmers only, unless a letter justifying access is filed
      with the IAO.
•     (ZCA10035: CAT II) The IAO will ensure that update and allocate access to CA-1 TMC and
      AUDIT data sets are limited to system programmers and update access is limited to tape
      librarians, unless a letter justifying access is filed with the IAO. All allocate access will be
      logged.
(3)     Systems programmers responsible for supporting CA-1 require complete access to all CA-1
        product installation data sets, except for the TMC and Audit data sets.
        Limit access to the TMC and Audit data sets to the authorities necessary to perform their
        assigned duties. In addition, grant data set creation authority to the TMC and Audit data
        sets only on an as-needed basis. The IAO maintains documentation for this modification
        and its requirements. Log all data set creation access to these data sets using ACP
        facilities.
•     (ZCA10030: CAT II) The IAO will ensure that update and allocate access to CA-1 product
      data sets are limited to system programmers only, unless a letter justifying access is filed
      with the IAO.
•     (ZCA10035: CAT II) The IAO will ensure that update and allocate access to CA-1 TMC and
      AUDIT data sets are limited to system programmers and update access is limited to tape
      librarians, unless a letter justifying access is filed with the IAO. All allocate access will be
      logged.
Control access to CA-1 sensitive utilities, and restrict access only to authorized personnel. The
following table provides a list of CA-1 programs containing sensitive utilities and personnel to
whom their use should be restricted. Refer to Section 3.1.5.3, Sensitive Utility Controls, for
further information.
                                                                                                           69
                                            UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                           DISA Field Security Operations
21 January 2005                                                             Developed by DISA for the DOD
CA-1 offers two on-line applications for use when accessing TMC records. Users granted access
to the TMC require access to these CA-1 on-line applications. The level of access to TMC data
while under these applications is dependent on the CA-1 internal password entered by the user
during application invocation. Access to CA-1 internal passwords is controlled and restricted
only to authorized personnel.
A typical user granted read access to the TMC should be restricted to a password that is only
capable of displaying data, not of modifying it. Conversely, the tape librarians should be granted
the access necessary for them to administer and maintain the CA-1 system, allowing them to
modify data fields within the TMC. Restrict user access to the appropriate CA-1 on-line
application password to the one necessary for that user to accomplish the assigned
responsibilities.
Refer to the item, PSWD Option, in Section 11.2.2, External Security, and to Section 11.2.1,
Internal Security, for more information about application passwords. For information regarding
ACP controls for CA-1 internal passwords, refer to the ACP-specific sections.
Additional protection is used to control access to specific commands while under the CA-1 on-
line applications. These powerful commands are used to administer and maintain the tape
inventory in the TMC and are strictly controlled. Restrict use of these commands only to the
tape librarians, with one exception. The EXTEND and RETAIN commands may be granted to
those users needing the functionality of extending the retention dates of tape data sets.
70
                                            UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                             DISA Field Security Operations
21 January 2005                                                               Developed by DISA for the DOD
Refer to the item, CMD Option, in Section 11.2.2, External Security, for more information about
application on-line commands. For information regarding ACP controls for CA-1 commands,
refer to the ACP-specific sections.
CA-1 provides the capability to control special tape handling functions (i.e., non-label and non-
standard label tapes and foreign tapes) by invoking the Function Call security interface. Refer to
the item, FUNC Option, in Section 11.2.2, External Security for more information on tape
handling privileges. For information regarding ACP controls for tape handling privileges, refer
to the ACP-specific sections.
Use the following recommendations for access to special tape handling functions:
(1)    Access to CA-1 special tape handling privileges is controlled and restricted to authorized
       system-level support personnel only (e.g., systems programming, operations, tape
       management).
(2)    Access authorization to the BLPRES privilege is tightly controlled and restricted to a
       limited number of authorized personnel. Access is granted at the user level and not at the
       group level. All access to the BLPRES resource is logged by the ACP.
(3)    Access authorization to the FORRES privilege (i.e., foreign tape processing of in-house
       tapes) is prohibited as a rule. Unlike BLPRES where data set authorization checking is
       performed, FORRES processing allows complete access to any tape data set. Access to
       FORRES may be granted on an as needed basis. All access to the FORRES resource is
       logged by the ACP.
(4)    Legitimate requirements may exist for users outside the system-level support realm to have
       access to special tape handling privileges for non-resident tapes. An example would be
       personnel responsible for the execution of an application that collects data from many
       diverse sources, and where:
       (b)    The volume of tapes being processed exceeds the capacity of the tape library staff to
              process (copy) in an effective and timely manner.
                                                                                                          71
                                            UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                                DISA Field Security Operations
21 January 2005                                                                  Developed by DISA for the DOD
- Access will be granted to specific individuals and not at the group level.
       -   Justification documentation with IAO approval is required and must be filed with the
           IAO.
•    (ZCA10040: CAT II) The systems programmer/IAO will ensure that CA-1 resources are
     protected in accordance with STIG requirements.
CA-1 provides the capability to control TMSINIT program execution after the initial activation
of CA-1 following an IPL. Refer to the item, SECWTO Option, in Section 11.2.2, External
Security, for more information. For information regarding ACP controls, refer to the
ACP-specific sections.
Access to TMSINIT execution (i.e., deactivation, batch activation, and re-initialization) is tightly
controlled and restricted only to authorized personnel. General user access is strictly prohibited.
The following table entries are guidelines regarding access authorizations to CA-1 resources:
72
                                             UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                                           DISA Field Security Operations
21 January 2005                                                                             Developed by DISA for the DOD
1
    Refer to Section 3.1.4.3, Tape Label Bypass Privileges, for further guidance on BLP privileges.
2
    Refer to Section 3.1.4.3, Tape Label Bypass Privileges, for further guidance on BLP privileges.
                                                                                                                        73
                                                   UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                           DISA Field Security Operations
21 January 2005                                                             Developed by DISA for the DOD
•     (ZCA10040: CAT II) The systems programmer/IAO will ensure that CA-1 resources are
      protected in accordance with STIG requirements.
CA-1 provides on-line applications that offer users the ability to perform interactive inquiry
against, and update to, the TMC data set. These applications can be invoked while executing
under several different software products by invoking the interfaces supplied by CA-1. If
installed, these interfaces should be secured from unauthorized access from within these software
products. For example, the ISPF and TSO interfaces should be secured by restricting them to the
clist, which invokes the CA-1 application.
CA-1 supplies several user exits that provide the ability to tailor CA-1 processing to the specific
needs of each site's environment. Install and maintain all CA-1 user exits utilizing SMP/E. Two
of these exits, TMSUXnA and TMSUXnS, provide the capabilities to bypass or modify ACP
security controls in place.
(2) DISA FSO will perform a review and integrity analysis of the exit code.
(3)    DISA FSO will approve the use of these exits. Use of these exits without approval is
       prohibited.
Refer to Section 2.1.2.6, OS/390 and Other Product Exits, for security guidelines on exits.
•     (ZCA10050: CAT II) The IAO will ensure that CA-1 security exits in use are reviewed and
      approved by DISA Field Security Operations.
74
                                          UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                                        DISA Field Security Operations
21 January 2005                                                                          Developed by DISA for the DOD
11.2.6 ACF2
CA-1 external security utilizing ACF2 is accomplished in the manner described in this section.
The following CA-1 security options are in effect for all sites. Refer to Section 11.2.2, External
Security, for a description of each option.
                                CMD                     YES
                                CREATE                  UPDATE4
                                DSNB                    YES
                                FUNC                    YES5
                                OCEOV                   NO6
                                PMASK                   Do not specify or
                                                        change3
                                PSWD                    YES
                                SCRTCH                  NO
                                SECWTO                  YES7
                                UNDEF                   FAIL
                                UX0AUPD                 NO3 8
                                YSVC                    YES
3
  Applies to CA-1, Version 5.3 and above.
4
  The vendor recommends setting the CREATE option to UPDATE to avoid volume serial number authorization
verification. Otherwise, in an environment where volume access rules are not utilized, user access will be denied
when creating a tape data set. Refer to Section 11.2.2, External Security, for more information about the CREATE
parameter.
5
  The FUNC option provides supplementary security for BLP access. The tape label bypass privilege must still be
specified in the ACF2 user LID record to allow access to BLP processing.
6
  The CA-1 security option, OCEOV, is set to NO because ACF2 obtains control of data set OPEN/CLOSE
processing before the CA-1 intercept. The vendor recommends that the first security call be used and that this CA-1
control option be turned OFF. Therefore, TAPEDSN must be specified in the OPTS option in the ACF2 GSO
record.
7
  Applies to CA-1, Version 5.2 and above.
8
  The UX0AUPD will specify YES only if you alter the fields in the TMC and the TMSUXxA is changed.
                                                                                                                     75
                                                UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                            DISA Field Security Operations
21 January 2005                                                              Developed by DISA for the DOD
•    (ZCA10010: CAT II) The systems programmer/IAO will ensure that the CA-1 external
     security options are specified in accordance with the above STIG requirements.
•
11.2.6.1 Defining Resource Types
Define two CA-1 resource types — CAT (for CATAPE resources) and CAC (for CACMD
resources). The following ACF2 commands add these types to the resident directory:
       SET CONTROL(GSO)
       CHANGE INFODIR TYPES(D-CAT,D-CAC) ADD
F ACF2,REFRESH(INFODIR)
Protect CA-1 data sets using ACP data set resource controls. Refer to Section 11.2.3, Resource
Controls, for information on CA-1 data set access authority assignments. For additional
information on data set resource controls, refer to Sections 3.1.5.1 and 3.2.5.1, both entitled Data
Set Controls.
Unique CA-1 resources are protected. Restrict access to those resources necessary for users to
accomplish their assigned responsibilities. The following table lists the resource types and
names that must be defined, along with a short description of each. Refer to Section 11.2.2,
External Security, for more information about these resource names.
76
                                           UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                            DISA Field Security Operations
21 January 2005                                                              Developed by DISA for the DOD
(1) Allow a user access to the CA-1 on-line application command DELETE:
           $KEY(L0DELETE) TYPE(CAC)
           UID(xxxxxxxx) ALLOW
(2) Allow all users conditional read access to the TMC and Audit data sets:
           $KEY(YSVCCOND) TYPE(CAT)
           UID(*) SERVICE(READ) ALLOW
                                                                                                         77
                                             UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                             DISA Field Security Operations
21 January 2005                                                               Developed by DISA for the DOD
(3)    Allow users (e.g., the tape librarian) complete read and update access to all records in the
       TMC and Audit data sets regardless of their data set access:
           $KEY(YSVCUNCD) TYPE(CAT)
           UID(xxxxxxxx) SERVICE(READ,UPDATE) ALLOW
(4) Allow a user read access to tapes not controlled by CA-1 using BLP processing:
           $KEY(BLPNORES) TYPE(CAT)
           UID(xxxxxxxx) SERVICE(READ) ALLOW
(5) Allow a user access to the CA-1 on-line application password SYSPROG:
           $KEY(SYSPROG) TYPE(CAT)
           UID(xxxxxxxx) ALLOW
           $KEY(DEACT) TYPE(CAT)
           UID(xxxxxxxx) ALLOW
           $KEY(REINIT) TYPE(CAT)
           UID(xxxxxxxx) ALLOW
The logonid assigned to the started task that initializes CA-1 has read and update authority to the
YSVCUNCD or YSVCCOND resource name.
78
                                           UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                                      DISA Field Security Operations
21 January 2005                                                                        Developed by DISA for the DOD
11.2.7 RACF
CA-1 external security utilizing RACF is be accomplished in the manner described in this
section.
The following CA-1 security options are in effect for all sites. Refer to Section 11.2.2, External
Security, for a description of each option.
9
  Applies to CA-1, Version 5.3 and above.
10
   The vendor recommends setting the CREATE option to UPDATE to avoid volume serial number authorization
verification. Otherwise, in an environment where volume access rules are not utilized, user access will be denied
when creating a tape data set. Refer to Section 11.2.2, External Security, for more information about the CREATE
parameter.
11
   The FUNC option provides supplementary security for BLP access. Users who require the tape label bypass
privilege must still be granted authority to profile ICHBLP in class FACILITY.
12
   The vendor recommends that OCEOV be set to NO and the RACF SETROPTS option TAPEDSN be active. Be
advised that if OCEOV is disabled and RACF TAPEDSN is not active, tape data set protection will not be in effect.
13
   Applies to CA-1, Version 5.3 and above.
14
   The UX0AUPD will specify YES only if you alter the fields in the TMC and the TMSUXxA is changed.
                                                                                                                   79
                                               UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                          DISA Field Security Operations
21 January 2005                                                            Developed by DISA for the DOD
•     (ZCA10010: CAT II) The systems programmer/IAO will ensure that the CA-1 external
      security options are specified in accordance with the above STIG requirements.
(1)    The Class Descriptor Table, ICHRRCDE, is used to describe resource classes to RACF.
       Two new CA-1 classes, CA@MD and CA@APE, must be added to this table with the
       following entries:
NOTE 1: An IPL of the operating system is required for these changes to take effect.
NOTE 2: The values specified for ID and POSIT are site-specific, and may be changed if
              necessary. Refer to the IBM RACF Macros and Interfaces manual for more
              information.
(2)    Assemble and link-edit ICHRRCDE into SYS1.LINKLIB. Install and maintain this table
       using IBM's SMP/E.
(1)    The RACF Router table, ICHRFR01, associates OS/390 Router invocations with RACF
       functions. The following two entries are required by CA-1 and must be added to this table:
80
                                         UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                       DISA Field Security Operations
21 January 2005                                                         Developed by DISA for the DOD
NOTE: An IPL of the operating system is required for these changes to take effect.
(2)    Assemble and link-edit ICHRFR01 into SYS1.LINKLIB. Install and maintain this table
       using IBM's SMP/E.
The RACF RDEFINE command may be used to define all CA-1 resources belonging to the new
classes specified in the Class Descriptor Table. The following table lists the TSO RACF
commands that can be used to define these resources. A short description of each resource is
included. Refer to Section 11.2.2, External Security, for more information about CA-1
resources.
                                                                                                    81
                                       UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                             DISA Field Security Operations
21 January 2005                                                               Developed by DISA for the DOD
Protect CA-1 data sets using ACP data set resource controls. Refer to Section 11.2.3, Resource
Controls, for information about CA-1 data set access authority assignments. For additional
information on data set resource controls, refer to Sections 3.1.5.1 and 3.3.5.1, both entitled Data
Set Controls.
Protect the unique CA-1 resources defined with the RDEFINE command from unauthorized
access. Restrict access to those resources necessary for users to accomplish their assigned
responsibilities. The RACF PERMIT command can be used to perform this task. The following
are examples of assigning resource access authority:
(1) Permit a user access to the CA-1 on-line application command DELETE:
(2)    Permit users (e.g., the tape librarian) complete read and update access to all records in the
       TMC and Audit data sets, regardless of their data set access:
(3) Permit a user read access to tapes not controlled by CA-1 using BLP processing:
82
                                           UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                        DISA Field Security Operations
21 January 2005                                                          Developed by DISA for the DOD
(4) Permit a user access to the CA-1 on-line application password SYSPROG:
The RACF SETROPTS command is used to activate CA-1 security classes that were added to
the Class Descriptor Table. The following example can be used to activate these classes:
SETROPTS CLASSACT(CA@CMD,CA@APE)
The started task that initializes CA-1 has a matching profile defined to the STARTED resource
class. The userid associated with the CA-1 initialization STC is defined as a PROTECTED
userid. The CA-1 STC userid has both read and update authority to the YSVCUNCD or
YSVCCOND resource name.
                                                                                                     83
                                          UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                                       DISA Field Security Operations
21 January 2005                                                                         Developed by DISA for the DOD
CA-1 external security utilizing TOP SECRET is accomplished in the manner described in this
section.
The following CA-1 security options are in effect for all sites. Refer to Section 11.2.2, External
Security, for a description of each option.
15
   Applies to CA-1, Version 5.3 and above.
16
   The vendor recommends setting the CREATE option to UPDATE to avoid volume serial number authorization
verification. Otherwise, in an environment where volume access rules are not utilized, user access will be denied
when creating a tape data set. Refer to Section 11.2.2, External Security, for more information about the CREATE
parameter.
17
   The FUNC option provides supplementary security for BLP access. The tape label bypass privilege must still be
specified in the TOP SECRET user ACID record to allow access to BLP processing.
18
   The data set OPEN/CLOSE security call will be handled by the CA-1 interface. To avoid duplication of security
checking, the control option TAPE should be turned OFF in the TOP SECRET Control Options record.
19
   Applies to CA-1, Version 5.2 and above.
20
   The UX0AUPD will specify YES only if you alter the fields in the TMC and the TMSUXxA is changed.
84
                                                UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                        DISA Field Security Operations
21 January 2005                                                          Developed by DISA for the DOD
•   (ZCA10010: CAT II) The systems programmer/IAO will ensure that the CA-1 external
    security options are specified in accordance with the above STIG requirements.
The following table provides a list of commands that can be used to assign ownership of CA-1
entities within TOP SECRET. A short description of each entity is included. The IAO is
assigned ownership of all CA-1 entities. Refer to Section 11.2.2, External Security, for more
information about these entities.
                                                                                                     85
                                        UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                             DISA Field Security Operations
21 January 2005                                                               Developed by DISA for the DOD
Protect CA-1 data sets using ACP data set resource controls. Refer to Section 11.2.3, Resource
Controls, for information about CA-1 data set access authority assignments. For additional
information on data set resource controls, refer to Sections 3.1.5.1 and 3.4.5.1, both entitled Data
Set Controls.
Once ownership is assigned, user access must be permitted. Restrict access to those entities
necessary for users to accomplish their assigned responsibilities. The following are examples of
the use of the TOP SECRET PERMIT command:
(1) Permit a user access to the CA-1 on-line application command DELETE:
(2)    Permit users (e.g., the tape librarian) complete read and update access to all records in the
       TMC and Audit data sets, regardless of their data set access:
(3) Permit a user read access to tapes that are not controlled by CA-1 using BLP processing:
(4) Permit a user access to the CA-1 on-line application password SYSPROG:
86
                                           UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                           DISA Field Security Operations
21 January 2005                                                             Developed by DISA for the DOD
Define the started task, ACID, and Facility for CA-1, and grant the appropriate accesses to
personnel requiring CA-1 user privileges.
(2) Define the started task that initializes CA-1 to the STC table. For example:
       This CA-1 ACID has both read and update authority to the YSVCUNCD or YSVCCOND
       resource name.
(4)    Add the CA1 Facility Name as the Master Facility to the CA1 ACID as in the following
       example:
(5)    Data center personnel authorized to execute TMSINIT as an STC are required to access the
       CA-1 Facility. This can be accomplished as follows:
NOTE: Access to the CA-1 Facility is to be controlled and restricted only to authorized
           personnel.
                                                                                                        87
                                          UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                             DISA Field Security Operations
21 January 2005                                                               Developed by DISA for the DOD
System monitoring software products provide systems programming personnel the ability to
monitor, control, interrogate, modify, and analyze operating system components, subsystems,
and executing tasks.
Consideration should be given to securing the data sets that contain the system monitoring
software products. Access to these data sets is not permitted to general users, and should only be
granted to authorized personnel.
Interactive execution of the system monitoring software products may be invoked from a TMP or
a VTAM session. Only authorized personnel should have these products listed as options on a
display menu or panel. Access to these on-line applications is prohibited from general users and
should only be granted to authorized users.
Most system monitoring software products can perform I&A checking before product
invocation. For these products, I&A validation is mandatory. The I&A checking is performed
by the Access Control Product. This requirement provides protection against unauthorized
access to the product.
System monitoring software products are very powerful and require proper control. They have
many commands that pose potential integrity risks if not adequately protected. These products
provide sensitive capabilities including the abilities to view and change system main storage
(core), update the APF list, update the Linklist, and modify the resident LPA with temporary
changes.
Sample exits, which interface with the ACPs, are provided with the system monitoring software
products. Use these exits to restrict access to the product and to its internal commands. Protect
all commands providing the capability to alter integrity (refer to Section 2, OS/390 Integrity) or
to display sensitive data. Only grant authority for these critical commands to authorized users.
Use ACP controls whenever possible. Review all ACP resource interfaces for potential security
exposures and for possible implementation. However, it may not be possible to provide a secure
environment using only ACP controls. In this case, the use of internal security may be warranted
and should be investigated for possible use. If it is determined that an enhanced level of
protection is gained that the ACP does not provide, the internal security may be activated. It is
important to remember that base-level ACP controls are never compromised.
Use the following recommendations when securing access to system monitoring software:
(1)    Control access to the software product's data sets, and restrict access only to authorized
       personnel.
88
                                           UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                              DISA Field Security Operations
21 January 2005                                                                Developed by DISA for the DOD
(2)    Strictly enforce access to the on-line applications, and restrict access only to authorized
       personnel.
(3)    All system monitoring software products in use at DOD sites, which are capable of
        performing I&A checking, are required to do so during the logon process.
(4)    Rigidly enforce the use of commands, options, and features within the products. Restrict
       use to that which is necessary for a user to accomplish that user's assigned responsibilities.
(5)    Review product interfaces for potential security exposures. Document any potential
       security exposures. Notify DISA FSO and the vendor of such exposures.
(6)    Evaluate system monitoring software product internal security for possible use, providing it
       does not replace or compromise existing ACP security controls.
•     (ZOMG0010: CAT II) The IAO will ensure that OMEGAMON product libraries are
      protected in accordance with STIG requirements.
OMEGAMON software products are provided by the Candle Corporation. These products are
used to monitor the performance of the mainframe platforms at sites.
OMEGAMON originally was a single stand-alone performance monitor for MVS. It has
evolved to become a suite of products providing comprehensive monitoring for the entire
enterprise. The individual components of the suite use a common set of services, including exits
to interface with the resident ACP and resources to control access to product commands. They
have the flexibility to monitor the system in a variety of configurations. This results in several
important considerations:
(1)    The OMEGACENTER Network Access Manager (NAM) can either serve as a stand-alone
       security system, or provide an interface to the ACP (such as ACF2, RACF, and TOP
       SECRET). The DOD standard is to use the resident ACP for I&A validation. The
       OMEGACENTER NAM be configured to use the Access Control Product.
(2)    The individual product sections that follow often make duplicate references to installing the
       appropriate ACP interface exit. The ACP exit is only installed once for the entire suite, not
       once for each component.
(3)    Access to internal OMEGAMON commands is done in a tiered fashion. The vendor
       groups commands into one of four categories. Access is granted based on access to the
       categories, or levels, of commands. The STIG recommendation is to control access to
       these levels of commands based on ACP resource protections. Sites may, at their
       discretion, use the ACP to control each individual command.
                                                                                                           89
                                           UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                                DISA Field Security Operations
21 January 2005                                                                  Developed by DISA for the DOD
(4)    Some of the installation instructions (e.g., OMEGAMON II for VTAM) make no mention
       of defining resource controls for the available internal commands. Access to commands in
       this case is achieved based on the (common) resource controls defined during the
       installation of another component (e.g., OMEGAMON II for MVS).
(5)    Several OMEGAMON components require that the user be defined to the Network Access
       Manager (the OMEGAMON internal security system), even when user I&A validation is
       done by the resident ACP.
(6)    By default, the first user to log on to the products is assigned Administrator Authority.
       This authority is to be reviewed and updated as necessary, to ensure that Administrator
       Authority is delegated to the appropriate individual(s) (i.e., not necessarily to the first
       systems programmer to log on to OMEGAMON). In addition, the following products from
       the OMEGAMON suite will have the system emergency userids (refer to Section 3.1.2.6 ,
       Emergency Userids, for further information) assigned as Administrators to recover from
       No Administrator Defined situations:
              OMEGAVIEW
              OMEGAMON II for VTAM
              OMEGAMON II for SMS
              OMEGAMON II for MVS
              OMEGAMON II for CICS
•     (ZOMG0020: CAT II) The IAO will ensure that Emergency Ids are defined as OMEGAMON
      administrators.
(7)    OMEGAMON software products can run in any of the following three real-time operating
       modes:
       Dedicated Mode                This mode offers high availability and requires a dedicated system
                                     console, with the exception of OMEGAMON II for VTAM that
                                     requires a dedicated VTAM terminal.
       VTAM Mode                     This mode uses VTAM for telecommunications access and
                                     requires a VTAM definition for the application program. Users
                                     log on to the applications as they would to other VTAM
                                     applications (e.g., TSO, CICS, etc.). In VTAM mode the products
                                     can be accessed directly from VTAM, or via a Session Manager.
       TSO/ISPF Mode                 This mode operates within the user’s TSO address space. It
                                     requires additional VTAM and ISPF definitions.
Enforce the following controls for Dedicated Mode execution of OMEGAMON software
products:
(1)    Ensure that the system consoles and/or terminals dedicated to OMEGAMON software
       products are in a controlled area accessible only to Operations personnel.
(2)    Ensure that access to the consoles and/or terminals dedicated to OMEGAMON software
       products are further restricted to those Operations personnel authorized to use
       OMEGAMON.
(3)    Control access to internal OMEGAMON software product commands using the standard
       OMEGAMON internal password system.
Enforce the following controls for VTAM execution of OMEGAMON software products:
(1)    The OMEGAMON products should only appear as Session Manager selection options for
       those individuals authorized access to OMEGAMON applications.
(2)    Use the following values for key OMEGAMON VTAM initialization parameters. These
       keyword parameters and values are coded in the started task JCL. Not all the available
       initialization parameters are listed in the table below. Several specified values are the
       default values. They are listed to reiterate their importance.
                                                                                                        91
                                          UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                           DISA Field Security Operations
21 January 2005                                                             Developed by DISA for the DOD
92
                                            UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                           DISA Field Security Operations
21 January 2005                                                             Developed by DISA for the DOD
(4)      The actual resource mechanisms for controlling accesses vary based on the requirements
         of each individual OMEGAMON component and on the resident ACP. They are
         described within each component’s section in the appropriate ACP sub-section.
•     (ZOMG0030: CAT II) The systems programmer/IAO will ensure OMEGAMON VTAM
      initialization parameters are specified in accordance with STIG requirements.
ISPF and TSO Mode execution of OMEGAMON applications occurs within the user’s TSO
address space. No additional I&A validation is done by the components, since the user has
already established a TSO session. Authorization to access the OMEGAMON applications
themselves from ISPF and TSO is controlled via the same resource mechanisms as in VTAM
mode, as described in the component sections below.
(1)    The clist, message, panel, program, skeleton, and table libraries necessary for ISPF
       execution of OMEGAMON software products is only available in the TSO environment of
       those individuals authorized access to OMEGAMON applications.
(2)    The OMEGAMON applications only appear as ISPF panel selection options for those
       individuals authorized access to OMEGAMON applications.
       The following additional control should be enforced for TSO execution of OMEGAMON
       applications:
(3)    The clist, message, panel, program, skeleton, and table libraries necessary for TSO
       execution of OMEGAMON software products should only be available in the TSO
       environment of those individuals authorized access to OMEGAMON applications.
The OMEGACENTER GATEWAY for OS/390 product is an analytical engine interfacing with,
and integrating information from, a wide array of sources. It probes enterprise-wide events, and
data about them is combined and evaluated based on site policies. It provides a common and
integrated way to collect and filter system event information across the enterprise, and provides a
methodology allowing responsible parts of the organization to communicate effectively.
SYS2.OMEGAMON.TKOGLOAD
This library requires explicit protection. Read access should be restricted to the OMEGAMON
started tasks. Access greater than read is restricted only to the systems programming personnel
                                                                                                        93
                                          UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                          DISA Field Security Operations
21 January 2005                                                            Developed by DISA for the DOD
12.2.2.2 ACF2
Complete the following steps when using ACF2 as the ACP for this OMEGAMON II software
monitoring product:
(2) Ensure that the logonid OMCGATE is defined as MUSASS NO-SMC STC.
•     (ZOMG0040: CAT II) The systems programmer/IAO will ensure that OMEGAMON started
      tasks are defined in accordance with STIG requirements.
12.2.2.3 RACF
Complete the following steps when using RACF as the ACP for this OMEGAMON II software
monitoring product:
       (b)    The userid OMCGATE is connected to a group for the OMEGACENTER started
              tasks.
       (c)    The OMCGATE STC has a matching profile defined to the STARTED class with no
              special attributes. For example:
•     (ZOMG0040: CAT II) The systems programmer/IAO will ensure that OMEGAMON started
      tasks are defined in accordance with STIG requirements.
94
                                         UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                           DISA Field Security Operations
21 January 2005                                                             Developed by DISA for the DOD
Complete the following steps when using TOP SECRET as the ACP for this OMEGAMON II
software monitoring product:
(2)    Ensure that the STC ACID OMCGATE is defined with a non-expiring password and
       sourced to the internal reader:
(3)    Add the STC OMCGATE to the Started Task Table specifying the associated ACID
       OMCGATE:
•     (ZOMG0040: CAT II) The systems programmer/IAO will ensure that OMEGAMON started
      tasks are defined in accordance with STIG requirements.
12.2.3 OMEGAVIEW
The OMEGAVIEW System Administrator should restrict OMEGAVIEW user access only to
selected systems programmers and Operations personnel, and should also restrict user authority
options to the lowest level needed to accomplish the user's tasks.
OMEGAVIEW should have the emergency userids (refer to Section 3.1.2.6, Emergency Userids,
for further information) assigned as Administrators to recover from No Administrator Defined
situations.
                                                                                                        95
                                          UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                          DISA Field Security Operations
21 January 2005                                                            Developed by DISA for the DOD
12.2.3.2 ACF2
Complete the following steps when using ACF2 as the ACP for this OMEGAMON II software
monitoring product:
(1) During final product configuration (CICAT), specify ACF2 External Security.
(3) Assemble and link the exit for security validation, KLVA2NEV, using KLVA2ASM.
(5)    Allow the started task MVPROC only read access to SYS2.OMEGAMON.* and
       SYS3.OMEGAMON.*.
(6)    OMEGAVIEW does not use SAF to restrict access authorization to the OMEGAVIEW
       APPLID. However, sites using CL/SUPERSESSION can control access to VTAM
       APPLIDs. In accordance with Section 6.2, CL/SUPERSESSION, use dynamic application
       lists to ensure that the ACP arbitrates access to all applications. Sites using
       CL/SUPERSESSION defines the APPLID of AxxMVP01 or a site defined APPLID to the
       APL resource type. Restrict access to authorized system-level support personnel only (e.g.,
       system programming, storage management, network, and operations). For example:
           $KEY(AxxMVP01) TYPE(APL)
           - UID(-) PREVENT
           UID(sys-prog-group) ALLOW
•     (ZOMG0050: CAT II) The systems programmer/IAO will ensure that OMEGAMON
      APPLIDs are configured and protected in accordance with STIG requirements.
•     (ZOMG0060: CAT II) The systems programmer/IAO will ensure that OMEGAMON
      products are configured in accordance with STIG requirements.
96
                                          UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                        DISA Field Security Operations
21 January 2005                                                          Developed by DISA for the DOD
12.2.3.3 RACF
Complete the following steps when using RACF as the ACP for this OMEGAMON II software
monitoring product:
(1) During final product configuration (CICAT), specify RACF External Security.
(3)    Define a matching profile for the MVPROC STC to the STARTED resource class. For
       example:
(4)    Allow the started task MVPROC only read access to SYS2.OMEGAMON.** and
       SYS3.OMEGAMON.**.
(6)    OMEGAVIEW does not use SAF to restrict access authorization to the OMEGAVIEW
       APPLID. However, sites using CL/SUPERSESSION can control access to VTAM
       APPLIDs. In accordance with Section 6.2, CL/SUPERSESSION, use dynamic application
       lists to ensure that the ACP arbitrates access to all applications. Sites using
       CL/SUPERSESSION will define the APPLID of AxxMVP01 to the APPL resource class.
       Restrict access to authorized system-level support personnel only (e.g., systems
       programming, storage management, network, and operations). For example:
SETROPTS CLASSACT(APPL)
•     (ZOMG0050: CAT II) The systems programmer/IAO will ensure that OMEGAMON
      APPLIDs are configured and protected in accordance with STIG requirements.
•     (ZOMG0060: CAT II) The systems programmer/IAO will ensure that OMEGAMON
      products are configured in accordance with STIG requirements.
                                                                                                     97
                                         UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                      DISA Field Security Operations
21 January 2005                                                        Developed by DISA for the DOD
Complete the following steps when using TOP SECRET as the ACP for this OMEGAMON II
software monitoring product:
(1) During final product configuration (CICAT), specify TOP SECRET External Security.
(3)    Create the STC ACID MVPROC with a non-expiring password, sourced to the internal
       reader, and a Master Facility of MVPROC:
(4)    Allow the started task MVPROC only read access to SYS2.OMEGAMON.* and
       SYS3.OMEGAMON.*.
(6)    Add the STC MVPROC to the Started Task Table specifying the associated ACID
       MVPROC:
(7)    Define MVPROC as a Facility to TOP SECRET in the Facility Matrix Table using the
       following example:
           FACILITY(USERxx=NAME=MVPROC)
           FACILITY(MVPROC=MODE=FAIL,ACTIVE,SHRPRF)
           FACILITY(MVPROC=PGM=KLV,NOASUBM,NOABEND,NOXDEF)
           FACILITY(MVPROC=ID=nn,MULTIUSER,RES,LUMSG,STMSG,WARNPW,
             SIGN(M))
           FACILITY(MVPROC=NOINSTDATA,NORNDPW,AUTHINIT,NOPROMPT,
             NOAUDIT)
           FACILITY(MVPROC=NOTSOC,LOG(INIT,SMF,MSG,SEC9))
98
                                           UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                        DISA Field Security Operations
21 January 2005                                                          Developed by DISA for the DOD
(9)    OMEGAVIEW does not use SAF to restrict access authorization to the OMEGAVIEW
       APPLID. However, sites using CL/SUPERSESSION can control access to VTAM
       APPLIDs. In accordance with Section 6.2, CL/SUPERSESSION, use dynamic application
       lists to ensure that the ACP arbitrates access to all applications. Sites using
       CL/SUPERSESSION will define the APPLID of AxxMVP01 to the KLS resource class.
       Restrict access to authorized system-level support personnel only (e.g., systems
       programming, storage management, network, and operations). For example:
•     (ZOMG0050: CAT II) The systems programmer/IAO will ensure that OMEGAMON
      APPLIDs are configured and protected in accordance with STIG requirements.
•     (ZOMG0060: CAT II) The systems programmer/IAO will ensure that OMEGAMON
      products are configured in accordance with STIG requirements.
•     (ZOMGT090: CAT II) The systems programmer/IAO will ensure that OMEGAMON
      facilities are defined in accordance with STIG requirements.
OMEGAMON II for VTAM is the performance monitor product used to monitor a VTAM
network.
This section documents general security considerations that apply to OMEGAMON II for
VTAM. This product has the capability of interfacing with the installed ACP or using internal
security. The STIG requirement is to use the ACP for controlling access.
Several OMEGAMON II for VTAM data sets require APF authorization. Many of these
libraries are shared with other OMEGACENTER products. These data sets include the
following:
       SYS2.OMEGAMON.TETLOAD
       SYS2.OMEGAMON.TKANMODD (shared)
       SYS2.OMEGAMON.TKANMOD1 (shared)
       SYS2.OMEGAMON.TLOADLIB (shared) (See note below.)
       SYS2.OMEGAMON.TLVLOAD (shared)
                                                                                                     99
                                        UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                            DISA Field Security Operations
21 January 2005                                                              Developed by DISA for the DOD
Each of these libraries requires explicit protection. Read access should be restricted to the
OMEGAMON started tasks. Restrict access greater than read only to the systems programmers
responsible for product installation/maintenance. Refer to Section 2.1.2.1, Authorized Program
Facility (APF), for additional information.
User authorities within OMEGAMON II for VTAM are controlled via an internal mechanism.
This control is accessed through the OPTIONS pull-down under USER AUTHORITIES. Access
to the various functions should be tightly controlled and only given to those personnel who have
a justified access. Further information on this control can be found in the OMEGAMON II for
VTAM Users Guide.
12.2.4.2 ACF2
This section provides the guidance on what values and controls should be set in regard to product
security. Please refer to the installation instructions from the supporting software organization or
the vendor documentation on the detailed procedures for implementation. Complete the
following steps when using ACF2 as the ACP for this OMEGAMON II software monitoring
product:
(1)    Protect all OMEGAMON II for VTAM data sets using ACF2. Limit access to these files to
       the OMEGAMON started tasks and the systems programmers responsible for the product.
       Refer to Section 12.2.4.1.1, APF Authorization, for information regarding security controls
       for APF-authorized data sets.
(2)    During final product configuration (CICAT), specify ACF2 External Security on the
       KONPCSI4 - OMEGAMON II Configuration Parameters screen. Additionally, the value
       of YES is supplied for the parameter, Install ACF2 Exit. As a result of this, configure
       member KLVINNAM in SYS3.OMEGAMON.qualifier.RKONPARM to read as follows:
(3) Ensure that the logonid KON2VTAM is defined as MUSASS NO-SMC STC.
(4)    OMEGAMON II for VTAM does not use SAF to restrict access authorization to the
       OMEGAMON II for VTAM APPLID. However, sites using CL/SUPERSESSION can
       control access to VTAM APPLIDs. In accordance with Section 6.2, CL/SUPERSESSION,
       use dynamic application lists to ensure that the ACP arbitrates access to all applications.
       Sites using CL/SUPERSESSION will define the APPLID of AxxOMP01 to the APL
       resource type. Restrict access to authorized system-level support personnel only (e.g.,
       systems programming, network, and operations). For example:
100
                                          UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                            DISA Field Security Operations
21 January 2005                                                              Developed by DISA for the DOD
           $KEY(AxxOMP01) TYPE(APL)
           - UID(-) PREVENT
           UID(sys-prog-group) ALLOW
•     (ZOMG0050: CAT II) The systems programmer/IAO will ensure that OMEGAMON
      APPLIDs are configured and protected in accordance with STIG requirements.
•     (ZOMG0060: CAT II) The systems programmer/IAO will ensure that OMEGAMON
      products are configured in accordance with STIG requirements.
12.2.4.3 RACF
This section provides the guidance on what values and controls should be set in regard to product
security. Please refer to the installation instructions from the supporting software organization or
the vendor documentation on the detailed procedures for implementation. Complete the
following steps when using RACF as the ACP for this OMEGAMON II software monitoring
product:
(1)    Protect all OMEGAMON II for VTAM data sets using RACF. Limit access to these files
       to the OMEGAMON started tasks and the systems programmers responsible for the
       product. Refer to Section 12.2.4.1.1, APF Authorization, for information regarding security
       controls for APF-authorized data sets.
(2)    During final product configuration (CICAT), specify RACF External Security on the
       KONPCSI4 - OMEGAMON II Configuration Parameters screen. As a result of this,
       configure member KLVINNAM in SYS3.OMEGAMON.qualifier.RKONPARM to read as
       follows:
(4)    Define a matching profile for the KON2VTAM STC to the STARTED resource class. For
       example:
(5)    OMEGAMON II for VTAM does not use SAF to restrict access authorization to the
       OMEGAMON II for VTAM APPLID. However, sites using CL/SUPERSESSION can
       control access to VTAM APPLIDs. In accordance with Section 6.2, CL/SUPERSESSION,
       use dynamic application lists to ensure that the ACP arbitrates access to all applications.
       Sites using CL/SUPERSESSION will define the APPLID of AxxOMP01 to the APPL
       resource class. Restrict access to authorized system-level support personnel only (e.g.,
       systems programming, network, and operations). For example:
                                                                                                       101
                                          UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                            DISA Field Security Operations
21 January 2005                                                              Developed by DISA for the DOD
•     (ZOMG0050: CAT II) The systems programmer/IAO will ensure that OMEGAMON
      APPLIDs are configured and/or protected in accordance with STIG requirements.
•     (ZOMG0060: CAT II) The systems programmer/IAO will ensure that OMEGAMON
      products are configured in accordance with STIG requirements.
This section provides the guidance on what values and controls should be set in regard to product
security. Please refer to the installation instructions from the supporting software organization or
the vendor documentation on the detailed procedures for implementation. Complete the
following steps when using TOP SECRET as the ACP for this OMEGAMON II software
monitoring product:
(1)    Protect all OMEGAMON II for VTAM data sets using TOP SECRET. Limit access to
       these files to the OMEGAMON started tasks and the systems programmers responsible for
       the product. Refer to Section 12.2.4.1.1, APF Authorization, for information regarding
       security controls for APF-authorized data sets.
(2)    During final product configuration (CICAT), specify TOP SECRET External Security on
       the KONPCSI4 - OMEGAMON II Configuration Parameters screen. As a result of this,
       configure member KLVINNAM in SYS3.OMEGAMON.qualifier.RKONPARM to read as
       follows:
(3)    Create the STC ACID KON2VTAM with a non-expiring password, sourced to the internal
       reader, and a Master Facility of KON2VTAM:
(5)    Add the STC KON2VTAM to the Started Task Table specifying the associated ACID
       KON2VTAM:
102
                                          UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                           DISA Field Security Operations
21 January 2005                                                             Developed by DISA for the DOD
(6)    Define KON2VTAM as a Facility to TOP SECRET in the Facility Matrix Table using the
       following example:
           FACILITY(USERxx=NAME=KON2VTAM)
           FACILITY(KON2VTAM=MODE=FAIL,ACTIVE,SHRPRF)
           FACILITY(KON2VTAM=PGM=KLV,NOASUBM,NOABEND,NOXDEF)
           FACILITY(KON2VTAM=ID=nn,MULTIUSER,RES,LUMSG,STMSG,
             WARNPW,SIGN(M))
           FACILITY(KON2VTAM=NOINSTDATA,NORNDPW,AUTHINIT,
             NOPROMPT,NOAUDIT)
           FACILITY(KON2VTAM=NOTSOC,LOG(INIT,SMF,MSG,SEC9))
(7)    OMEGAMON II for VTAM does not use SAF to restrict access authorization to the
       OMEGAMON II for VTAM APPLID. However, sites using CL/SUPERSESSION can
       control access to VTAM APPLIDs. In accordance with Section 6.2, CL/SUPERSESSION,
       use dynamic application lists to ensure that the ACP arbitrates access to all applications.
       Sites using CL/SUPERSESSION will define the APPLID of AxxOMP01 to the KLS
       resource class. Restrict access to authorized system-level support personnel only (e.g.,
       systems programming, network, and operations). For example:
•     (ZOMG0050: CAT II) The systems programmer/IAO will ensure that OMEGAMON
      APPLIDs are configured and protected in accordance with STIG requirements.
•     (ZOMG0060: CAT II) The systems programmer/IAO will ensure that OMEGAMON
      products are configured in accordance with STIG requirements.
•     (ZOMGT090: CAT II) The systems programmer/IAO will ensure that OMEGAMON
      facilities are defined in accordance with STIG requirements.
OMEGAMON II for SMS is the performance monitor product for IBM System Managed
Storage.
This section documents general security considerations that apply to OMEGAMON II for SMS.
This product has the capability of interfacing with the installed ACP or using internal security.
The STIG requirement is to use the ACP for controlling access.
                                                                                                      103
                                           UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                             DISA Field Security Operations
21 January 2005                                                               Developed by DISA for the DOD
Several OMEGAMON II for SMS data sets require APF authorization. Many of these libraries
are shared with other OMEGACENTER products. These data sets include the following:
       SYS2.OMEGAMON.TKDFMODA
       SYS2A.OMEGAMON.TCNLOAD (shared)
       SYS2.OMEGAMON.TKANMODD (shared)
       SYS2.OMEGAMON.TKANMOD1 (shared)
       SYS2.OMEGAMON.TLOADLIB (shared)
       SYS2.OMEGAMON.TLVLOAD (shared)
Each of these libraries requires explicit protection. Read access should be restricted to the
OMEGAMON started tasks. Access greater than read is restricted only to the systems
programming personnel responsible for product installation/maintenance. Refer to Section
2.1.2.1, Authorized Program Facility (APF), for additional information.
In the ACP sections below, accesses to SMS resources are granted to the user profile by function
level resource, where the External Security Function-level resources are as follows:
104
                                         UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                              DISA Field Security Operations
21 January 2005                                                                Developed by DISA for the DOD
Access to the various resources are limited to the appropriate systems programming, storage
administration/DASD management, and Operations personnel. The column labeled USER
ACCESS above is the recommended personnel requiring access to the various resources:
12.2.5.2 ACF2
This section provides the guidance on what values and controls should be set in regard to product
security. Please refer to the installation instructions from the supporting software organization or
the vendor documentation on the detailed procedures for implementation. Complete the
following steps when using ACF2 as the ACP for this OMEGAMON II software monitoring
product:
(1)       Protect all OMEGAMON II for SMS data sets (e.g., SYS2.OMEGAMON,
          SYS3.OMEGAMON) using ACF2. Limit access to these files to the OMEGAMON
          started tasks and the systems programming personnel responsible for installation and
          maintenance of the product. Refer to Section 12.2.5.1.1, APF Authorization, for
          information regarding security controls for APF-authorized data sets.
(2)       During final product configuration (CICAT), specify ACF2 External Security on the
          Choose Product Security Method option. Additionally, set Enable User Authority
          Checking to Y.
(3)       During final product configuration, specify External Function Based Security on the
          Choose Panel Level Security Method option. Specify the resource class name of OSM.
             DEFAULT DSNAME(SYS3.OMEGAMON.qualifier.RKDFNAM)
               EXIT=KLVA2NEV CLASSES=OSM NORACF NODB
(4) Ensure that the logonid KDFPROC is defined as a MUSASS NO-SMC STC.
(5) Ensure that the resource type of OSM is specified in the INFODIR or RESDIR.
                                                                                                         105
                                            UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                            DISA Field Security Operations
21 January 2005                                                              Developed by DISA for the DOD
(6)    Control user access to OMEGAMON II for SMS through the use of the function resource,
       OMIISMS@PRODUCT@ACCESS, defined to the OSM resource type. Restrict access to
       authorized system-level support personnel only (e.g., systems programming, storage
       management, and operations). Control all other sensitive panel functions through ACF2
       resources. Refer to Section 12.2.5.1.2, Function Resource Controls, for a list of the
       resources. For example:
           $KEY(OMIISMS@PRODUCT@ACCESS) TYPE(OSM)
           - UID(-) PREVENT
           UID(sys-prog-group) ALLOW
(7)    OMEGAMON II for SMS does not use SAF to restrict access authorization to the
       OMEGAMON II for SMS APPLID. However, sites using CL/SUPERSESSION can
       control access to VTAM APPLIDs. In accordance with Section 6.2, CL/SUPERSESSION,
       use dynamic application lists to ensure that the ACP arbitrates access to all applications.
       Sites using CL/SUPERSESSION will define the APPLID of AxxOTP01 to the APL
       resource type. Restrict access to authorized system-level support personnel only (e.g.,
       systems programming, storage management, and operations). For example:
           $KEY(AxxOTP01) TYPE(APL)
           - UID(-) PREVENT
           UID(sys-prog-group) ALLOW
•     (ZOMG0050: CAT II) The systems programmer/IAO will ensure that OMEGAMON
      APPLIDs are configured and protected in accordance with STIG requirements.
•     (ZOMG0060: CAT II) The systems programmer/IAO will ensure that OMEGAMON
      products are configured in accordance with STIG requirements.
•     (ZOMG0080: CAT II) The systems programmer/IAO will ensure that OMEGAMON
      resources are protected in accordance with STIG requirements.
12.2.5.3 RACF
This section provides the guidance on what values and controls should be set in regard to product
security. Please refer to the installation instructions from the supporting software organization or
the vendor documentation on the detailed procedures for implementation. Complete the
following steps when using RACF as the ACP for this OMEGAMON II software monitoring
product:
(1)    Protect all OMEGAMON II for SMS data sets (e.g., SYS2.OMEGAMON,
       SYS3.OMEGAMON) using RACF. Limit access to these files to the OMEGAMON
       started tasks and the systems programming personnel responsible for the product. Refer to
       Section 12.2.5.1.1, APF Authorization, for information regarding security controls for
       APF-authorized data sets.
106
                                          UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                          DISA Field Security Operations
21 January 2005                                                            Developed by DISA for the DOD
(2)    During final product configuration (CICAT), specify RACF External Security on the
       Choose Product Security Method option. Additionally, set Enable User Authority
       Checking to Y.
(3)    During final product configuration, specify External Function Based Security on the
       Choose Panel Level Security Method option. Specify the resource class name of
       $$OSCAN.
             DEFAULT DSNAME(SYS3.OMEGAMON.qualifier.RKDFNAM)
               CLASSES=$$OSCAN RACF NODB
(4)    Update the Resource Class Descriptor Table and RACF Router Table for classname
       $$OSCAN.
             ICHERCDE CLASS=$$OSCAN,
                       ID=nnn,
                       MAXLNTH=28,
                       FIRST=ALPHANUM,
                       OTHER=ANY,
                       POSIT=nnn,
                       DFTUACC=NONE
             ICHRFRTB CLASS=$$OSCAN,
                       ACTION=RACF
       (b)    The userid KDFPROC is connected to a group for the OMEGACENTER started
              tasks.
       (c)    The KDFPROC STC has a matching profile defined to the STARTED resource class
              with no special attributes. For example:
                                                                                                     107
                                         UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                           DISA Field Security Operations
21 January 2005                                                             Developed by DISA for the DOD
(6)    Control user access to OMEGAMON II for SMS through the use of the function resource
       OMIISMS@PRODUCT@ACCESS defined to the $$OSCAN class. Restrict access to
       authorized system-level support personnel only (e.g., systems programming, storage
       management, and operations). Control all other sensitive panel functions through RACF
       resources. Define all SMS resources with a UACC(NONE). Refer to Section 12.2.5.1.2,
       Function Resource Controls, for a list of the resources. For example:
(7)    OMEGAMON II for SMS does not use SAF to restrict access authorization to the
       OMEGAMON II for SMS APPLID. However sites using CL/SUPERSESSION can
       control access to VTAM APPLIDs. In accordance with Section 6.2, CL/SUPERSESSION,
       use dynamic application lists to ensure that the ACP arbitrates access to all applications.
       Sites using CL/SUPERSESSION will define the APPLID of AxxOTP01 to the APPL
       resource class. Restrict access to authorized system-level support personnel only (e.g.,
       systems programming, storage management, and operations). For example:
•     (ZOMG0050: CAT II) The systems programmer/IAO will ensure that OMEGAMON
      APPLIDs are configured and protected in accordance with STIG requirements.
•     (ZOMG0060: CAT II) The systems programmer/IAO will ensure that OMEGAMON
      products are configured in accordance with STIG requirements.
•     (ZOMG0080: CAT II) The systems programmer/IAO will ensure that OMEGAMON
      resources are protected in accordance with STIG requirements.
108
                                          UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                            DISA Field Security Operations
21 January 2005                                                              Developed by DISA for the DOD
This section provides the guidance on what values and controls should be set in regard to product
security. Please refer to the installation instructions from the supporting software organization or
the vendor documentation on the detailed procedures for implementation. Complete the
following steps when using TOP SECRET as the ACP for this OMEGAMON II software
monitoring product:
(1)    Protect all OMEGAMON II for SMS data sets (e.g., SYS2.OMEGAMON,
       SYS3.OMEGAMON) using TOP SECRET. Limit access to these files to the
       OMEGAMON started tasks and the systems programming personnel responsible for the
       product. Refer to Section 12.2.5.1.1, APF Authorization, for information regarding security
       controls for APF-authorized data sets.
(2)    During final product configuration (CICAT), specify TOP SECRET External Security on
       the Choose Product Security Method option. Additionally, set Enable User Authority
       Checking to Y.
(3)    During final product configuration, specify External Function Based Security on the
       Choose Panel Level Security Method option. Specify the resource class name of
       KOSCANDL.
           DEFAULT DSNAME(SYS3.OMEGAMON.qualifier.RKDFNAM)
             CLASSES=KOSCANDL RACF NODB
(4)    Create the STC ACID KDFPROC with a non-expiring password, sourced to the internal
       reader, and a Master Facility of KDFPROC:
(6)    Add the STC KDFPROC to the Started Task Table specifying the associated ACID
       KDFPROC:
                                                                                                       109
                                          UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                         DISA Field Security Operations
21 January 2005                                                           Developed by DISA for the DOD
(7)    Ensure that the resource type of KOSCANDL is defined to the Resource Definition Table
       (RDT). An example of the command to do this is shown below:
(8)    Ensure that KDFPROC is defined as a Facility to TOP SECRET in the Facility Matrix
       Table. The following is an example:
           FACILITY(USERxx=NAME=KDFPROC)
           FACILITY(KDFPROC=MODE=FAIL,ACTIVE,SHRPRF)
           FACILITY(KDFPROC=PGM=KLV,NOASUBM,NOABEND,NOXDEF)
           FACILITY(KDFPROC=ID=nn,MULTIUSER,RES,LUMSG,STMSG,WARNPW,
             SIGN(M))
           FACILITY(KDFPROC=NOINSTDATA,NORNDPW,AUTHINIT,NOPROMPT,
             NOAUDIT)
           FACILITY(KDFPROC=NOTSOC,LOG(INIT,SMF,MSG,SEC9))
(9)    Control user access to OMEGAMON II for SMS through the use of the function resource
       OMIISMS@PRODUCT@ACCESS defined to the KOSCANDL class. Restrict access to
       authorized system-level support personnel only (e.g., systems programming, storage
       management, and operations). Control all other sensitive panel functions through TOP
       SECRET resources. Refer to Section 12.2.5.1.2, Function Resource Controls, for a list of
       the resources. For example:
(10) OMEGAMON II for SMS does not use SAF to restrict access authorization to the
     OMEGAMON II for SMS APPLID. However, sites using CL/SUPERSESSION can
     control access to VTAM APPLIDs. In accordance with Section 6.2, CL/SUPERSESSION,
     use dynamic application lists to ensure that the ACP arbitrates access to all applications.
     Sites using CL/SUPERSESSION will define the APPLID of AxxOTP01 to the KLS
     resource class. Restrict access to authorized system-level support personnel only (e.g.,
     systems programming, storage management, and operations). For example:
•     (ZOMG0050: CAT II) The systems programmer/IAO will ensure that OMEGAMON
      APPLIDs are configured and protected in accordance with STIG requirements.
110
                                           UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                            DISA Field Security Operations
21 January 2005                                                              Developed by DISA for the DOD
•   (ZOMG0060: CAT II) The systems programmer/IAO will ensure that OMEGAMON
    products are configured in accordance with STIG requirements.
•   (ZOMG0080: CAT II) The systems programmer/IAO will ensure that OMEGAMON
    resources are protected in accordance with STIG requirements.
•   (ZOMGT090: CAT II) The systems programmer/IAO will ensure that OMEGAMON
    facilities are defined in accordance with STIG requirements.
OMEGAMON II for MVS is the performance monitor product for the IBM base operating
system and components. This product has the capability of interfacing with the installed ACP or
using internal security. The STIG requirement is to use External Security for controlling access.
This section also includes information on security considerations for the Candle Management
Server (CMS).
OMEGAMON II has many commands that are used to inquire and optionally make changes to
system parameters and values. The product allows each command to have a security level
assigned to it, ranging from 0 to 3. Users are then assigned a security level within their profile
that allows them to issue commands assigned to their level and lower. As an example, a user
with Level 2 can execute commands secured at Levels 0, 1, or 2. Level 3 provides the highest
degree of protection for sensitive commands. A setting of 0 means that any user can access the
command. Access to Level 3 is strictly controlled and only granted to authorized systems
personnel.
The following commands are installed with a security level of 3 by default from the vendor, and
are to remain as Level 3 commands:
                                                                                                       111
                                          UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                            DISA Field Security Operations
21 January 2005                                                              Developed by DISA for the DOD
The following commands are not installed as Level 3 commands by the vendor, but are
designated as Level 3 commands by this STIG:
The ACP determines which security level is associated with a user. Please refer to the following
ACP-specific sections for the details on how this is controlled.
NOTE:        During the installation of the product, Candle internal security assigns default
             passwords to the various security levels. This password can be entered in response to
             a /PWD command entered by the user to change the security level. Even though the
             STIG does not allow users to change their security levels via these passwords, each
             site is required to change their passwords from the defaults.
Several OMEGAMON II for MVS data sets require APF authorization. These data sets include
the following:
       SYS2.OMEGAMON.TETLOAD
       SYS2.OMEGAMON.TKANMOD1
       SYS2.OMEGAMON.TKANMODD
       SYS2.OMEGAMON.TLOADLIB
       SYS2.OMEGAMON.TLVLOAD
       SYS2.OMEGAMON.TSDLOAD
Each of these libraries requires explicit protection. Read access should be restricted to the
OMEGAMON started tasks. Restrict access greater than read only to the systems programming
personnel responsible for product installation/maintenance. Refer to Section 2.1.2.1, Authorized
Program Facility (APF), for additional information.
12.2.6.2 ACF2
This section provides the guidance on what values and controls should be in regard to product
security. Please refer to the installation instructions from the supporting software organization or
the vendor documentation on the detailed procedures for implementation. The following
sub-sections outline the use of the different controls necessary when using ACF2 as the ACP for
this OMEGAMON II software monitoring product.
112
                                            UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                          DISA Field Security Operations
21 January 2005                                                            Developed by DISA for the DOD
The following is information related to setting up validation for the Candle Management Server
(CMS):
           DEFAULT DSNAME(SYS3.OMEGAMON.qualifier.RKDSNAM)
             EXIT=KLVA2NEV NORACF NODB
•     (ZOMG0060: CAT II) The systems programmer/IAO will ensure that OMEGAMON
      products are configured in accordance with STIG requirements.
The following is information related to setting up product-level security for OMEGAMON II for
MVS:
(1)    During final product configuration (CICAT), specify ACF2 External Security. As a result
       of this, configure member KM2INNAM in SYS3.OMEGAMON.qualifier.RKANPAR to
       read as follows:
           DEFAULT DSNAME(SYS3.OMEGAMON.qualifier.NAM)
             EXIT=KLVA2NEV NORACF NODB
(2)    Ensure that the vendor-provided KLVA2NEV exit program is being used. If modifications
       to this program are necessary, submit a request to DISA FSO for an integrity review prior
       to implementation.
•     (ZOMG0070: CAT II) The IAO will ensure that OMEGAMON external security exits are
      installed in accordance with STIG requirements.
(3)    Protect all OMEGAMON II for MVS data sets (e.g., SYS2.OMEGAMON,
       SYS3.OMEGAMON) using ACF2. Limit access to these files to the OMEGAMON
       started tasks and the systems programming personnel responsible for installation and
       maintenance of the product. Refer to Section 12.2.6.1.2, APF Authorization, for
       information regarding security controls for APF-authorized data sets.
(5)    Define a logonid for each of the following started tasks. The logonid and STC name are
       the same. These logonids have no special privileges:
           KCNDL
           OMIICSA
           OMIIEPZM
           OMIIETE
           OMIIHDI
           OMIIHIST
           OMIIHMN
           OMIIHM2
The following is information relating to setting up command and access controls for
OMEGAMON II for MVS:
(1)    Ensure that the resource type is defined as OMS. This is accomplished in the actual
       KOMACF2X source module. Line 07600000 should be changed to read as follows:
A#ACFCLS DC CL4’ROMS’
       Run job KOMACF2A to assemble and link the exit. This resource type is also defined to
       the ACF2 INFODIR GSO record.
NOTE: The exit program must be specified with the MODULE=KOMACF2X parameter in the
      NOTE:KOMSUPDI member of SYS3.OMEGAMON.qualifier.ROMDATA.
•     (ZOMG0070: CAT II) The IAO will ensure that OMEGAMON external security exits are
      installed in accordance with STIG requirements.
(2)    Define the following resource rules to prevent unauthorized access to OMEGAMON.
       Restrict access to authorized system-level support personnel only (e.g., systems
       programming, storage management, network, and operations). For example:
           $KEY(INITIAL) TYPE(OMS)
           - UID(-) PREVENT
           $KEY(INITIAL0) TYPE(OMS)
           - UID(-) PREVENT
           UID(sys-level-support-grp-0) ALLOW
114
                                         UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                             DISA Field Security Operations
21 January 2005                                                               Developed by DISA for the DOD
           $KEY(INITIAL1) TYPE(OMS)
           - UID(-) PREVENT
           UID(sys-level-support-grp-1) ALLOW
           $KEY(INITIAL2) TYPE(OMS)
           - UID(-) PREVENT
           UID(sys-level-support-grp-2) ALLOW
           $KEY(INITIAL3) TYPE(OMS)
           - UID(-) PREVENT
           UID(sys-prog-grp) ALLOW
NOTE:: The levels of access that are provided for the command structure are progressively
           restrictive. INITIAL0 access is the least restrictive and is the access authority that is
           provided to the majority of OMEGAMON II product users. INITIAL3 is the most
           restrictive and is assigned to the sensitive commands. The INITIAL rule allows a user
           to enter a password to switch levels. This mechanism is not to be used in the DOD
           environment and is not granted to any user. The IAO is responsible for the assignment
           and administration of the access levels.
(3)    The INITIAL3 rule controls access to all of the sensitive commands. As such it is
       restricted only to systems programmers.
(4)    Optionally, a site can use ACF2 controls to protect commands to the individual level rather
       than the security levels. This is accomplished by specifying the command as externally
       validated and writing a rule to allow access to the command. Refer to the vendor
       documentation for additional information.
(5)    OMEGAMON II for MVS does not use SAF to restrict access authorization to the
       OMEGAMON II for MVS APPLIDs. However, sites using CL/SUPERSESSION can
       control access to VTAM APPLIDs. In accordance with Section 6.2, CL/SUPERSESSION,
       use dynamic application lists to ensure that the ACP arbitrates access to all applications.
       Sites using CL/SUPERSESSION will define the APPLID(s) of AxxO2P01 and AxxORP01
       to the APL resource type. Restrict access to authorized system-level support personnel
       only (e.g., systems programming, storage management, network, and operations). For
       example:
           $KEY(AxxO2P01) TYPE(APL)
           - UID(-) PREVENT
           UID(sys-prog-group) ALLOW
           $KEY(AxxORP01) TYPE(APL)
           - UID(-) PREVENT
           UID(sys-prog-group) ALLOW
                                                                                                        115
                                           UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                          DISA Field Security Operations
21 January 2005                                                            Developed by DISA for the DOD
(6)    Configure and install the security table, KOMSUPDI, to specify EXTERNAL=NO for all
       Level 3 commands, to change the three vendor supplied-level passwords, and to specify the
       KOMACF2X security module. Run job KOMSUPD to install the security table.
•     (ZOMG0080: CAT II) The systems programmer/IAO will ensure that OMEGAMON
      resources are protected in accordance with STIG requirements.
12.2.6.3 RACF
This section provides the guidance on what values and controls should be in regard to product
security. Please refer to the installation instructions from the supporting software organization,
or the vendor documentation on the detailed procedures for implementation. The following
sub-sections outline the use of the different controls necessary when using RACF as the ACP for
this OMEGAMON II software monitoring product.
The following is information related to setting up validation for the Candle Management Server
(CMS):
       (b)    The userid KDSPROC is connected to a group for the OMEGACENTER started
              tasks.
       (c)    The KDSPROC STC has a matching profile defined to the STARTED resource class
              with no special attributes. For example:
The following is information related to setting up product-level security for OMEGAMON II for
MVS:
116
                                         UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                           DISA Field Security Operations
21 January 2005                                                             Developed by DISA for the DOD
(1)    During final product configuration (CICAT), specify RACF External Security. As a result
       of this, configure member KM2INNAM in SYS3.OMEGAMON.qualifier.RKANPAR to
       read as follows:
(2)    Protect all OMEGAMON data sets using RACF. Limit access to these files to the
       OMEGAMON started tasks and the systems programmers responsible for the product.
       Refer to Section 12.2.6.1.2, APF Authorization, for information regarding security controls
       for APF-authorized data sets.
       (a)    A userid for each STC identified in (c) below is defined as a PROTECTED userid.
              The userid and STC name should be the same.
(b) Each userid is connected to a group for the OMEGACENTER started tasks.
       (c)    Each of the following STCs has a matching profile defined to the STARTED resource
              class with no special attributes.
                  KCNDL
                  OMIICSA
                  OMIIEPZM
                  OMIIETE
                  OMIIHDI
                  OMIIHIST
                  OMIIHMN
                  OMIIHM2
                  OMIIMVS
                  OMIIRCOL
For example:
The following is information relating to setting up command and access controls for
OMEGAMON II for MVS:
(1)    Ensure that the RACF exit program is installed properly to provide for command-level
       security. During the installation, the resource class of $$OMCAN is specified. Ensure that
       line 00890000 reads as follows in source member KOMRACFX:
                                                                                                      117
                                          UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                           DISA Field Security Operations
21 January 2005                                                             Developed by DISA for the DOD
NOTE: The exit program must be specified with the MODULE=KOMRACFX parameter in the
           KOMSUPDI member of SYS3.OMEGAMON.qualifier.ROMDATA.
•     (ZOMG0070: CAT II) The IAO will ensure that OMEGAMON external security exits are
      installed in accordance with STIG requirements.
(2)    A new class is added to the RACF Class Descriptor Table and RACF Router Table for
       classname $$OMCAN. The following is a sample for the class entry:
           ICHERCDE CLASS=$$OMCAN,
                     ID=nnn,
                     MAXLNTH=8,
                     FIRST=ALPHANUM,
                     OTHER=ANY,
                     POSIT=nnn,
                     DFTUACC=NONE
           ICHRFRTB CLASS=$$OMCAN,
                     ACTION=RACF
(3)    Define the following resource profiles to the $$OMCAN class to prevent unauthorized
       access to OMEGAMON:
(4)    Restrict access to authorized system-level support personnel only (e.g., systems
       programming, storage management, network, and operations). For example:
118
                                          UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                            DISA Field Security Operations
21 January 2005                                                              Developed by DISA for the DOD
NOTE: The levels of access that are provided for the command structure are progressively
           restrictive. INITIAL0 access is the least restrictive and is the access authority that is
           provided to the majority of OMEGAMON II product users. INITIAL3 is the most
           restrictive and is assigned to the sensitive commands. The INITIAL rule allows a user
           to enter a password to switch levels. This mechanism is not to be used in the DOD
           environment and is not granted to any user. The IAO is responsible for the assignment
           and administration of the access levels.
(5)    The INITIAL3 rule controls access to all of the sensitive commands. As such it is
       restricted only to systems programmers.
(6)    Optionally, a site can use RACF controls to protect commands to the individual level rather
       than the security levels. This is accomplished by specifying the command as externally
       validated and writing a rule to allow access to the command. Refer to the vendor
       documentation for additional information.
(7)    OMEGAMON II for MVS does not use SAF to restrict access authorization to the
       OMEGAMON II for MVS APPLIDs. However, sites using CL/SUPERSESSION can
       control access to VTAM APPLIDs. In accordance with Section 6.2, CL/SUPERSESSION,
       use dynamic application lists to ensure that the ACP arbitrates access to all applications.
       Sites using CL/SUPERSESSION will define the APPLID(s) of AxxO2P01 and AxxORP01
       to the APPL resource class. Restrict access to authorized system-level support personnel
       only (e.g., systems programming, storage management, network, and operations). For
       example:
(8)    Permit OMIIMVS and OMIIEPZM to issue OS/390 commands by giving an OPERCMDS
       profile to OMIIMVS and OMIIEPZM.
(9)    Configure and install the security table, KOMSUPDI, to specify EXTERNAL=NO for all
       Level 3 commands, to change the three vendor supplied-level passwords, and to specify the
       KOMRACFX security module. Run job KOMSUPD to install the security table.
•     (ZOMG0050: CAT II) The systems programmer/IAO will ensure that OMEGAMON
      APPLIDs are configured and protected in accordance with STIG requirements.
•     (ZOMG0060: CAT II) The systems programmer/IAO will ensure that OMEGAMON
      products are configured in accordance with STIG requirements.
•     (ZOMG0080: CAT II) The systems programmer/IAO will ensure that OMEGAMON
      resources are protected in accordance with STIG requirements.
                                                                                                       119
                                           UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                            DISA Field Security Operations
21 January 2005                                                              Developed by DISA for the DOD
This section provides the guidance on what values and controls should be in regard to product
security. Please refer to the installation instructions from the supporting software organization or
the vendor documentation on the detailed procedures for implementation. The following
sub-sections outline the use of the different controls necessary when using TOP SECRET as the
ACP for this OMEGAMON II software monitoring product.
The following is information related to setting up validation for the Candle Management Server
(CMS):
(3)    Create the STC ACID KDSPROC with a non-expiring password, sourced to the internal
       reader, and a Master Facility of KDSPROC:
(5)      Add the STC KDSPROC to the Started Task Table specifying the associated ACID
         KDSPROC:
(6)    Ensure that KDSPROC is defined as Facility to TOP SECRET in the Facility Matrix Table
       using the following example:
           KDSPROC
           FACILITY(USERxx=NAME=KDSPROC)
           FACILITY(KDSPROC=MODE=FAIL,ACTIVE,SHRPRF)
           FACILITY(KDSPROC=PGM=KLV,NOASUBM,NOABEND,NOXDEF)
120
                                          UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                           DISA Field Security Operations
21 January 2005                                                             Developed by DISA for the DOD
             FACILITY(KDSPROC=ID=nn,MULTIUSER,RES,LUMSG,STMSG,WARNPW,
                 SIGN(M))
             FACILITY(KDSPROC=NOINSTDATA,NORNDPW,AUTHINIT,NOPROMPT,
                 NOAUDIT)
             FACILITY(KDSPROC=NOTSOC,LOG(INIT,SMF,MSG,SEC9))
       Each user that requires access to the OMEGAMON CMS product must be given access
       to the KDSPROC Facility.
The following is information related to setting up product-level security for OMEGAMON II for
MVS:
(1)    During final product configuration (CICAT), specify TOP SECRET External Security. As
       a result of this, configure member KM2INNAM in
       SYS3.OMEGAMON.qualifier.RKANPAR to read as follows:
•     (ZOMG0070: CAT II) The IAO will ensure that OMEGAMON external security exits are
      installed in accordance with STIG requirements.
(2)    Protect all OMEGAMON data sets using TOP SECRET. Limit access to these files to the
       OMEGAMON started tasks and the systems programmers responsible for the product.
       Refer to Section 12.2.6.1.2, APF Authorization, for information regarding security controls
       for APF-authorized data sets. This should be done by performing the following:
(c) Permit the OMEGAMON profile read access to all OMEGAMON loadlibs:
                                                                                                      121
                                           UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                        DISA Field Security Operations
21 January 2005                                                          Developed by DISA for the DOD
(3)    Create a STC ACID for each of the following started tasks. The ACID should match the
       name of the stated task. Each ACID is defined with a non-expiring password and sourced
       to the internal reader.
       The OMIIMVS and OMIIRCOL STCs are defined with a MASTFAC. The MASTFAC
       matches the name of the STC ACID. A MASTFAC is not specified for the other STCs
       mentioned in this paragraph.
           KCNDL
           OMIICSA
           OMIIEPZM
           OMIIETE
           OMIIHDI
           OMIIHIST
           OMIIHMN
           OMIIHM2
           OMIIMVS
           OMIIRCOL
For example:
(4) Add the OMEGAMON profile to each STC ACID created in Step 3 above. For example:
(5)    Add each STC indicated in Paragraph (3) above to the Started Task Table specifying the
       associated matching ACID. For example:
122
                                        UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                         DISA Field Security Operations
21 January 2005                                                           Developed by DISA for the DOD
(6)    Ensure that OMIIMVS and OMIIRCOL are defined as Facilities to TOP SECRET in the
       Facility Matrix Table using the following examples:
           FACILITY(USERxx=NAME=OMIIMVS)
           FACILITY(OMIIMVS=MODE=FAIL,ACTIVE,SHRPRF)
           FACILITY(OMIIMVS=PGM=KLV,NOASUBM,NOABEND,NOXDEF)
           FACILITY(OMIIMVS=ID=nn,MULTIUSER,RES,LUMSG,STMSG,WARNPW,
             SIGN(M))
           FACILITY(OMIIMVS=NOINSTDATA,NORNDPW,AUTHINIT,NOPROMPT,
             NOAUDIT)
           FACILITY(OMIIMVS=NOTSOC,LOG(INIT,SMF,MSG,SEC9))
           FACILITY(USERxx=NAME=OMIIRCOL)
           FACILITY(OMIIRCOL=MODE=FAIL,ACTIVE,SHRPRF)
           FACILITY(OMIIRCOL=PGM=KOB,NOASUBM,NOABEND,NOXDEF)
           FACILITY(OMIIRCOL=ID=nn,MULTIUSER,RES,LUMSG,STMSG,
               WARNPW,SIGN(M))
           FACILITY(OMIIRCOL=NOINSTDATA,NORNDPW,AUTHINIT,NOPROMPT,
               NOAUDIT)
           FACILITY(OMIIRCOL=NOTSOC,LOG(INIT,SMF,MSG,SEC9))
       Each user that requires access to the OMEGAMON II for MVS product must be given
       access to the appropriate Facilities.
(7)    Ensure that the vendor-provided KLVTSNEV exit program is being used. If modifications
       to this program are necessary, submit a request to DISA FSO for an integrity review prior
       to implementation.
                                                                                                    123
                                           UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                           DISA Field Security Operations
21 January 2005                                                             Developed by DISA for the DOD
The following is information relating to setting up command and access controls for
OMEGAMON II for MVS:
(1)    To implement External Security validation for OMEGAMON command levels, update the
       Resource Definition Table adding a class name of KOMCANDL:
(2)    Ensure that the TOP SECRET/RACF exit program is installed properly to provide for
       command-level security. During the installation, the resource class of KOMCANDL will
       be specified. Ensure that line 00890000 reads as follows in source member KOMRACFX:
NOTE: The exit program must be specified with the MODULE=KOMRACFX parameter in the
           KOMSUPDI member of SYS3.OMEGAMON.qualifier.ROMDATA.
•     (ZOMG0070: CAT II) The IAO will ensure that OMEGAMON external security exits are
      installed in accordance with STIG requirements.
(3)    Assign ownership of the following OMEGAMON resource specifying the appropriate
       department ACID and KOMCANDL resource class. For example:
(4)    Restrict access to authorized system-level support personnel only (e.g., systems
       programming, storage management, network, and operations). For example:
124
                                           UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                             DISA Field Security Operations
21 January 2005                                                               Developed by DISA for the DOD
NOTE: The levels of access that are provided for the command structure are progressively
           restrictive. INITIAL0 access is the least restrictive and is the access authority that is
           provided to the majority of OMEGAMON II product users. INITIAL3 is the most
           restrictive and is assigned to the sensitive commands. The INITIAL rule allows a user
           to enter a password to switch levels. This mechanism is not to be used in the DOD
           environment and are not granted to any user. The IAO is responsible for the
           assignment and administration of the access levels.
(5)    The INITIAL3 rule controls access to all of the sensitive commands. As such it is
       restricted only to systems programmers.
(6)    Optionally, a site can use TOP SECRET controls to protect commands to the individual
       level rather than the security levels. This is accomplished by specifying the command as
       externally validated and writing a rule to allow access to the command. Refer to the
       vendor documentation for additional information.
(7)    OMEGAMON II for MVS does not use SAF to restrict access authorization to the
       OMEGAMON II for MVS APPLIDs. However, sites using CL/SUPERSESSION can
       control access to VTAM APPLIDs. In accordance with Section 6.2, CL/SUPERSESSION,
       use dynamic application lists to ensure that the ACP arbitrates access to all applications.
       Sites using CL/SUPERSESSION will define the APPLID(s) of AxxO2P01 and AxxORP01
       to the KLS resource class. Restrict access to authorized system-level support personnel
       only (e.g., systems programming, storage management, network, and operations). For
       example:
(8)    Configure and install the security table, KOMSUPDI, to specify EXTERNAL=NO for all
       Level 3 commands, to change the three vendor supplied-level passwords, and to specify the
       KOMRACFX security module. Run job KOMSUPD to install the security table.
•     (ZOMG0050: CAT II) The systems programmer/IAO will ensure that OMEGAMON
      APPLIDs are configured and protected in accordance with STIG requirements.
•     (ZOMG0060: CAT II) The systems programmer/IAO will ensure that OMEGAMON
      products are configured in accordance with STIG requirements.
•     (ZOMG0080: CAT II) The systems programmer/IAO will ensure that OMEGAMON
      resources are protected in accordance with STIG requirements.
•     (ZOMGT090: CAT II) The systems programmer/IAO will ensure that OMEGAMON
      facilities are defined in accordance with STIG requirements.
                                                                                                        125
                                           UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                            DISA Field Security Operations
21 January 2005                                                              Developed by DISA for the DOD
OMEGAMON II for CICS is a comprehensive performance monitor product for the IBM
Customer Information Control System (CICS). Its real-time monitor alerts the user to CICS
response time degradation and overall system problems. This product has the capability of
interfacing with the installed ACP or using internal security. The DOD standard is to use
external security for controlling access.
OMEGAMON II has many commands that are used to inquire and optionally make changes to
system parameters and values. The product allows each command to have a security level
assigned to it, ranging from 0 to 3. Users are then assigned a security level within their profile
that allows them to issue commands assigned to their level and lower. As an example, a user
with Level 2 can execute commands secured at Levels 0, 1, or 2. Level 3 provides the highest
degree of protection for sensitive commands. A setting of 0 means that any user can access the
command. Access to Level 3 should be strictly controlled and only granted to authorized
systems personnel.
The following authorized commands are installed with a security level of 3 by default from the
vendor, and are to remain as Level 3 commands:
The ACP determines which security level is associated with a user. Please refer to the following
ACP-specific sections for the details on how this is controlled.
NOTE: During the installation of the product, Candle internal security assigns default
           passwords to the various security levels. This password can be entered in response to a
           /PWD command entered by the user to change the security level. Even though the
           STIG requirement do not allow users to change their security levels via these
           passwords, each site is required to change their passwords from the defaults.
126
                                          UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                            DISA Field Security Operations
21 January 2005                                                              Developed by DISA for the DOD
Several OMEGAMON II for CICS data sets require APF authorization. These data sets include
the following:
       SYS2.OMEGAMON.TETLOAD
       SYS2.OMEGAMON.TLOADLIB
       SYS2.OMEGAMON.TLVLOAD
       SYS2.OMEGAMON.TCNLOAD
Each of these libraries requires explicit protection. Read access should be restricted to the
OMEGAMON started tasks. Access greater than read is restricted to only the systems
programming personnel responsible for product installation/maintenance. Refer to Section
2.1.2.1, Authorized Program Facility (APF), for additional information.
12.2.7.2 ACF2
This section provides the guidance on what values and controls should be in regard to product
security. Please refer to the installation instructions from the supporting software organization or
to the vendor documentation on the detailed procedures for implementation. The following
sub-sections outline the use of the different controls necessary when using ACF2 as the ACP for
this OMEGAMON II software monitoring product.
The following is information related to setting up product-level security for OMEGAMON II for
CICS:
(1)    During final product configuration (CICAT), specify ACF2 CUA Interface Security. As a
       result of this, configure member KLVINNAM in
       SYS3.OMEGAMON.qualifier.RKC2PARM to read as follows:
(2)    Ensure that the vendor-provided KLVA2NEV exit program is being used. If modifications
       to this program are necessary, submit a request to DISA FSO for an integrity review prior
       to implementation.
                                                                                                       127
                                          UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                          DISA Field Security Operations
21 January 2005                                                            Developed by DISA for the DOD
(3)    Protect all OMEGAMON II for CICS data sets (e.g., SYS2.OMEGAMON,
       SYS3.OMEGAMON) using ACF2. Limit access to these files to the OMEGAMON
       started tasks and the systems programming personnel responsible for installation and
       maintenance of the product. Refer to Section 12.2.6.1.2, APF Authorization, for
       information regarding security controls for APF-authorized data sets.
The following is information relating to setting up command and access controls for
OMEGAMON II for CICS:
(1)    Ensure the resource type is defined as OCS. This is accomplished in the actual
       KOCAACF2 source module. Line 07600000 should be changed to read as follows:
A#ACFCLS DC CL4’ROCS’
       Run job KOCJACF2 to assemble and link the exit. This resource type will also be defined
       to the ACF2 INFODIR GSO record.
NOTE: The ACF2 exit program must be specified with the MODULE=KOCAACF2 parameter
           in the KOCSECUR member of SYS3.OMEGAMON.qualifier.RKC2DATA.
•     (ZOMG0070: CAT II) The IAO will ensure that OMEGAMON external security exits are
      installed in accordance with STIG requirements.
(2)    Define the following resource rules to prevent unauthorized access to OMEGAMON.
       Restrict access to authorized system-level support personnel only (e.g., systems
       programming and operations). For example:
           $KEY(INITIAL) TYPE(OCS)
           UID(-) PREVENT
           $KEY(INITIAL0) TYPE(OCS)
           UID(-) PREVENT
           UID(sys-level-support-grp-0) ALLOW
           $KEY(INITIAL1) TYPE(OCS)
           UID(-) PREVENT
           UID(sys-level-support-grp-1) ALLOW
128
                                         UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                             DISA Field Security Operations
21 January 2005                                                               Developed by DISA for the DOD
           $KEY(INITIAL2) TYPE(OCS)
           UID(-) PREVENT
           UID(sys-level-support-grp-2) ALLOW
           $KEY(INITIAL3) TYPE(OCS)
           UID(-) PREVENT
           UID(sys-prog-grp) ALLOW
NOTE: The levels of access that are provided for the command structure are progressively
           restrictive. INITIAL0 access is the least restrictive and is the access authority that is
           provided to the majority of OMEGAMON II product users. INITIAL3 is the most
           restrictive and is assigned to the sensitive commands. The INITIAL rule allows a user
           to enter a password to switch levels. This mechanism is not to be used in the DOD
           environment and is not granted to any user. The IAO is responsible for the assignment
           and administration of the access levels.
(3)    The INITIAL3 rule controls access to all of the sensitive commands. As such it is
       restricted only to systems programmers.
(4)    Optionally, a site can use ACF2 controls to protect commands to the individual level rather
       than the security levels. This is accomplished by specifying the command as externally
       validated and writing a rule to allow access to the command. Refer to the vendor
       documentation for additional information.
(5)    OMEGAMON II for CICS does not use SAF to restrict access authorization to the
       OMEGAMON II for CICS APPLIDs. However, sites using CL/SUPERSESSION can
       control access to VTAM APPLIDs. In accordance with Section 6.2, CL/SUPERSESSION,
       use dynamic application lists to ensure that the ACP arbitrates access to all applications.
       Sites using CL/SUPERSESSION will define the APPLID(s) of AxxCOP01 and AxxCOP02
       to the APL resource type. Restrict access to authorized system-level support personnel
       only (e.g., systems programming and operations). For example:
           $KEY(AxxCOP01) TYPE(APL)
           UID(-) PREVENT
           UID(sys-prog-grp) ALLOW
           $KEY(AxxCOP02) TYPE(APL)
           UID(-) PREVENT
           UID(sys-prog-grp) ALLOW
(6)    Configure and install the security table, KOCSECUR, to specify EXTERNAL=NO for all
       Level 3 commands, to change the three vendor supplied-level passwords, and to specify the
       KOCAACF2 security module. Run job KOCSECJB to install the security table.
•     (ZOMG0050: CAT II) The systems programmer/IAO will ensure that OMEGAMON
      APPLIDs are configured and protected in accordance with STIG requirements.
                                                                                                        129
                                           UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                            DISA Field Security Operations
21 January 2005                                                              Developed by DISA for the DOD
•     (ZOMG0060: CAT II) The systems programmer/IAO will ensure that OMEGAMON
      products are configured in accordance with STIG requirements.
•     (ZOMG0080: CAT II) The systems programmer/IAO will ensure that OMEGAMON
      resources are protected in accordance with STIG requirements.
12.2.7.3 RACF
This section provides the guidance on what values and controls should be in regard to product
security. Please refer to the installation instructions from the supporting software organization or
to the vendor documentation on the detailed procedures for implementation. The following
sub-sections outline the use of the different controls necessary when using RACF as the ACP for
this OMEGAMON II software monitoring product.
The following is information related to setting up product-level security for OMEGAMON II for
CICS:
(1)    During final product configuration (CICAT), specify RACF CUA Interface Security. As a
       result of this, configure member KLVINNAM in
       SYS3.OMEGAMON.qualifier.RKC2PARM to read as follows:
(2)    Protect all OMEGAMON data sets using RACF. Limit access to these files to the
       OMEGAMON started tasks and the systems programmers responsible for the product.
       Refer to Section 12.2.6.1.2, APF Authorization, for information regarding security controls
       for APF-authorized data sets.
(a) The STC userids KOCCI and KC2PROC are defined as PROTECTED userids.
       (b)    The userids KOCCI and KC2PROC are connected to a group for the
              OMEGACENTER started tasks.
       (c)    The KOCCI and KC2PROC STCs have matching profiles defined to the STARTED
              resource class with no special attributes. For example:
130
                                          UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                          DISA Field Security Operations
21 January 2005                                                            Developed by DISA for the DOD
The following is information relating to setting up command and access controls for
OMEGAMON II for CICS.
(1)    Ensure that the RACF exit program is installed properly to provide for command-level
       security. During the installation, the resource class of $$OCCAN will be specified. Ensure
       that line 00920001 reads as follows in source member KOCARACF:
NOTE: The RACF exit program must be specified with the MODULE=KOCARACF
           parameter in the KOCSECUR member of SYS3.OMEGAMON.qualifier.RKC2DATA.
•     (ZOMG0070: CAT II) The IAO will ensure that OMEGAMON external security exits are
      installed in accordance with STIG requirements.
(2)    A new class is added to the RACF Class Descriptor Table and the RACF Router Table for
       classname $$OCCAN. The following is a sample for the class entry:
           ICHERCDE CLASS=$$OCCAN,
                     ID=nnn,
                     MAXLNTH=8,
                     FIRST=ALPHANUM,
                     OTHER=ANY,
                     POSIT=nnn,
                     DFTUACC=NONE
           ICHRFRTB CLASS=$$OCCAN,
                     ACTION=RACF
(3)    Define the following resource profiles to the $$OCCAN class to prevent unauthorized
       access to OMEGAMON:
•     (ZOMG0070: CAT II) The IAO will ensure that OMEGAMON external security exits are
      installed in accordance with STIG requirements.
                                                                                                     131
                                         UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                             DISA Field Security Operations
21 January 2005                                                               Developed by DISA for the DOD
(4)    Restrict access to authorized system-level support personnel only (e.g., systems
       programming and operations). For example:
NOTE: The levels of access that are provided for the command structure are progressively
           restrictive. INITIAL0 access is the least restrictive and is the access authority that is
           provided to the majority of OMEGAMON II product users. INITIAL3 is the most
           restrictive and is assigned to the sensitive commands. The INITIAL rule allows a user
           to enter a password to switch levels. This mechanism is not to be used in the DOD
           environment and is not granted to any user. The IAO is responsible for the assignment
           and administration of the access levels.
(5)    The INITIAL3 rule controls access to all of the sensitive commands. As such it is
       restricted only to systems programmers.
(6)    Optionally, a site can use RACF controls to protect commands to the individual level rather
       than the security levels. This is accomplished by specifying the command as externally
       validated and writing a rule to allow access to the command. Refer to the vendor
       documentation for additional information.
(7)    OMEGAMON II for CICS does not use SAF to restrict access authorization to the
       OMEGAMON II for CICS APPLIDs. However, sites using CL/SUPERSESSION can
       control access to VTAM APPLIDs. In accordance with Section 6.2, CL/SUPERSESSION,
       use dynamic application lists to ensure that the ACP arbitrates access to all applications.
       Sites using CL/SUPERSESSION will define the APPLID(s) of AxxCOP01 and AxxCOP02
       to the APPL resource class. Restrict access to authorized system-level support personnel
       only (e.g., systems programming and operations). For example:
(8)    Configure and install the security table, KOCSECUR, to specify EXTERNAL=NO for all
       Level 3 commands, to change the three vendor supplied-level passwords, and to specify the
       KOCARACF security module. Run job KOCSECJB to install the security table.
132
                                           UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                            DISA Field Security Operations
21 January 2005                                                              Developed by DISA for the DOD
•     (ZOMG0050: CAT II) The systems programmer/IAO will ensure that OMEGAMON
      APPLIDs are configured and protected in accordance with STIG requirements.
•     (ZOMG0060: CAT II) The systems programmer/IAO will ensure that OMEGAMON
      products are configured in accordance with STIG requirements.
•     (ZOMG0080: CAT II) The systems programmer/IAO will ensure that OMEGAMON
      resources are protected in accordance with STIG requirements.
This section provides the guidance on what values and controls should be in regard to product
security. Please refer to the installation instructions from the supporting software organization or
to the vendor documentation on the detailed procedures for implementation. The following
sub-sections outline the use of the different controls necessary when using TOP SECRET as the
ACP for this OMEGAMON II software monitoring product.
The following is information related to setting up product-level security for OMEGAMON II for
CICS:
(1)    During final product configuration (CICAT), specify TOP SECRET CUA Interface
       Security. As a result of this, configure member KLVINNAM in
       SYS3.OMEGAMON.qualifier.RKC2PARM to read as follows:
(2)    Protect all OMEGAMON data sets using TOP SECRET. Limit access to these files to the
       OMEGAMON started tasks and the systems programmers responsible for the product.
       Refer to Section 12.2.6.1.2, APF Authorization, for information regarding security controls
       for APF-authorized data sets. This should be done by performing the following:
(c) Permit the OMEGAMON profile read access to all OMEGAMON loadlibs:
                                                                                                       133
                                          UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                      DISA Field Security Operations
21 January 2005                                                        Developed by DISA for the DOD
(3)    Create the STC ACIDs KC2PROC and KOCCI with a non-expiring password, sourced to
       the internal reader, and a Master Facility. The MASTFAC matches the name of the STC
       ACID. For example:
(4) Add the OMEGAMON profile to the STC ACIDs KC2PROC and KOCCI. For example:
(5)    Add the STCs KC2PROC and KOCCI to the Started Task Table specifying the associated
       matching ACID. For example:
(6)    Ensure that KC2PROC and KOCCI are defined as Facilities to TOP SECRET in the
       Facility Matrix Table using the following examples:
           FACILITY(USERxx=NAME=KC2PROC)
           FACILITY(KC2PROC=MODE=FAIL,ACTIVE,SHRPRF)
           FACILITY(KC2PROC=PGM=KLV,NOASUBM,NOABEND,NOXDEF)
           FACILITY(KC2PROC=ID=nn,MULTIUSER,RES,LUMSG,STMSG,WARNPW,
               SIGN(M))
           FACILITY(KC2PROC=NOINSTDATA,NORNDPW,AUTHINIT,NOPROMPT,
               NOAUDIT)
           FACILITY(KC2PROC=NOTSOC,LOG(INIT,SMF,MSG,SEC9))
           FACILITY(USERxx=NAME=KOCCI)
           FACILITY(KOCCI=MODE=FAIL,ACTIVE,SHRPRF)
           FACILITY(KOCCI=PGM=KOB,NOASUBM,NOABEND,NOXDEF)
           FACILITY(KOCCI=ID=nn,MULTIUSER,RES,LUMSG,STMSG,WARNPW,
               SIGN(M))
           FACILITY(KOCCI=NOINSTDATA,NORNDPW,AUTHINIT,NOPROMPT,
               NOAUDIT)
           FACILITY(KOCCI=NOTSOC,LOG(INIT,SMF,MSG,SEC9))
134
                                           UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                           DISA Field Security Operations
21 January 2005                                                             Developed by DISA for the DOD
       Each user that requires access to the OMEGAMON II for CICS product is given access to
       the appropriate Facilities.
(7)    Ensure that the vendor-provided KLVTSNEV exit program is being used. If modifications
       to this program are necessary, submit a request to DISA FSO for an integrity review prior
       to implementation.
The following is information relating to setting up command and access controls for
OMEGAMON II for CICS:
(1)    To implement External Security validation for OMEGAMON command levels, update the
       Resource Definition Table adding a class name of KOCCANDL:
(2)    Ensure that the TOP SECRET exit program is installed properly to provide for
       command-level security. During the installation, the resource class of KOCCANDL will
       be specified. Ensure that line 00670000 reads as follows in source member KOCATOPS:
NOTE: The TOP SECRET exit program must be specified with the MODULE=KOCATOPS
           parameter in the KOCSECUR member of SYS3.OMEGAMON.qualifier.RKC2DATA.
•     (ZOMG0070: CAT II) The IAO will ensure that OMEGAMON external security exits are
      installed in accordance with STIG requirements.
(3)    Assign ownership of the following OMEGAMON resource specifying the appropriate
       department ACID and KOCCANDL resource class. For example:
(4)    Restrict access to authorized system-level support personnel only (e.g., systems
       programming and operations). For example:
NOTE: The levels of access that are provided for the command structure are progressively
           restrictive. INITIAL0 access is the least restrictive and is the access authority that is
           provided to the majority of OMEGAMON II product users. INITIAL3 is the most
           restrictive and is assigned to the sensitive commands. The INITIAL rule allows a user
           to enter a password to switch levels. This mechanism is not to be used in the DOD
           environment and is not granted to any user. The IAO is responsible for the assignment
           and administration of the access levels.
(5)    The INITIAL3 rule controls access to all of the sensitive commands. As such it is
       restricted only to systems programmers.
(6)    Optionally, a site can use TOP SECRET controls to protect commands to the individual
       level rather than the security levels. This is accomplished by specifying the command as
       externally validated and writing a rule to allow access to the command. Refer to the
       vendor documentation for additional information.
(7)    OMEGAMON II for CICS does not use SAF to restrict access authorization to the
       OMEGAMON II for CICS APPLIDs. However, sites using CL/SUPERSESSION can
       control access to VTAM APPLIDs. In accordance with Section 6.2, CL/SUPERSESSION,
       use dynamic application lists to ensure that the ACP arbitrates access to all applications.
       Sites using CL/SUPERSESSION will define the APPLID(s) of AxxCOP01 and AxxCOP02
       to the KLS resource class. Restrict access to authorized system-level support personnel
       only (e.g., systems programming and operations). For example:
(8)    Configure and install the security table, KOCSECUR, to specify EXTERNAL=NO for all
       Level 3 commands, to change the three vendor supplied-level passwords, and to specify the
       KOCATOPS security module. Run job KOCSECJB to install the security table.
•     (ZOMG0050: CAT II) The systems programmer/IAO will ensure that OMEGAMON
      APPLIDs are configured and protected in accordance with STIG requirements.
•     (ZOMG0060: CAT II) The systems programmer/IAO will ensure that OMEGAMON
      products are configured in accordance with STIG requirements.
•     (ZOMG0080: CAT II) The systems programmer/IAO will ensure that OMEGAMON
      resources are protected in accordance with STIG requirements.
•     (ZOMGT090: CAT II) The systems programmer/IAO will ensure that OMEGAMON
      facilities are defined in accordance with STIG requirements.
136
                                           UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                            DISA Field Security Operations
21 January 2005                                                              Developed by DISA for the DOD
OMEGAMON II for DB2 is a comprehensive performance monitor product for the IBM DB2
database product. Its real-time monitor alerts the user to DB2 response time degradation and
overall system problems. This product has the capability of interfacing with the installed ACP or
using internal security. The DOD standard is to use external security for controlling access.
OMEGAMON II has many commands that are used to inquire and optionally make changes to
system parameters and values. The product allows each command to have a security level
assigned to it, ranging from 0 to 3. Users are then assigned a security level within their profile
that allows them to issue commands assigned to their level and lower. As an example, a user
with Level 2 can execute commands secured at Levels 0, 1, or 2. Level 3 provides the highest
degree of protection for sensitive commands. A setting of 0 means that any user can access the
command. Access to Level 3 should be strictly controlled and only granted to authorized
systems personnel.
The following authorized commands are installed with a security level of 3 by default from the
vendor, and are to remain as Level 3 commands:
The ACP determines which security level is associated with a user. Please refer to the following
ACP-specific sections for the details on how this is controlled.
NOTE: During the installation of the product, Candle internal security assigns default
             passwords to the various security levels. This password can be entered in response to
             a /PWD command entered by the user to change the security level. Even though the
             STIG requirement does not allow users to change their security levels via these
             passwords, each site is required to change their passwords from the defaults.
                                                                                                       137
                                           UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                           DISA Field Security Operations
21 January 2005                                                             Developed by DISA for the DOD
Several OMEGAMON II for DB2 data sets require APF authorization. These data sets include
the following:
       SYS2.OMEGAMON.RKANMOD
       SYS2.OMEGAMON.RKANMODI
       SYS2.OMEGAMON.RKANMODL
Each of these libraries requires explicit protection. Read access should be restricted to the
OMEGAMON started tasks. Restrict access greater than read to only the systems programming
personnel responsible for product installation/maintenance. Refer to Section 2.1.2.1, Authorized
Program Facility (APF), for additional information.
12.2.8.2 ACF2
This section provides the guidance on what values and controls should be in place for product
security. Please refer to the installation instructions from the supporting software organization,
or to the vendor documentation on the detailed procedures for implementation. The following
sub-sections outline the use of the different controls necessary when using ACF2 as the ACP for
this OMEGAMON II software monitoring product.
The following is information related to setting up product-level security for OMEGAMON II for
DB2:
(1)    During final product configuration (CICAT), specify ACF2 CUA Interface Security. As a
       result of this, configure member KD2INNAM in
       SYS3.OMEGAMON.qualifier.RKD2PAR to read as follows:
           DEFAULT DSNAME(SYS3.OMEGAMON.qualifier.RKD2NAM)
             EXIT=KD2A2NEV NORACF NODB
(2)    Ensure that the vendor-provided KD2A2NEV exit program is being used. If modifications
       to this program are necessary, submit a request to DISA FSO for an integrity review prior
       to implementation.
•     (ZOMG0070: CAT II) The IAO will ensure that OMEGAMON external security exits are
      installed in accordance with STIG requirements.
(3)    Protect all OMEGAMON II for DB2 data sets (e.g., SYS2.OMEGAMON,
       SYS3.OMEGAMON) using ACF2. Limit access to these files to the OMEGAMON
       started tasks and the systems programming personnel responsible for installation and
       maintenance of the product. Refer to Section 12.2.6.1.2, APF Authorization, for
       information regarding security controls for APF-authorized data sets.
138
                                         UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                         DISA Field Security Operations
21 January 2005                                                           Developed by DISA for the DOD
The following is information relating to setting up command and access controls for
OMEGAMON II for DB2:
(1)    Ensure the resource type is defined as ODS. This is accomplished in the actual
       KO2ACF2X source module. Line 07600000 should be changed to read as follows:
A#ACFCLS DC CL4’RODS’
       Run job KO2ACF2A to assemble and link the exit. This resource type will also be defined
       to the ACF2 INFODIR GSO record.
NOTE: The ACF2 exit program must be specified with the MODULE=KO2ACF2X parameter
           in the KO2SUPDI member of SYS3.OMEGAMON.qualifier.RKD2SAM.
•     (ZOMG0070: CAT II) The IAO will ensure that OMEGAMON external security exits are
      installed in accordance with STIG requirements.
(2)    Define the following resource rules to prevent unauthorized access to OMEGAMON.
       Restrict access to authorized system-level support personnel only (e.g., systems
       programming, operations, and database administration). For example:
           $KEY(INITIAL) TYPE(ODS)
           UID(-) PREVENT
           $KEY(INITIAL0) TYPE(ODS)
           UID(-) PREVENT
           UID(sys-level-support-grp-0) ALLOW
           $KEY(INITIAL1) TYPE(ODS)
           UID(-) PREVENT
           UID(sys-level-support-grp-1) ALLOW
           $KEY(INITIAL2) TYPE(ODS)
           UID(-) PREVENT
           UID(sys-level-support-grp-2) ALLOW
           $KEY(INITIAL3) TYPE(ODS)
           UID(-) PREVENT
           UID(sys-prog-grp) ALLOW
                                                                                                    139
                                        UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                             DISA Field Security Operations
21 January 2005                                                               Developed by DISA for the DOD
NOTE: The levels of access that are provided for the command structure are progressively
           restrictive. INITIAL0 access is the least restrictive and is the access authority that is
           provided to the majority of OMEGAMON II product users. INITIAL3 is the most
           restrictive and is assigned to the sensitive commands. The INITIAL rule allows a user
           to enter a password to switch levels. This mechanism is not to be used in the DOD
           environment and is not granted to any user. The IAO is responsible for the assignment
           and administration of the access levels.
(3)    The INITIAL3 rule controls access to all of the sensitive commands. As such, restrict it to
       only systems programmers.
(4)    Optionally, a site may use ACF2 controls to protect commands to the individual level
       rather than to the security level. This is done by specifying the command as externally
       validated and writing a rule to allow access to the command. Refer to the vendor
       documentation for additional information.
(5)    OMEGAMON II for DB2 does not use SAF to restrict access authorization to the
       OMEGAMON II for DB2 APPLIDs. However, sites using CL/SUPERSESSION can
       control access to VTAM APPLIDs. In accordance with Section 6.2, CL/SUPERSESSION,
       use dynamic application lists to ensure that the ACP arbitrates access to all applications.
       Sites using CL/SUPERSESSION will define the APPLID(s) of AxxD2P01 and AxxODP01
       to the APL resource type. Restrict access to authorized system-level support personnel
       only (e.g., systems programming, operations, and database administration). For example:
           $KEY(AxxD2P01) TYPE(APL)
           UID(-) PREVENT
           UID(sys-prog-grp) ALLOW
           $KEY(AxxODP01) TYPE(APL)
           UID(-) PREVENT
           UID(sys-prog-grp) ALLOW
(6)    Configure and install the security table, KO2SUPDI, to specify EXTERNAL=NO for all
       Level 3 commands, to change the three vendor supplied-level passwords, and to specify the
       KO2ACF2X security module. Run job KO2SUPD to install the security table.
•     (ZOMG0050: CAT II) The systems programmer/IAO will ensure that OMEGAMON
      APPLIDs are configured and protected in accordance with STIG requirements.
•     (ZOMG0060: CAT II) The systems programmer/IAO will ensure that OMEGAMON
      products are configured in accordance with STIG requirements.
•     (ZOMG0080: CAT II) The systems programmer/IAO will ensure that OMEGAMON
      resources are protected in accordance with STIG requirements.
140
                                           UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                           DISA Field Security Operations
21 January 2005                                                             Developed by DISA for the DOD
12.2.8.3 RACF
This section provides the guidance on what values and controls should be in place for product
security. Please refer to the installation instructions from the supporting software organization,
or to the vendor documentation on the detailed procedures for implementation. The following
sub-sections outline the use of the different controls necessary when using RACF as the ACP for
this OMEGAMON II software monitoring product.
The following is information related to setting up product-level security for OMEGAMON II for
DB2:
(1)    During final product configuration (CICAT), specify RACF CUA Interface Security. As a
       result of this, configure member KD2INNAM in
       SYS3.OMEGAMON.qualifier.RKD2PAR to read as follows:
             DEFAULT DSNAME(SYS3.OMEGAMON.qualifier.RKD2NAM)
               RACF NODB
(2)    Protect all OMEGAMON data sets using RACF. Limit access to these files to the
       OMEGAMON started tasks and the systems programmers responsible for the product.
       Refer to Section 12.2.6.1.2, APF Authorization, for information regarding security controls
       for APF-authorized data sets.
(a) The STC userids O2CI and D2CUA are defined as PROTECTED userids.
       (b)    The userids O2CI and D2CUA are connected to a group for the OMEGACENTER
              started tasks.
       (c)    The O2CI and D2CUA STCs have matching profiles defined to the STARTED class
              with no special attributes. For example:
The following is information relating to setting up command and access controls for
OMEGAMON II for DB2.
(1)    Ensure that the RACF exit program is installed properly to provide for command-level
       security. During the installation, the resource class of $$ODCAN will be specified.
       Ensure that line 00920001 reads as follows in source member KO2RACFX:
                                                                                                      141
                                          UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                           DISA Field Security Operations
21 January 2005                                                             Developed by DISA for the DOD
NOTE: The RACF exit program must be specified with the MODULE=KO2RACFX parameter
           in the KO2SUPDI member of SYS3.OMEGAMON.qualifier.RKD2SAM.
(2)    A new class is added to the RACF Class Descriptor Table and the RACF Router Table for
       classname $$ODCAN. The following is a sample for the class entry:
           ICHERCDE CLASS=$$ODCAN,
                     ID=nnn,
                     MAXLNTH=8,
                     FIRST=ALPHANUM,
                     OTHER=ANY,
                     POSIT=nnn,
                     DFTUACC=NONE
           ICHRFRTB CLASS=$$ODCAN,
                     ACTION=RACF
•     (ZOMG0070: CAT II) The IAO will ensure that OMEGAMON external security exits are
      installed in accordance with STIG requirements.
(3)    Define the following resource profiles to the $$ODCAN class to prevent unauthorized
       access to OMEGAMON:
(4)    Restrict access to authorized system-level support personnel only (e.g., systems
       programming, operations, and database administration). For example:
142
                                          UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                             DISA Field Security Operations
21 January 2005                                                               Developed by DISA for the DOD
NOTE: The levels of access that are provided for the command structure are progressively
           restrictive. INITIAL0 access is the least restrictive and is the access authority that is
           provided to the majority of OMEGAMON II product users. INITIAL3 is the most
           restrictive and is assigned to the sensitive commands. The INITIAL rule allows a user
           to enter a password to switch levels. This mechanism is not to be used in the DOD
           environment and is not granted to any user. The IAO is responsible for the assignment
           and administration of the access levels.
(5)    The INITIAL3 rule controls access to all of the sensitive commands. As such, restrict it to
       only systems programmers.
(6)    Optionally, a site may use RACF controls to protect commands to the individual level
       rather than the security levels. This is done by specifying the command as externally
       validated and writing a rule to allow access to the command. Refer to the vendor
       documentation for additional information.
(7)    OMEGAMON II for DB2 does not use SAF to restrict access authorization to the
       OMEGAMON II for DB2 APPLIDs. However, sites using CL/SUPERSESSION can
       control access to VTAM APPLIDs. In accordance with Section 6.2, CL/SUPERSESSION,
       use dynamic application lists to ensure that the ACP arbitrates access to all applications.
       Sites using CL/SUPERSESSION will define the APPLID(s) of AxxD2P01 and AxxODP01
       to the APPL resource class. Restrict access to authorized system-level support personnel
       only (e.g., systems programming, operations, and database administration). For example:
(8)    Configure and install the security table, KO2SUPDI, to specify EXTERNAL=NO for all
       Level 3 commands, to change the three vendor supplied-level passwords, and to specify the
       KO2RACFX security module. Run job KO2SUPD to install the security table.
•     (ZOMG0050: CAT II) The systems programmer/IAO will ensure that OMEGAMON
      APPLIDs are configured and protected in accordance with STIG requirements.
•     (ZOMG0060: CAT II) The systems programmer/IAO will ensure that OMEGAMON
      products are configured in accordance with STIG requirements.
•     (ZOMG0080: CAT II) The systems programmer/IAO will ensure that OMEGAMON
      resources are protected in accordance with STIG requirements.
                                                                                                        143
                                           UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                           DISA Field Security Operations
21 January 2005                                                             Developed by DISA for the DOD
This section provides the guidance on what values and controls should be in place for product
security. Please refer to the installation instructions from the supporting software organization,
or to the vendor documentation on the detailed procedures for implementation. The following
sub-sections outline the use of the different controls necessary when using TOP SECRET as the
ACP for this OMEGAMON II software monitoring product.
The following is information related to setting up product-level security for OMEGAMON II for
DB2:
(1)    During final product configuration (CICAT), specify TOP SECRET CUA Interface
       Security. As a result of this, configure member KD2INNAM in
       SYS3.OMEGAMON.qualifier.RKD2PAR to read as follows:
             DEFAULT DSNAME(SYS3.OMEGAMON.qualifier.RKD2NAM)
               EXIT=KD2TSNEV RACF NODB
(2)    Protect all OMEGAMON data sets using TOP SECRET. Limit access to these files to the
       OMEGAMON started tasks and the systems programmers responsible for the product.
       Refer to Section 12.2.6.1.2, APF Authorization, for information regarding security controls
       for APF-authorized data sets. This should be done by performing the following:
(c) Permit the OMEGAMON profile read access to all OMEGAMON loadlibs:
(3)    Create the STC ACIDs D2CUA and O2CI with a non-expiring password, sourced to the
       internal reader, and a Master Facility. The MASTFAC matches the name of the STC
       ACID. For example:
(4) Add the OMEGAMON profile to the STC ACIDs D2CUA and O2CI. For example:
(5)    Add the STCs D2CUA and O2CI to the Started Task Table specifying the associated
       matching ACID. For example:
(6)    Ensure that D2CUA and O2CI are defined as Facilities to TOP SECRET in the Facility
       Matrix Table using the following examples:
           FACILITY(USERxx=NAME=D2CUA)
           FACILITY(D2CUA=MODE=FAIL,ACTIVE,SHRPRF)
           FACILITY(D2CUA=PGM=VTP,NOASUBM,NOABEND,NOXDEF)
           FACILITY(D2CUA=ID=nn,MULTIUSER,RES,LUMSG,STMSG,WARNPW,
             SIGN(M))
           FACILITY(D2CUA=NOINSTDATA,NORNDPW,AUTHINIT,NOPROMPT,
             NOAUDIT)
           FACILITY(D2CUA=NOTSOC,LOG(INIT,SMF,MSG,SEC9))
           FACILITY(USERxx=NAME=O2CI)
           FACILITY(O2CI=MODE=FAIL,ACTIVE,SHRPRF)
           FACILITY(O2CI=PGM=KLV,NOASUBM,NOABEND,NOXDEF)
           FACILITY(O2CI=ID=nn,MULTIUSER,RES,LUMSG,STMSG,WARNPW,
             SIGN(M))
           FACILITY(O2CI=NOINSTDATA,NORNDPW,AUTHINIT,NOPROMPT,
             NOAUDIT)
           FACILITY(O2CI=NOTSOC,LOG(INIT,SMF,MSG,SEC9))
       Each user that requires access to the OMEGAMON II for DB2 product is given access to
       the appropriate Facilities.
(7)    Ensure that the vendor-provided KD2TSNEV exit program is being used. If modifications
       to this program are necessary, submit a request to DISA FSO for an integrity review prior
       to implementation.
•     (ZOMG0070: CAT II) The IAO will ensure that OMEGAMON external security exits are
      installed in accordance with STIG requirements.
                                                                                                    145
                                           UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                           DISA Field Security Operations
21 January 2005                                                             Developed by DISA for the DOD
The following is information relating to setting up command and access controls for
OMEGAMON II for DB2:
(1)    To implement External Security validation for OMEGAMON command levels, update the
       Resource Definition Table adding a class name of KODCANDL:
(2)    Ensure that the TOP SECRET exit program is installed properly to provide for
       command-level security. During the installation, the resource class of KODCANDL will
       be specified. Ensure that line 00670000 reads as follows in source member KO2RACFX:
NOTE: The TOP SECRET exit program must be specified with the MODULE=KO2RACFX
           parameter in the KO2SUPDI member of SYS3.OMEGAMON.qualifier.RKD2SAM.
•     (ZOMG0070: CAT II) The IAO will ensure that OMEGAMON external security exits are
      installed in accordance with STIG requirements.
(3)    Assign ownership of the following OMEGAMON resource specifying the appropriate
       department ACID and KODCANDL resource class. For example:
(4)    Restrict access to authorized system-level support personnel only (e.g., systems
       programming, operations, and database administration). For example:
146
                                          UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                             DISA Field Security Operations
21 January 2005                                                               Developed by DISA for the DOD
NOTE: The levels of access that are provided for the command structure are progressively
           restrictive. INITIAL0 access is the least restrictive and is the access authority that is
           provided to the majority of OMEGAMON II product users. INITIAL3 is the most
           restrictive and is assigned to the sensitive commands. The INITIAL rule allows a user
           to enter a password to switch levels. This mechanism is not to be used in the DOD
           environment and is not granted to any user. The IAO is responsible for the assignment
           and administration of the access levels.
(5)    The INITIAL3 rule controls access to all of the sensitive commands. As such, restrict it to
       only systems programmers.
(6)    Optionally, a site may use TOP SECRET controls to protect commands to the individual
       level rather than to the security level. This is done by specifying the command as
       externally validated and writing a rule to allow access to the command. Refer to the
       vendor documentation for additional information.
(7)    OMEGAMON II for DB2 does not use SAF to restrict access authorization to the
       OMEGAMON II for DB2 APPLIDs. However, sites using CL/SUPERSESSION can
       control access to VTAM APPLIDs. In accordance with Section 6.2, CL/SUPERSESSION,
       use dynamic application lists to ensure that the ACP arbitrates access to all applications.
       Sites using CL/SUPERSESSION will define the APPLID(s) of AxxD2P01 and AxxODP01
       to the KLS resource class. Restrict access to authorized system-level support personnel
       only (e.g., systems programming, operations, and database administration). For example:
(8)    Configure and install the security table, KO2SUPDI, to specify EXTERNAL=NO for all
       Level 3 commands, to change the three vendor supplied-level passwords, and to specify the
       KO2RACFX security module. Run job KO2SUPD to install the security table.
•     (ZOMG0050: CAT II) The systems programmer/IAO will ensure that OMEGAMON
      APPLIDs are configured and protected in accordance with STIG requirements.
•     (ZOMG0060: CAT II) The systems programmer/IAO will ensure that OMEGAMON
      products are configured in accordance with STIG requirements.
•     (ZOMG0080: CAT II) The systems programmer/IAO will ensure that OMEGAMON
      resources are protected in accordance with STIG requirements.
•     (ZOMGT090: CAT II) The systems programmer/IAO will ensure that OMEGAMON
      facilities are defined in accordance with STIG requirements.
                                                                                                        147
                                           UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                                DISA Field Security Operations
21 January 2005                                                                  Developed by DISA for the DOD
Spool access software products allow users to display, modify, and control JES activities relative
to input, execution, and output queues, and to initiators and output devices. Spool data may be
viewed and processed as needed. Some products provide the ability to monitor the system log
and to issue system commands.
Consideration is given to securing the data sets that contain the spool access software products.
Restrict access to these data sets only to authorized personnel.
Interactive execution of the spool access software products are available under the appropriate
TMP. Prohibit access to these on-line applications from general use. Only grant access to
authorized personnel.
Spool access software products provide powerful features that are required to be properly
controlled. Review of all commands, options, and functions for potential data or system integrity
problems, or for possible security exposures. For example, access to JES initiators or printers is
not permitted to the general user community, access is only granted to authorized personnel.
Consideration should also be given to limiting the scope of access to data. Since spool access
software products monitor all JES activities and access the entire JES spool, the potential exists
for users to view restricted information from other tasks.
Depending on the product, control access authority by using one of the following three methods:
Use ACP controls whenever possible. Review all ACP resource interfaces for potential security
exposures and for possible implementation. However, it may not be possible to provide a totally
secure environment using only ACP controls. In this case, the use of internal security may be
warranted and should be investigated for possible use. If it is determined that an enhanced level
of protection is gained that the ACP does not provide, the internal security may be activated. It
is important to remember that base-level ACP controls are never to be compromised. If the
product is not compatible with ACP controls, access authority provided by the product's internal
security, is carefully reviewed for possible security risks.
(1)       Control access to the software product's data sets, and restrict access only to authorized
          personnel.
148
                                              UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                                 DISA Field Security Operations
21 January 2005                                                                   Developed by DISA for the DOD
(2)       Strictly control access to the on-line applications, and restrict access only to authorized
          personnel.
(3)       Rigidly control access to the use of commands, options, and functions within the products.
          Restrict access to that which is necessary for a user to accomplish that user's assigned
          responsibilities.
(4)       Review product interfaces for potential security exposures. Document any potential
          security exposures. Notify DISA FSO and the vendor.
(5)       Evaluate spool access software product internal security for possible use, providing it does
          not replace or compromise existing ACP security controls.
IBM’s System Display and Search Facility (SDSF) is a software product that allows you to
monitor, manage, and control OS/390 and z/OS MVS/JES2 systems in a sysplex from a single
interface. Through a series of interactive panels, SDSF provides the ability to:
The information in this article is based on Version 2, Release 10 of OS/390 unless otherwise
noted.
      -    Distribution data sets hold the master copy of the product elements. There is no typical
           need for general users to access these data sets. The standard naming convention for
           these data sets is to use the prefix SYS1.ISF.AISF*.
      -    Target data sets hold the execution copy of the product elements. General users are likely
           to need read access to some of these data sets. The standard naming convention for these
           data sets is to use the prefix SYS1.ISF.SISF*.
•     (ZISF0005: CAT II) The IAO will restrict all update and alter access to SDSF product data
      sets to systems programming personnel.
                                                                                                            149
                                              UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                         DISA Field Security Operations
21 January 2005                                                           Developed by DISA for the DOD
ISFPARMS defines global options, panel formats, and security for SDSF. ISFPARMS can be
defined using assembler macros or statements. Statements provide several enhancements
compared to assembler macros. Statements are easier to define and are more dynamic when
implementing modifications. Several new SDSF functions are not supported with assembler
macros.
•     (ZISF0010: CAT II) The systems programmer responsible for supporting SDSF will use the
      ISFPARMS statement method exclusively to configure SDSF.
Even when ISFPARMS statements are used exclusively, the ISFPMAC macro must be used to
identify the default SDSF server when invoking SDSF. For example:
ISFPMAC SERVER=server
The ISFPMAC macro has several other parameters that support the global initialization
configuration of SDSF. These parameters will not be coded using the ISFPMAC macro.
Instead, the OPTIONS statement will be coded to specify the global initialization parameters.
•     (ZISF0020: CAT II) The systems programmer responsible for supporting SDSF will use the
      OPTIONS statement to configure the global initialization parameters.
SDSF reverts from ISFPARMS statement format to ISFPARMS macro format when the SDSF
server is unavailable or when ISFPARMS statements are missing. If these situations occur,
recovery of normal operations may require access to SDSF using the macro format. For this
reason, ISFPARMS macro format may be use to define a recovery group indicating specific
individuals responsible for restoring normal system operations.
•     (ZISF0030: CAT II) The systems programmer responsible for supporting SDSF will use the
      ISFPARMS macro format using the ISFGRP macro to define a specific recovery group used
      for restoring normal system operations.
•     (ZISF0040: CAT II) The systems programmer responsible for supporting SDSF will define
      individual members from the systems programming group to the SDSF recovery group.
•     (ZISF0050: CAT II) The systems programmer responsible for supporting SDSF will ensure
      that any IBM default groups defined using the ISFPARMS macro format are removed.
The SAF interface is an alternative to using ISFPARMS to provide security for SDSF. The use
of the SAF interface is consistent with the DOD requirement to control all products within the
operating system using the ACP.
• (ZISF0060: CAT II) The IAO will use SAF security to protect SDSF and its resources.
150
                                         UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                            DISA Field Security Operations
21 January 2005                                                              Developed by DISA for the DOD
SDSF may revert to ISFPARMS security if SAF returns an indeterminate result and cannot make
a security decision. In a RACF environment, this can occur when a resource class is inactive or
no profiles are defined to a resource class. To ensure SAF security is always in effect, the ACP
must be configured to actively support the required SAF resource classes.
•   (ZISF0070: CAT II) The IAO will configure the ACP to actively support the SDSF, WRITER,
    JESSPOOL, and OPERCMDS resource classes.
Installation exit routines can be written for the set of exit points provided by SDSF. These
routines can supplement the authorizations established with ISFPARMS and the SAF security
interface. These programs allow for customized authorization processing and return to SDSF
their authorization decisions.
Implementation of any of the installation exit routines is subject to the requirements for exits as
specified in Section 2.1.2, Software Integrity, and Section 2.1.2.6, OS/390 and Other Product
Exits. As of the publication of this document, DISA FSO has not approved the use of any SDSF
installation exit routines.
•   (ZISF0080: CAT II) The systems programmer responsible for supporting SDSF will ensure
    that installation exit routines are reviewed, approved, and implemented in accordance with
    STIG required policy.
The ISPPARMS OPTIONS statement specifies the global initialization parameters for SDSF.
Three of these parameters have security considerations and are discussed in this section.
Specifying ATHOPEN (YES) makes SDSF a ‘trusted’ STC in regards to data set access and as
such it is able to access any data set on the system. This privilege is required primarily to allow
SDSF to access JES2 spool data sets when SAF protection is enabled for the JES2 spool.
Protection of JES2 spool data is a STIG requirement. Information on securing the JESSPOOL
class resources is discussed in Section 5.1.4, Security Controls for JES2 SPOOL Data Sets.
NOTE: Beginning with z/OS V1R2 JES2 environments, SDSF does not allocate the JES2 spool
           volumes. Therefore the ATHOPEN parameter in ISFPARMS is obsolete with z/OS
           V1R2 and above.
                                                                                                       151
                                          UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                             DISA Field Security Operations
21 January 2005                                                               Developed by DISA for the DOD
The HASPINDX data set is used by SDSF when building the SYSLOG panel. This data set
contains information related to all SYSLOG jobs and data sets on the spool. Since SDSF
dynamically allocates this data set, explicit user access authorization to this data set should not
be required. Due to the potentially sensitive data in this data set, access authorization will be
restricted.
•     (ZISF0090: CAT II) The IAO will restrict all access to the HASPINDX data set specified on
      the INDEX parameter to systems programming personnel.
NOTE:         Users may allocate individual HASPINDX data sets in their TSO logon procedures.
              This requirement pertains to the system-wide HASPINDX data set only. It does not
              pertain to individual HASPINDX data sets.
The ISFPARMS GROUP statement defines user groups and their characteristics. Some of these
characteristics include access authorization to SDSF functions and commands. Access to these
functions and commands can be controlled alternatively using SAF resources. The use of the
SAF interface is consistent with the DOD requirement to control all products within the
operating system using the ACP. To ensure SAF security is always in effect, authorizations to
SDSF functions and commands should not be defined in ISFPARMS.
•     (ZISF0100: CAT II) The systems programmer responsible for supporting SDSF will not
      specify any Group Function Parameters supported by SAF-equivalent resources on GROUP
      statements defined in ISFPARMS. These Group Function Parameters include AUTH,
      CMDAUTH, CMDLEV, and DSPAUTH.
The SDSF server is an address space that SDSF uses to process ISFPARMS statements and
provides the ability to view sysplex data on various panels. The input to the SDSF server is the
ISFPARMS statements. By default, SDSF uses SYS1.PARMLIB member ISFPRMxx as input
to read the ISFPARMS statements. The SDSFPARM DD statement may be used to specify an
alternative location for ISFPARMS statements. Explicit JCL specifications ensure expected
operations, reduce ambiguity, and are self-documenting.
•     (ZISF0110: CAT II) The systems programmer responsible for supporting SDSF will use
      SYS1.PARMLIB member ISFPRMxx as input to the ISFPARMS statements for the SDSF
      server.
•     (ZISF0120: CAT II) The systems programmer responsible for supporting SDSF will specify
      SYS1.PARMLIB on the SDSFPARM DD statement in the SDSF procedure.
152
                                          UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                              DISA Field Security Operations
21 January 2005                                                                Developed by DISA for the DOD
SAF can be used to control the following SDSF resources and functions. Each of these topics
are addressed in separate sections. As with all general sections in the OS/390 STIG, the
discussion uses RACF-oriented language. Each topic discussed in the general sections are
addressed in an ACP-specific section demonstrating how to meet STIG requirements using ACP
command examples.
An operation performed by an SDSF user often requires access authorization to more than one
resource class and resource name. In order to perform the task, a user must have proper
authority to all of the required resources. For example, to overtype a field in an SDSF panel, a
user must have access to the panel, to the overtypeable field, to the MVS or JES2 command that
is generated, and to the object (e.g., the job, output group, initiator, or printer) being acted upon.
IBM’s OS/390 SDSF Customization and Security Guide and z/OS SDSF Operation and
Customization Guide provide several tables documenting the relationship between SDSF
commands and functions to SAF resources.
In Section 3.1.5.6, OS/390 System Command Controls, and Section 5.1.5, Security Controls for
JES2 Commands, the OS/390 STIG requires the site’s installation SOP to document user access
to system commands in terms of responsibilities and roles. The system-level groups defined in
                                                                                                         153
                                           UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                          DISA Field Security Operations
21 January 2005                                                            Developed by DISA for the DOD
the SOP and the functions they perform are used to document and justify the access requirements
to specific SDSF SAF resources.
The intention of this section is to document the minimum controls required to protect SDSF
resources. It is strongly suggested that IBM’s OS/390 SDSF Customization and Security Guide
or z/OS SDSF Operation and Customization Guide be reviewed prior to implementation of SAF
controls. An implementation of this scale should be tested thoroughly on a test/development
platform before defining the security controls in a production environment.
The ISFPARMS GROUP statement defines user groups and which functions the members of the
groups may perform. Membership in these groups can be controlled using SAF resource names.
The format of the resource is GROUP.group-name.server. For example, the following GROUP
statement defines a group with the name SYSPROG:
Assuming the name of the SDSF server is SDSF, the SAF resource name used to permit access
to this group is GROUP.SYSPROG.SDSF. The number of groups defined in ISFPARMS is site
dependent. However, it is suggested that at least three be defined to provide the necessary
distinction in functionality. These groups are systems programming, operations, and end-user.
The following table lists the SAF resource information relative to the protection of groups
defined by the ISFPARMS GROUP statement:
•     (ZISF0130: CAT II) The IAO will define all groups created using the GROUP statements in
      the ISFPARMS to the ACP with no user access by default.
•     (ZISF0130: CAT II) The IAO will define a generic resource such as GROUP. to the ACP to
      provide the default protection.
•     (ZISF0130: CAT II) The IAO will restrict access to group resources to the appropriate
      personnel according to their role and function. For example, if a SYSPROG group is defined
      with the functions suited for systems programmers, access to the GROUP.SYSPROG.server
      will be restricted to systems programming personnel.
154
                                         UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                          DISA Field Security Operations
21 January 2005                                                            Developed by DISA for the DOD
SDSF panels provide access to JES2 data and operating system resources. While some panels
are suitable for end-users to review their JES2 job activities, many panels are dedicated to
supporting the operating systems and must be restricted to appropriate personnel.
Panels can be categorized as either end-user displays or operator displays. When using SAF
resources to control access to SDSF panels, end-user displays are indicated by DSP as the second
node in the resource name, and operator displays are indicated by ODSP as the second node in
the resource name.
The following table lists the SAF resource information relative to the protection of SDSF panels:
In the table:
    - jesx is the name of the JES2 subsystem
    - system is the name of the MVS system (sysplex support)
NOTE: The ENC, PS, and SP panel commands only apply to z/OS V1R2 and above.
•     (ZISF0140: CAT II) The IAO will define SDSF panel SAF resources to the ACP with no user
      access by default.
•     (ZISF0140: CAT II) The IAO will define generic resources such as ISFCMD.DSP. and
      ISFCMD.ODSP. to the ACP to provide the default protection.
•     (ZISF0140: CAT II) The IAO will restrict all access to SDSF operator display resources to
      operations personnel and systems programming personnel.
•     (ZISF0140: CAT II) The IAO will restrict all access to SDSF end-user display resources to
      authorized SDSF users.
Maintenance commands are used to support the SDSF product. The personnel maintaining
SDSF for the user community may use these commands to aid in problem resolution. The
156
                                           UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                          DISA Field Security Operations
21 January 2005                                                            Developed by DISA for the DOD
following table lists the SAF resource information relative to the protection of SDSF
maintenance commands:
•    (ZISF0150: CAT II) The IAO will define SDSF maintenance command SAF resources to the
     ACP with no user access by default.
•    (ZISF0150: CAT II) The IAO will define a generic resource such as ISFCMD.MAINT. to the
     ACP to provide the default protection.
•    (ZISF0150: CAT II) The IAO will restrict all access to SDSF maintenance command
     resources to systems programming personnel.
Filtering commands are used to control the data displayed on SDSF panels. Some filter
commands are used only for supporting the operating system, and others provide the ability to
display data on a system-wide level. Filter commands can be used to override the configuration
in ISFPARMS.
                                                                                                     157
                                         UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                         DISA Field Security Operations
21 January 2005                                                           Developed by DISA for the DOD
The following table lists the SAF resource information relative to the protection of SDSF
filtering commands:
•     (ZISF0160: CAT II) The IAO will define SDSF filtering command SAF resources to the ACP
      with no user access by default.
•     (ZISF0160: CAT II) The IAO will define a generic resource such as ISFCMD.FILTER. to
      the ACP to provide the default protection.
•     (ZISF0160: CAT II) The IAO will restrict all access to SDSF filter command resources to
      operations personnel and systems programming personnel.
•     (ZISF0160: CAT II) The IAO will restrict all access to the ISFCMD.FILTER.INPUT
      resource to systems programming personnel only.
158
                                         UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                          DISA Field Security Operations
21 January 2005                                                            Developed by DISA for the DOD
The SDSF / command can be used to issue MVS or JES2 commands from the SDSF command
line. Use of the / command must be protected as you would any system console.
While the SDSF control checks the user’s authority to use the / command, it does not check the
user’s authorization to the MVS or JES2 command or the object of the command. MVS and
JES2 command authorization to the OPERCMDS resource class is performed by MVS and JES2
only after SDSF checks the authorization to the / command. Refer to Section 3.1.5.6, OS/390
System Command Controls, and Section 5.1.5, Security Controls for JES2 Commands, for
information on controlling these resources.
The following table lists the SAF resource information relative to the protection of the SDSF /
command:
•    (ZISF0170: CAT II) The IAO will define the SDSF / command SAF resource to the ACP with
     no user access by default.
•    (ZISF0170: CAT II) The IAO will restrict all access to the ISFOPER.SYSTEM resource to
     operations personnel and systems programming personnel.
Action characters are short commands, usually one or two characters that are entered in the NP
column of SDSF panels. Unlike most SDSF commands, action characters are not SAF-protected
as distinct resources. The security controls relative to the use of action characters is with the
object of the action and the MVS or JES2 command generated in response to the action
character. The objects of action characters are resources such as initiators in the SDSF class,
printers and punches in the WRITER class, and jobs, output groups, and SYSIN/SYSOUT data
sets in the JESSPOOL class.
                                                                                                     159
                                         UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                          DISA Field Security Operations
21 January 2005                                                            Developed by DISA for the DOD
For example, if a user enters a C action character on the printer panel to purge output, two SAF
calls are generated. The first SAF call checks that the user has update access to the printer
defined to the WRITER resource class. The second SAF calls check that the user has update
access to the jesx.CANCEL.DEV resource defined to the OPERCMDS resource class. There is
no specific SAF call for the C action character. The user requires the proper access authorization
to both resources to perform the action. Security requirements regarding the objects of actions
are discussed in various sections throughout this chapter. Security requirements regarding the
protection of MVS system commands are discussed in Section 3.1.5.6, OS/390 System Command
Controls. Security requirements regarding the protection of JES2 commands are discussed in
Section 5.1.5, Security Controls for JES2 Commands. Refer to Section 13.2.1.7.8, MVS and
JES2 Commands Generated by SDSF, for additional security requirements regarding end-users
under SDSF.
Most SDSF panels contain data that is modifiable. When the user overtypes the data displayed
in a field on the panel, the field value can be changed permanently. Use of an overtypeable field
causes an interaction with three resources—(1) the overtypeable field; (2) the object of the
overtypeable field, such as an initiator, printer, MAS member, or job, and (3) the MVS or JES2
command generated by overtyping the field.
There are approximately 200 specific SAF resource names available to control access to
overtypeable fields. In general, the use of overtypeable fields results in the modification of a
system-level resource and functions as a shortcut for issuing system commands. As such, access
authorization to most SDSF overtypeable fields should be restricted to the appropriate personnel
responsible for supporting the operating system.
Some SDSF overtypeable fields present on end-user displays can be used to manage job status
and output. With the additional security controls in effect for SDSF resources and JESSPOOL
resource protection enabled, end-users can be allowed access to overtypeable fields that modify
jobs ensuring that these fields are only issued on the appropriate JES2 jobs.
160
                                         UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                          DISA Field Security Operations
21 January 2005                                                            Developed by DISA for the DOD
The following table lists the SAF resource information relative to the protection of the SDSF
overtypeable fields:
                                                                                                     161
                                         UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                   DISA Field Security Operations
21 January 2005                                                     Developed by DISA for the DOD
162
                                       UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                        DISA Field Security Operations
21 January 2005                                                          Developed by DISA for the DOD
•   (ZISF0180: CAT II) The IAO will define SDSF overtypeable field SAF resources to the ACP
    with no user access by default.
•   (ZISF0180: CAT II) The IAO will define a generic resource such as ISFATTR. to the ACP to
    provide the default protection.
•   (ZISF0180: CAT II) The IAO will restrict all access to SDSF overtypeable field resources as
    indicated in the previous table.
While systems programming personnel and operations personnel are routinely permitted access
to system commands and JES2 commands, end-users are restricted to just a handful of display-
type commands. If end-users are allowed to manage their own jobs while under SDSF using
functions such as action characters and overtypeable fields, they must be given access to
additional OPERCMDS resources. With the additional security controls in effect for SDSF
resources and JESSPOOL resource protection enabled, end-users can be allowed access to
operator commands that modify jobs ensuring that these commands are only issued on the
appropriate JES2 jobs. Refer to Section 3.1.5.6, OS/390 System Command Controls, and Section
5.1.5, Security Controls for JES2 Commands, for information on securing MVS and JES2 system
commands respectively.
                                                                                                   163
                                        UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                       DISA Field Security Operations
21 January 2005                                                         Developed by DISA for the DOD
The following table indicates the system command SAF resources appropriate for all authorized
SDSF users and other related security information:
 Table B-27. SYSTEM COMMAND SAF RESOURCES FOR ALL SDSF USERS (13.2.1.7.8)
                   SYSTEM COMMAND SAF RESOURCES FOR ALL SDSF USERS
 RESOURCE                                  REQUIRED
                        RESOURCE NAME                         DESCRIPTION
   CLASS                                    ACCESS
 OPERCMDS           JES2.DISPLAY.BAT      READ         Display (D) action character
 OPERCMDS           JES2.DISPLAY.TSU      READ         on various panels
 OPERCMDS           JES2.DISPLAY.STC      READ
 OPERCMDS           JES2.DISPLAY.DEV      READ
 OPERCMDS           JES2.MSEND.CMD        READ         Various action characters on
                                                       the I and ST panels
 OPERCMDS           JES2.DISPLAY.BATOUT   READ         List (L) output action
 OPERCMDS           JES2.DISPLAY.TSUOUT   READ         character on various end-
 OPERCMDS           JES2.DISPLAY.STCOUT   READ         user panels
 OPERCMDS           MVS.DISPLAY.WLM       READ         Display (D) MAS members
                                                       on SE panel
 OPERCMDS           JES2.MODIFY.BATOUT    UPDATE       Release (A) and Hold (H)
 OPERCMDS           JES2.MODIFY.TSUOUT    UPDATE       action characters on O and
 OPERCMDS           JES2.MODIFY.STCOUT    UPDATE       H panels
                                                                 Numerous overtypeable
                                                                 fields on O and H panels
 OPERCMDS MVS.CANCEL.ATX*                      UPDATE            Cancel (C, CD, P, PP)
 OPERCMDS MVS.CANCEL.TSU                       UPDATE            action characters on DA, I,
                                                                 and ST panels
 OPERCMDS            JES2.CANCEL.BAT           UPDATE            Various Cancel and Purge
 OPERCMDS            JES2.CANCEL.TSU           UPDATE            action characters on various
 OPERCMDS            JES2.CANCEL.STC           UPDATE            end-user panels
 OPERCMDS            JES2.CANCEL.DEV           UPDATE
 OPERCMDS            JES2.RELEASE.BATOUT       UPDATE            Cancel (C), Release (O),
 OPERCMDS            JES2.RELEASE.STCOUT       UPDATE            and Purge (P) action
 OPERCMDS            JES2.RELEASE.TSUOUT       UPDATE            characters and H and ST
                                                                 panels
 OPERCMDS            JES2.RESTART.DEV          UPDATE            Restart (E) action character
 OPERCMDS            JES2.RESTART.BAT          CONTROL           on various panels
 OPERCMDS            JES2.MODIFYHOLD.BAT       UPDATE            Hold (H) action character on
 OPERCMDS            JES2.MODIFYHOLD.STC       UPDATE            DA, I, and ST panels
 OPERCMDS            JES2.MODIFYHOLD.TSU       UPDATE
 OPERCMDS            JES2.ROUTE.JOBOUT         UPDATE            Overtypeable field
                                                                 PRTDEST on I and ST
                                                                 panels
164
                                       UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                          DISA Field Security Operations
21 January 2005                                                            Developed by DISA for the DOD
•    (ACP00270: CAT II) The IAO will ensure that OS/390 Sensitive System Commands are
     defined to the OPERCMDS resource class. Only limited number of authorized people are
     able to issue these commands. All access is logged.
•    (ZJES0052: CAT II) The IAO will ensure that access to JES2 system commands listed in the
     following table are restricted to the appropriate personnel and logged where indicated:
Each JES2 job is associated with a destination. SDSF panel data can be limited to display only
job information specific to a destination. Destination names that are used on the DEST
command and the IDEST parameter of ISFPARMS can be controlled.
In the table:
-       jesx is the name of the JES2 subsystem
-       destname is destination name of the job
•    (ZISF0190: CAT II) The IAO will define SDSF destination name SAF resources to the ACP
     with no user access by default.
•    (ZISF0190: CAT II) The IAO will define generic resources such as ISFOPER.ANYDEST.
     and ISFAUTH.DEST. to the ACP to provide the default protection.
The IAO should permit access to the ISFOPER.ANYDEST.jesx resource to all authorized users
of SDSF.
When the IDEST parameter is specified for groups defined to ISFPARMS, a corresponding SAF
resource rule for that destination (i.e., ISFAUTH.DEST.destname) must be defined and
                                                                                                     165
                                         UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                           DISA Field Security Operations
21 January 2005                                                             Developed by DISA for the DOD
authorized to the users in that group. If this is not done, no jobs can appear on the SDSF panels
for those users.
•     (ZISF0190: CAT II) The IAO will ensure the following items are in effect when permitting
      access to ISFAUTH.DEST.destname resources to end-users:
      -   All ISFAUTH.DEST.destname resources defined to the ACP will be fully qualified and
          not generic.
      -   The IAO will restrict access to the generic resource ISFAUTH.DEST. to operations
          personnel and systems programming personnel.
Access to jobs, output groups, or SYSIN/SYSOUT data sets is typically controlled by the
JESSPOOL resource class. However, authority can be granted to users allowing them to bypass
this JESSPOOL protection and permitting them access to jobs, output groups, or
SYSIN/SYSOUT data sets by destination only. This is called destination operator authority.
To permit destination operator authority to a user, you must first give the user READ authority to
the ISFOPER.DEST.jesx profile in the SDSF resource class. This identifies the user as a
destination operator. Second, you must give the user authorization to the resources in the SDSF
resource class that protects the destination for jobs, output groups, and data sets.
166
                                          UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                           DISA Field Security Operations
21 January 2005                                                             Developed by DISA for the DOD
The following table lists the SAF resource information relative to the protection of destination
operator authority:
In the table:
    - jesx is the name of the JES2 subsystem
    - destname is destination name of the job
    - dsname is name of the data set
•    (ZISF0200: CAT II) The IAO will define SDSF destination operator authority SAF resources
     to the ACP with no user access by default.
•    (ZISF0200: CAT II) The IAO will define generic resources such as ISFOPER.DEST.,
     ISFAUTH.DEST., ISFAUTH.DEST.qualifier., ISFAUTH.DEST.qualifier.DATASET., and .,
     ISFAUTH.DEST.qualifier.DATASET.JCL* to the ACP to provide the default protection.
                                                                                                      167
                                         UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                           DISA Field Security Operations
21 January 2005                                                             Developed by DISA for the DOD
•     (ZISF0200: CAT II) The IAO will restrict destination operator authority (i.e.,
      ISFOPER.DEST.jesx) to operations personnel and systems programming personnel.
•     (ZISF0200: CAT II) The IAO will restrict ALTER access to ISFAUTH.DEST.destname and
      ISFAUTH.DEST.qualifier.qualifier resources to operations personnel and systems
      programming personnel.
There are two types of SYSIN/SYSOUT data sets, Standard and System Message. Standard
SYSIN/SYSOUT data sets include system-generated messages, job input, and job output.
Destination operator authority to Standard SYSIN/SYSOUT data sets is not a typical
authorization required by operations personnel and systems programming personnel as it may
allow inappropriate access to user and application data.
•     (ZISF0200: CAT II) The IAO will not permit destination operator authority to Standard
      SYSIN/SYSOUT data sets (i.e., ISFAUTH.DEST.qualifier.DATASET).
System Message SYSIN/SYSOUT data sets only contain system-generated messages associated
with jobs. Access to system-level job information is a typical requirement for operations
personnel and system programming personnel to perform their duties.
•     (ZISF0200: CAT II) The IAO will restrict destination operator authority to System Message
      SYSIN/SYSOUT data sets (i.e., ISFAUTH.DEST.qualifier.DATASET.JCL*) to operations
      personnel and systems programming personnel.
13.2.1.7.11 Initiators
JES2 initiators select jobs for execution and help build the environment for the jobs to execute.
Operations related to initiators displayed on the INIT panel can be protected.
The following table lists the SAF resource information relative to the protection of JES2
initiators:
168
                                          UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                           DISA Field Security Operations
21 January 2005                                                             Developed by DISA for the DOD
In the table:
    - xx is the number of the JES2 initiator
    - jesx is the name of the JES2 subsystem
•   (ZISF0210: CAT II) The IAO will define SDSF initiator SAF resources to the ACP with no
    user access by default.
•   (ZISF0210: CAT II) The IAO will define generic a resource such as ISFINIT. to the ACP to
    provide the default protection.
•   (ZISF0210: CAT II) The IAO will restrict all access to SDSF initiator resources to
    operations personnel and systems programming personnel.
Printers and punches are output devices defined to JES2. Operations related to printers and
punches displayed on the PR and PUN panels respectively can be controlled while under SDSF
using the WRITER resource class.
The following table lists the SAF resource information relative to the protection of JES2 printers
and punches:
In the table:
    - jesx is the name of the JES2 subsystem
    - device-name is the name of the printer and punch
                                                                                                      169
                                         UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                          DISA Field Security Operations
21 January 2005                                                            Developed by DISA for the DOD
Section 5 of the OS/390 STIG discusses the security controls required for JES2. Refer to Section
5.1.3, Security Controls for Output, for general requirements regarding printer and punch
resources. In addition, the following requirement applies for SDSF:
•     (ZJES0032: CAT II) The IAO will restrict ALTER and CONTROL access to JES2 printer
      and punch resources to operations and systems programming personnel.
13.2.1.7.13 Lines
The following table lists the SAF resource information relative to the protection of JES2
communication lines:
In the table:
    - device-name is the name of the line, transmitter, or receiver
    - jesx is the name of the JES2 subsystem
•     (ZISF0220: CAT II) The IAO will define SDSF line SAF resources to the ACP with no user
      access by default.
•     (ZISF0220: CAT II) The IAO will define generic a resource such as ISFLINE. to the ACP to
      provide the default protection.
•     (ZISF0220: CAT II) The IAO will restrict all access to SDSF line resources to operations
      personnel and systems programming personnel.
170
                                          UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                          DISA Field Security Operations
21 January 2005                                                            Developed by DISA for the DOD
13.2.1.7.14 Nodes
A node is one of the systems in a network of systems connected by communication lines or CTC
adapters. Operations related to JES2 nodes displayed on the NO panel can be protected.
The following table lists the SAF resource information relative to the protection of JES2 nodes:
In the table:
    - node-name is the name of the JES2 node
    - jesx is the name of the JES2 subsystem
•    (ZISF0230: CAT II) The IAO will define SDSF node SAF resources to the ACP with no user
     access by default.
•    (ZISF0230: CAT II) The IAO will define generic a resource such as ISFNODE. to the ACP
     to provide the default protection.
•    (ZISF0230: CAT II) The IAO will restrict all access to SDSF node resources to operations
     personnel and systems programming personnel.
13.2.1.7.15 Offloaders
Spool offload devices are used to move jobs and work off the work queues to remove them from
contention for system resources, or off spool to free up system work space. Operations related to
spool offloaders on the SO panel can be protected.
                                                                                                     171
                                         UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                           DISA Field Security Operations
21 January 2005                                                             Developed by DISA for the DOD
The following table lists the SAF resource information relative to the protection of spool
offloaders:
In the table:
    - device-name is the name of the offloader, transmitter, or receiver
    - jesx is the name of the JES2 subsystem
•     (ZISF0240: CAT II) The IAO will define SDSF spool offloader SAF resources to the ACP
      with no user access by default.
•     (ZISF0240: CAT II) The IAO will define generic a resource such as ISFSO. to the ACP to
      provide the default protection.
•     (ZISF0240: CAT II) The IAO will restrict all access to SDSF spool offloader resources to
      operations personnel and systems programming personnel.
A MAS configuration allows multiple systems to share the JES2 input, job, and output queues
through the use of a checkpoint data set or coupling facility. Operations related to members
displayed on the MAS panel can be protected.
172
                                          UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                         DISA Field Security Operations
21 January 2005                                                           Developed by DISA for the DOD
The following table lists the SAF resource information relative to the protection of MAS
members:
In the table:
    - member-name is the name of the member defined in the MAS configuration
    - jesx is the name of the JES2 subsystem
•    (ZISF0250: CAT II) The IAO will define SDSF MAS member SAF resources to the ACP with
     no user access by default.
•    (ZISF0250: CAT II) The IAO will define generic a resource such as ISFMEMB. to the ACP
     to provide the default protection.
•    (ZISF0250: CAT II) The IAO will restrict all access to SDSF MAS member resources to
     operations personnel and systems programming personnel.
                                                                                                    173
                                        UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                          DISA Field Security Operations
21 January 2005                                                            Developed by DISA for the DOD
Job classes define many input and output JES2 characteristics associated with each job in each
class. Operations related to JES2 job classes displayed on the JC panel can be protected.
The following table lists the SAF resource information relative to the protection of JES2 job
classes:
                   Table B-36. SDSF JOB CLASS SAF RESOURCES (13.2.1.7.17)
                               SDSF JOB CLASS SAF RESOURCES
    RESOURCE                                     REQUIRED
                           RESOURCE NAME                         DESCRIPTION
      CLASS                                       ACCESS
    SDSF              ISFJOBCL.class.jesx       READ       Display information about
                                                           a job class
    SDSF              ISFJOBCL.class.jesx       CONTROL Modify job class
                                                           characteristics
In the table:
    - class is the job class
    - jesx is the name of the JES2 subsystem
•     (ZISF0260: CAT II) The IAO will define SDSF job class SAF resources to the ACP with no
      user access by default.
•     (ZISF0260: CAT II) The IAO will define generic a resource such as ISFJOBCL. to the ACP
      to provide the default protection.
•     (ZISF0260: CAT II) The IAO will restrict all access to SDSF job class resources to
      operations personnel and systems programming personnel.
Scheduling environments are defined to the WLM and help ensure that units of work are sent to
systems that have the appropriate resources to handle them. A scheduling environment is a list
of resource names along with their required states. Operations related to WLM scheduling
environments displayed on the SE panel can be protected.
174
                                          UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                            DISA Field Security Operations
21 January 2005                                                              Developed by DISA for the DOD
The following table lists the SAF resource information relative to the protection of WLM
scheduling environments:
In the table:
    - sched-env is the name of the scheduling environment
    - system is the name of the MVS system (sysplex support)
•    (ZISF0270: CAT II) The IAO will define SDSF scheduling environment SAF resources to the
     ACP with no user access by default.
•    (ZISF0270: CAT II) The IAO will define generic a resource such as ISFSE. to the ACP to
     provide the default protection.
•    (ZISF0270: CAT II) The IAO will restrict all access to SDSF scheduling environment
     resources to operations personnel, systems programming personnel, and authorized SDSF
     end-users.
A list of resources makes up a scheduling environment. Resources can represent actual physical
entities, such as a database or a peripheral device, or they can represent intangible qualities such
as a certain period of time (like second shift or weekend). Operations related to WLM resources
displayed on the RES panel can be protected.
The following table lists the SAF resource information relative to the protection of WLM
resources:
             Table B-38. SDSF WLM RESOURCE SAF RESOURCES (13.2.1.7.19)
                           SDSF WLM RESOURCE SAF RESOURCES
    RESOURCE                                 REQUIRED
                          RESOURCE NAME                      DESCRIPTION
      CLASS                                    ACCESS
    SDSF              ISFRES.resource.system READ       Display information about
                                                        a WLM resource
    SDSF              ISFRES.resource.system CONTROL Modify the state of a
                                                        WLM resource
                                                                                                       175
                                          UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                          DISA Field Security Operations
21 January 2005                                                            Developed by DISA for the DOD
In the table:
    - resource is the name of the WLM resource
    - system is the name of the MVS system (sysplex support)
•     (ZISF0280: CAT II) The IAO will define SDSF WLM resource SAF resources to the ACP
      with no user access by default.
•     (ZISF0280: CAT II) The IAO will define generic a resource such as ISFRES. to the ACP to
      provide the default protection.
•     (ZISF0280: CAT II) The IAO will restrict all access to SDSF WLM resources to operations
      personnel and systems programming personnel.
The System Request (SR) panel allows users to access information about system messages
requiring a reply or action. Operations related to system requests displayed on the SR panel can
be protected.
The following table lists the SAF resource information relative to the protection of system
request resources:
In the table:
    - type is the message type (ACTION or REPLY)
    - system is the name of the originating system
    - jobname is the name of the job issuing the message
•     (ZISF0290: CAT II) The IAO will define SDSF system request SAF resources to the ACP
      with no user access by default.
•     (ZISF0290: CAT II) The IAO will define a generic resource such as ISFSR. to the ACP to
      provide the default protection.
176
                                         UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                         DISA Field Security Operations
21 January 2005                                                           Developed by DISA for the DOD
•    (ZISF0290: CAT II) The IAO will restrict all access to SDSF system request resources to
     operations personnel and systems programming personnel.
The Enclave (ENC) panel allows users to access information about WLM enclaves. Operations
related to enclaves displayed on the ENC panel can be protected.
The following table lists the SAF resource information relative to the protection of WLM
enclave resources:
                Table B-40. SDSF WLM ENCLAVE SAF RESOURCES (13.2.1.7.21)
                              SDSF WLM ENCLAVE SAF RESOURCES
    RESOURCE                                    REQUIRED
                            RESOURCE NAME                      DESCRIPTION
      CLASS                                      ACCESS
    SDSF              ISFENC.subsystem-         ALTER     Resume and quiesce an
                      type.subsystem-name                 enclave
In the table:
    - subsystem-type is the type of subsystem such as MQ or DB2
    - subsystem-name is the name of the subsystem
NOTE: SDSF WLM enclave SAF resource protection only applies to z/OS V1R4 and above.
•    (ZISF0300: CAT II) The IAO will define SDSF WLM enclave SAF resources to the ACP with
     no user access by default.
•    (ZISF0300: CAT II) The IAO will define a generic resource such as ISFENC. to the ACP to
     provide the default protection.
•    (ZISF0300: CAT II) The IAO will restrict all access to SDSF WLM enclave resources to
     operations personnel and systems programming personnel.
                                                                                                    177
                                         UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                         DISA Field Security Operations
21 January 2005                                                           Developed by DISA for the DOD
The Process (PS) panel allows users to access information about z/OS UNIX processes such as
parent process, state of the process, and time the process was started. Operations related to
processes displayed on the PS panel can be protected.
The following table lists the SAF resource information relative to the protection of z/OS UNIX
process resources:
            Table B-41. SDSF Z/OS UNIX PROCESS SAF RESOURCES (13.2.1.7.22)
                          SDSF Z/OS UNIX PROCESS SAF RESOURCES
    RESOURCE                                   REQUIRED
                          RESOURCE NAME                        DESCRIPTION
      CLASS                                      ACCESS
    SDSF              ISFPROC.owner.jobname    READ       Display information about
                                                          a process
    SDSF              ISFPROC.owner.jobname    ALTER      Cancel a process
In the table:
    - owner is the owner of the z/OS UNIX process
    - jobname is the name of the z/OS UNIX process
NOTE: SDSF z/OS UNIX process SAF resource protection only applies to z/OS V1R2 and
           above.
•     (ZISF0310: CAT II) The IAO will define SDSF z/OS U0NIX process SAF resources to the
      ACP with no user access by default.
•     (ZISF0310: CAT II) The IAO will define a generic resource such as ISFPROC. to the ACP
      to provide the default protection.
•     (ZISF0310: CAT II) The IAO will restrict all access to SDSF z/OS UNIX process resources
      to operations personnel and systems programming personnel.
178
                                         UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                          DISA Field Security Operations
21 January 2005                                                            Developed by DISA for the DOD
The Spool Volumes (SP) panel displays statistics about each JES2 spool volume. Operations
related to spool volumes displayed on the SP panel can be protected.
The following table lists the SAF resource information relative to the protection of spool volume
resources:
               Table B-42. SDSF SPOOL VOLUME SAF RESOURCES (13.2.1.7.23)
                             SDSF SPOOL VOLUME SAF RESOURCES
    RESOURCE                                   REQUIRED
                          RESOURCE NAME                         DESCRIPTION
      CLASS                                      ACCESS
    SDSF              ISFSP.volser.jesx        READ       Display information about
                                                          a spool volume
    SDSF              ISFSP.volser.jesx        CONTROL All other commands such
                                                          as drain, start, and halt a
                                                          spool volume
In the table:
    - volser is the serial number of the spool volume
    - jesx is the name of the JES2 subsystem
NOTE: SDSF spool volume resource protection only applies to z/OS V1R2 and above.
•    (ZISF0320: CAT II) The IAO will define SDSF spool volume SAF resources to the ACP with
     no user access by default.
•    (ZISF0320: CAT II) The IAO will define a generic resource such as ISFSP. to the ACP to
     provide the default protection.
•    (ZISF0320: CAT II) The IAO will restrict all access to SDSF spool volume resources to
     operations personnel and systems programming personnel.
                                                                                                     179
                                         UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                            DISA Field Security Operations
21 January 2005                                                              Developed by DISA for the DOD
JES2 uses the JES2 spool to store information about jobs being processed on the operating
system. The data on the JES2 spool can be protected using the JESSPOOL resource class. JES2
uses the JESSPOOL resource class to protect SYSIN/SYSOUT data sets. SDSF extends the use
of the JESSPOOL resource class to protect SDSF job and output group resources as well.
      -   Job resources on the Display Active Users, Input Queue, and Status panels
      -   Output groups on the Held Output Queue, Job Data Set, Output Queue, and Output
          Descriptors panels
      -   SYSIN/SYSOUT data sets on the Job Data Set panel and any other panel used for
          browsing with the S or V action characters and printing with the X action character
The following table lists the SAF resource information relative to the protection of JES2 job
resources:
                        Table B-43. JES2 JOB SAF RESOURCES (13.2.1.7.24 a)
                                      JES2 JOB SAF RESOURCES
   RESOURCE                                           REQUIRED
                            RESOURCE NAME                                   DESCRIPTION
     CLASS                                             ACCESS
  JESSPOOL            nodeid.userid.jobname.jobid.JCL READ             Edit job JCL
  JESSPOOL            nodeid.userid.jobname.jobid     READ             Display job information
                                                                       and output status
  JESSPOOL            nodeid.userid.jobname.jobid       ALTER          Modify job status such as
                                                                       cancel, hold, and release
The following table lists the SAF resource information relative to the protection of JES2 output
group resources:
               Table B-44. JES2 OUTPUT GROUP SAF RESOURCES (13.2.1.7.24 b)
                               JES2 OUTPUT GROUP SAF RESOURCES
  RESOURCE                                              REQUIRED
                              RESOURCE NAME                                    DESCRIPTION
     CLASS                                               ACCESS
  JESSPOOL            nodeid.userid.jobname.jobid.GROUP READ               List job output and
                      .ogroupid                                            status
  JESSPOOL            nodeid.userid.jobname.jobid.GROUP ALTER              Modify job output
                      .ogroupid                                            status such as purge,
                                                                           release, and hold
180
                                           UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                             DISA Field Security Operations
21 January 2005                                                               Developed by DISA for the DOD
The following table lists the SAF resource information relative to the protection of JES2
SYSIN/SYSOUT resources:
By default, JESSPOOL resources are fully protected and require no addition controls to restrict
data access to only the job owner. Users can always access the JESSPOOL resources they own
and do not require additional authority to access their jobs and output. However, situations may
exist where one user legitimately requires access to jobs that run under another user’s userid.
Protection for each type of resource can be defined separately. For example, a user may be
authorized to issue action characters for a job, but not be authorized to browse that job’s data
sets. Refer to Section 5.1.4, Security Controls for JES2 SPOOL Data Sets, for more information
on protecting JESSPOOL resources.
•    (ZJES0046: CAT II) The IAO will ensure that the following items are in effect regarding
     JES2 job, output group, and SYSIN/SYSOUT data set SAF resources defined to the
     JESSPOOL resource class:
                                                                                                        181
                                           UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                           DISA Field Security Operations
21 January 2005                                                             Developed by DISA for the DOD
- Justification documentation with IAO approval will be filed with the IAO.
The SDSF Server provides the configuration and operational characteristics of SDSF. The
following table lists the SAF resource information relative to the protection of SDSF server
operations.
                     Table B-46. SDSF SERVER SAF RESOURCES (13.2.1.7.25)
                                SDSF SERVER SAF RESOURCES
    RESOURCE                                       REQUIRED
                            RESOURCE NAME                                      DESCRIPTION
      CLASS                                         ACCESS
    SDSF              ISFCMD.OPT.SERVER            READ                    Use of the SERVER
                                                                           parameter on the SDSF
                                                                           command
    SDSF              SERVER.NOPARM                        READ            Reverting to
                                                                           ISFPARMS in
                                                                           assembler macro format
    OPERCMDS server.MODIFY.DISPLAY                         READ            Use of the DISPLAY
                                                                           parameter on the MVS
                                                                           MODIFY command (F)
                                                                           for the SDSF server
    OPERCMDS server.MODIFY.mod-parm                        CONTROL         Use of various
                                                                           parameters on the MVS
                                                                           MODIFY command for
                                                                           the SDSF server
In the table:
    - server is the name of the SDSF server specified either by the ISFPMAC macro or SDSF
        command.
    - mod-parm is one of the following parameters specified on the MVS MODIFY command:
        DEBUG, FOLDMSG, LOGCLASS, LOGTYPE, REFRESH, START, STOP, TRACE,
        and TRCLASS.
    - The server START and STOP commands are protected by MVS. The resources are
        MVS.START.STC.server and MVS.STOP.STC.server respectively. They are defined to
        the OPERCMDS resource class and require update authority.
•     (ZISF0330: CAT II) The IAO will define the SDSF Server SAF resources to the ACP with no
      user access by default.
The SERVER parameter of the SDSF command allows you to override the server specified in
the ISFPMAC macro when invoking SDSF. Since the SDSF server provides the configuration
and security for SDSF, the ability to override the default server value should be restricted.
•     (ZISF0330: CAT II) The IAO will restrict all access to the ISFCMD.OPT.SERVER resource
      to systems programming personnel.
182
                                           UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                         DISA Field Security Operations
21 January 2005                                                           Developed by DISA for the DOD
SDSF connects to the server during SDSF initialization and uses the server to process the
ISFPARMS statements. However, if the SDSF server is not active or if no statements are in
effect, SDSF reverts to the ISFPARMS defined with the assembler macros and initialization
proceeds.
Under normal operations, SDSF users should not be allowed to use SDSF with the assembler
macro format in use. SDSF configuration and security is not fully supported using ISFPARMS
assembler macro definitions. The use of SDSF with ISFPARMS macro format will be used for
recovery situations only.
•   (ZISF0330: CAT II) The IAO will restrict all access to the SERVER.NOPARM resource to
    systems programming personnel. In addition, access is granted to specific individuals in the
    systems programming staff responsible for system recovery. Access is not granted at the
    group level.
•   (ZISF0330: CAT II) The IAO will log all access to the SERVER.NOPARM resource using
    the ACP.
The SDSF server MODIFY command can be used to refresh the ISFPARMS statements, change
server options, and control server communications within an SDSF server group.
•   (ZISF0340: CAT II) The IAO will restrict all update and control access to
    server.MODIFY.mod-parm resources to systems programming personnel.
•   (ZISF0340: CAT II) The IAO will log all update and control access to server.MODIFY.mod-
    parm resources.
SDSF uses MQSeries for OS/390 (MQ) to provide sysplex support. The security controls related
to SDSF’s use of MQ consists of:
Refer to Section 4.3, MQSeries, for more information on controlling access to MQSeries
resources.
                                                                                                    183
                                         UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                              DISA Field Security Operations
21 January 2005                                                                Developed by DISA for the DOD
SDSF uses several MQ queues to provide sysplex data on various SDSF panels. Security is
defined by permitting or denying the SDSF server and the SDSF client access to the queues. The
SDSF client can be thought of as the SDSF user. The queues include request queues that handle
work communications between the client and the server, as well as model and command queues
used to dynamically create queues as needed.
SDSF uses both a server and a client request queue. The client request queue is actually an alias
for the server request queue. The two queues work together so that SDSF users can put requests
on the server queue, but cannot read the server queue. The client request queue is defined by
SDSF so users are allowed by SAF to read the client queue, but are prohibited by MQ. The SAF
profiles should prevent access by the user to the server request queue, and allow access to the
client request queue. The server must have access to both queues.
The following table lists the SAF resource information relative to the protection of MQSeries
queues:
                      Table B-47. MQ QUEUE SAF RESOURCES (13.2.1.7.26.1)
                                      MQ QUEUE SAF RESOURCES
  RESOURCE                                                                         REQ’D ACCESS
                                 RESOURCE NAME              DESCRIPTION
    CLASS                                                                        SERVER CLIENT
  MQQUEUE              ssid.prefix.SERVER.server.system    Server request        ALTER    NONE
                       .REQUESTQ                           queue
  MQQUEUE              ssid.prefix.CLIENT.server.system.   Client request        ALTER            UPDATE
                       REQUESTQ                            queue (used to                         (PUT
                                                           send work to the                       only)
                                                           server)
  MQQUEUE              ssid.prefix.USER.userid.*           ReplyTo queue         UPDATE UPDATE
                                                           (used by the
                                                           client to receive
                                                           server responses)
  MQQUEUE              ssid.prefix.MODEL.**                Model queue           UPDATE UPDATE
                                                           (used to create
                                                           dynamic queues
  MQQUEUE              ssid.XMIT.QUEUE                     Transmission          UPDATE NONE
                                                           queue (used to
                                                           send messages to
                                                           remote SDSF
                                                           servers)
184
                                            UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                         DISA Field Security Operations
21 January 2005                                                           Developed by DISA for the DOD
In the table:
    - ssid is the MQ subsystem ID. This is the queue manager name specified on the COMM
        statement of ISFPARMS.
    - prefix is a string that identifies the queue name. It is defined by the QPREFIX parameter
        of the COMM statement in ISFPARMS.
    - server is the name of the SDSF server specified either by the ISFPMAC macro or SDSF
        command.
    - system is the name of the MVS system (sysplex support).
•    (ZWMQ0054: CAT II) The IAO will ensure that all MQSeries/WebSphere MQ queues are
     restricted using queue level security.
When the SDSF server initializes, it checks for the presence of the model queue and the client
request queue. If these are not defined, the server attempts to create them using the MQ MQSC
interface. The SDSF server should have access to these resources. In addition, you may want
the operator ID used by MQ for commands entered from the console to have access to these
resources.
The following table lists the SAF resource information relative to the protection of MQSeries
queue definition authority:
In the table:
                                                                                                    185
                                        UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                            DISA Field Security Operations
21 January 2005                                                              Developed by DISA for the DOD
      -   ssid is the MQ subsystem ID. This is the queue manager name specified on the COMM
          statement of ISFPARMS.
      -   prefix is a string that identifies the queue name. It is defined by the QPREFIX parameter
          of the COMM statement in ISFPARMS.
NOTE: All the resources in this table affect functions outside of SDSF.
•     (ZWMQ0054: CAT II) The IAO will ensure that all MQSeries/WebSphere MQ queues are
      restricted using queue level security.
•     (ZWMQ0059: CAT II) The IAO will ensure that all MQSeries/WebSphere MQ commands
      are restricted to authorized personnel.
•     (ZISF0350: CAT II) The IAO will define MQ queue definition authority SAF resources to the
      ACP with no user access by default.
•     (ZISF0350: CAT II) The IAO will restrict SDSF server and SDSF client access to MQ queue
      definition authority resources as indicated in the previous table.
Connection security may be used to control which users can connect to MQ. When connection
security is enabled, both the SDSF server and the SDSF client must have access to the local
queue manager. These both use the batch/TSO adapter. This resource affects functions outside
of SDSF.
The following table lists the SAF resource information relative to the protection of MQSeries
connection security:
In the table:
    - ssid is the MQ subsystem ID. This is the queue manager name specified on the COMM
        statement of ISFPARMS.
•     (ZWMQ0052: CAT II) The IAO will ensure that all connections to MQSeries/WebSphere
      MQ resources are restricted using connection security.
186
                                           UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                            DISA Field Security Operations
21 January 2005                                                              Developed by DISA for the DOD
Context security is used to protect setting of the identity context fields in the message header.
The server needs this authority; clients should not have this authority. MQ itself also needs to be
given this authority. This resource affects functions outside of SDSF.
The following table lists the SAF resource information relative to the protection of MQSeries
context security:
In the table:
    - ssid is the MQ subsystem ID. This is the queue manager name specified on the COMM
        statement of ISFPARMS.
•    (ZWMQ0058: CAT II) The IAO will ensure that use of context resources are restricted to
     authorized personnel.
13.2.2 ACF2
This section describes the commands and rules needed to implement the security requirements
discussed throughout Section 13.2, System Display and Search Facility, in an ACF2
environment. The following task categories are described:
The following rule may be added to the SYS1 rule set to provide the required data set access
controls documented in Section 13.2.1.1, SDSF Data Set Protection:
     $KEY(SYS1)
     ISF.- UID(sysprog-group) READ(A) WRITE(A) ALLOC(A) EXEC(A) -
        DATA(SDSF SMP/E INSTALLATION DATA SETS)
The following commands may be used to define the required STC controls documented in
Section 3.2.2.3, Started Task Control (STC) Users:
                                                                                                       187
                                          UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                                DISA Field Security Operations
21 January 2005                                                                  Developed by DISA for the DOD
•     (ZISFA360: CAT II) The IAO will create an ACF logonid named SDSF, or in the case of
      multiple SDSF servers, prefixed with SDSF.
         SET LID
         INSERT SDSF NAME(SDSF SERVER) STC
This section describes the commands and rules needed to implement the required controls for
SDSF resources and functions discussed in Section 13.2.1.7, SDSF Resource Protection.
By default, ACF2 ignores SAF calls for SDSF, WRITER, JESSPOOL, and OPERCMDS
resources. ACF2 internal SAFDEF records for these resource classes are coded with
MODE(IGNORE). To enable ACF2 protection for these resources classes, locally defined
SAFDEF records must be inserted into the ACF2 database. The following commands may be
used to enable SAF security for these resources:
       SET CONTROL(GSO)
          INSERT SAFDEF.SDSF ID(SDSF) MODE(GLOBAL) -
       RACROUTE(REQUEST=AUTH, CLASS=SDSF) REP
          INSERT SAFDEF.WRITER ID(WRITER) MODE(GLOBAL) -
       RACROUTE(REQUEST=AUTH, CLASS=WRITER) REP
          INSERT SAFDEF.JESSPL ID(JESSPL) MODE(GLOBAL) -
       RACROUTE(REQUEST=AUTH, CLASS=JESSPOOL) REP
          INSERT SAFDEF.OPRCMDS ID(OPRCMDS) MODE(GLOBAL) -
             RACROUTE(REQUEST=AUTH, CLASS=OPERCMDS) REP
IMPORTANT NOTE: After these SAFDEF records are created and the ACF2 GSO options
                               are refreshed, validation for these resources is active. Therefore ensure
                               that all of the necessary rules are defined before activating these local
                               SAF definitions.
ACF2 uses the resource type SAF for the SDSF, WRITER, JESSPOOL, and OPERCMDS
resource classes by default.
The following commands may be used to map SAF resource classes to the STIG resource types:
       SET CONTROL(GSO)
       INSERT CLASMAP.SDSF RESOURCE(SDSF) RSRCTYPE(SDF) ENTITYLN(63)
       INSERT CLASMAP.WRITER RESOURCE(WRITER) RSRCTYPE(WTR) -
          ENTITYLN(39)
       INSERT CLASMAP.JESSPL RESOURCE(JESSPOOL) RSRCTYPE(SPL) -
          ENTITYLN(53)
       INSERT CLASMAP.OPRCMDS RESOURCE(OPERCMDS) RSRCTYPE(OPR) -
          ENTITYLN(39)
188
                                               UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                          DISA Field Security Operations
21 January 2005                                                            Developed by DISA for the DOD
The following rules may be used to control access to SDSF groups as discussed in Section
13.2.1.7.1, Membership in SDSF Groups. This example establishes default protection, defines
an SDSF group named sysprog that is configured in ISFPARMS for an SDSF server named sdsf,
and allows access to a UID for systems programming personnel.
       $KEY(GROUP) TYPE(SDF)
       - UID(-) PREVENT DATA(SDSF GROUP DEFAULT PROTECTION)
       sysprog.sdsfUID(sysprog-group) SERVICE(READ) ALLOW -
           DATA(SDSF GROUP FOR SYSTEMS PROGRAMMERS)
This section shows examples of security controls as discussed in the following general sections:
The following rules may be used to establish default protection and permit access to SDSF
resources that are restricted to both operations personnel and systems programming personnel:
       $KEY(ISF-) TYPE(SDF)
       - UID(-) PREVENT DATA(DEFAULT ACCESS TO ALL SDSF RESOURCES)
       $KEY(ISFCMD) TYPE(SDF)
       - UID(-) PREVENT DATA(DEFAULT ACCESS TO ALL SDSF COMMAND -
           RESOURCES)
       DSP.- UID(sysprog-group, oper-group) SERVICE(READ) ALLOW -
           DATA(SDSF END USER DISPLAYS)
                                                                                                     189
                                         UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                              DISA Field Security Operations
21 January 2005                                                Developed by DISA for the DOD
       $KEY(ISFOPER) TYPE(SDF)
       - UID(-) PREVENT DATA(DEFAULT ACCESS TO SDSF OPERATOR -
           RESOURCES)
       SYSTEM UID(sysprog-group, oper-group) SERVICE(READ) ALLOW -
           DATA(SDSF / COMMAND)
       ANYDEST.JES* UID(sysprog-group, oper-group) SERVICE(READ) ALLOW -
           DATA(SDSF AUTHORITY TO ANY DESTINATION PRIMER)
       DEST.JES* UID(sysprog-group, oper-group) SERVICE(READ) ALLOW -
           DATA(SDSF DESTINATION OPERATOR AUTHORITY)
       $KEY(ISFATTR) TYPE(SDF)
       - UID(-) PREVENT DATA(DEFAULT ACCESS TO ALL SDSF OVERTYPEABLE -
           FIELDS)
       - UID(sysprog-group, oper-group) SERVICE(READ,UPDATE) ALLOW -
           DATA(ALL SDSF OVERTYPEABLE FIELDS)
       $KEY(ISFAUTH) TYPE(SDF)
       - UID(-) PREVENT DATA(DEFAULT ACCESS TO SDSF DESTINATION -
           AUTHORITY RESOURCES)
       DEST.******** UID(sysprog-group, oper-group) -
           SERVICE(READ,UPDATE,ADD,DELETE) ALLOW -
              DATA(SDSF DESTINATION AUTHORITY TO JOBS)
       DEST.********.******** UID(sysprog-group, oper-group) -
           SERVICE(READ,UPDATE,ADD,DELETE) ALLOW -
       DATA(SDSF DESTINATION AUTHORITY TO JOB OUTPUT)
       DEST.-.DATASET.- UID(-) PREVENT DATA(SDSF DESTINATION -
           AUTHORITY TO STANDARD SYSIN/SYSOUT DATA SETS)
       DEST.-DATASET.JES***** UID(sysprog-group, oper-group) SERVICE(READ) -
           ALLOW DATA(SDSF DESTINATION AUTHORITY TO SYSTEM MESSAGE -
              SYSIN/SYSOUT DATA SETS)
       $KEY(ISFINIT) TYPE(SDF)
       - UID(-) PREVENT DATA(DEFAULT ACCESS TO JES2 INITIATORS)
       - UID(sysprog-group, oper-group) SERVICE(READ,UPDATE,ADD,DELETE) -
           ALLOW DATA(JES2 INITIATORS)
       $KEY(ISFLINE) TYPE(SDF)
       - UID(-) PREVENT DATA(DEFAULT ACCESS TO JES2 COMMUNICATION -
           LINES)
       - UID(sysprog-group, oper-group) SERVICE(READ,UPDATE,ADD,DELETE) -
           ALLOW DATA(JES2 COMMUNICATION LINES)
190
                                     UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                             DISA Field Security Operations
21 January 2005                                               Developed by DISA for the DOD
       $KEY(ISFNODE) TYPE(SDF)
       - UID(-) PREVENT DATA(DEFAULT ACCESS TO JES2 NODES)
       - UID(sysprog-group, oper-group) SERVICE(READ,UPDATE,ADD,DELETE) -
           ALLOW DATA(JES2 NODES)
       $KEY(ISFSO) TYPE(SDF)
       - UID(-) PREVENT DATA(DEFAULT ACCESS TO JES2 SPOOL OFFLOADERS)
       - UID(sysprog-group, oper-group) SERVICE(READ,UPDATE,ADD,DELETE) -
           ALLOW DATA(JES2 SPOOL OFFLOADERS)
       $KEY(ISFMEMB) TYPE(SDF)
       - UID(-) PREVENT DATA(DEFAULT ACCESS TO JES2 MAS MEMBERS)
       - UID(sysprog-group, oper-group) SERVICE(READ,UPDATE,ADD,DELETE) -
           ALLOW DATA(JES2 MAS MEMBERS)
       $KEY(ISFJOBCL) TYPE(SDF)
       - UID(-) PREVENT DATA(DEFAULT ACCESS TO JES2 JOB CLASSES)
       - UID(sysprog-group, oper-group) SERVICE(READ,UPDATE,ADD,DELETE) -
           ALLOW DATA(JES2 JOB CLASSES)
       $KEY(ISFSE) TYPE(SDF)
       - UID(-) PREVENT DATA(DEFAULT ACCESS TO WLM SCHEDULING -
           ENVIRONMENTS)
       - UID(sysprog-group, oper-group) SERVICE(READ) ALLOW -
           DATA(WLM SCHEDULING ENVIRONMENTS)
       $KEY(ISFRES) TYPE(SDF)
       - UID(-) PREVENT DATA(DEFAULT ACCESS TO WLM RESOURCES)
       - UID(sysprog-group, oper-group) SERVICE(READ,UPDATE,ADD,DELETE) -
           ALLOW DATA(WLM RESOURCES)
       $KEY(ISFSR) TYPE(SDF)
       - UID(-) PREVENT DATA(DEFAULT ACCESS TO SYSTEM REQUESTS)
       - UID(sysprog-group, oper-group) SERVICE(READ) ALLOW -
          DATA(SYSTEM REQUESTS)
       $KEY(ISFENC) TYPE(SDF)
       - UID(-) PREVENT DATA(DEFAULT ACCESS TO WLM ENCLAVES)
       - UID(sysprog-group, oper-group) SERVICE(READ,UPDATE,ADD,DELETE) -
           ALLOW DATA(WLM ENCLAVES)
       $KEY(ISFPROC) TYPE(SDF)
       - UID(-) PREVENT DATA(DEFAULT ACCESS TO Z/OS UNIX PROCESSES)
       - UID(sysprog-group, oper-group) SERVICE(READ,UPDATE,ADD,DELETE) -
           ALLOW DATA(Z/OS UNIX PROCESSES)
                                                                                        191
                                     UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                          DISA Field Security Operations
21 January 2005                                                            Developed by DISA for the DOD
       $KEY(ISFSP) TYPE(SDF)
       - UID(-) PREVENT DATA(DEFAULT ACCESS TO JES2 SPOOL VOLUMES)
       - UID(sysprog-group, oper-group) SERVICE(READ,UPDATE,ADD,DELETE) -
           ALLOW DATA(JES2 SPOOL VOLUMES)
The following rules may be used to allow access to SDSF resources that are restricted to systems
programming personnel only:
       $KEY(ISFCMD) TYPE(SDF)
       MAINT.- UID(sysprog-group) SERVICE(READ) ALLOW -
          DATA(SDSF MAINTENANCE COMMANDS)
       FILTER.INPUT UID(oper-group) PREVENT -
          DATA(SDSF INPUT FILTER COMMAND FOR SYS PROGS ONLY)
NOTE: The FILTER.INPUT rule removes oper-group access based on the previous example
           showing permits of SDSF resources that are restricted to both operations personnel and
           systems programming personnel.
The following rules may be used to allow access to SDSF resources that are permitted to
authorized SDSF end-users:
       $KEY(ISFCMD) TYPE(SDF)
       DSP.- UID(end-user-group) SERVICE(READ) ALLOW -
         DATA(SDSF END USER DISPLAYS)
       $KEY(ISFATTR) TYPE(SDF)
       OUTPUT.BURST UID(end-user-group) SERVICE(UPDATE) ALLOW -
         DATA(SDSF H AND O PANEL BURST INDICATION FIELD)
       OUTPUT.CLASS UID(end-user-group) SERVICE(UPDATE) ALLOW -
          DATA(SDSF H AND O PANEL JES2 OUTPUT CLASS FIELD)
       OUTPUT.DEST UID(end-user-group) SERVICE(UPDATE) ALLOW -
          DATA(SDSF H AND O PANEL JES2 PRINT DESTINATION NAME FIELD)
       OUTPUT.FCB UID(end-user-group) SERVICE(UPDATE) ALLOW -
          DATA(SDSF H AND O PANEL FCB ID FIELD)
       OUTPUT.FLASH UID(end-user-group) SERVICE(UPDATE) ALLOW -
          DATA(SDSF H AND O PANEL FLASH ID FIELD)
       OUTPUT.FORMS UID(end-user-group) SERVICE(UPDATE) ALLOW -
          DATA(SDSF H AND O PANEL FORM NUMBER FIELD)
       OUTPUT.PRMODE UID(end-user-group) SERVICE(UPDATE) ALLOW -
          DATA(SDSF H AND O PANEL PRINTER PROCESS MODE FIELD)
       OUTPUT.UCS UID(end-user-group) SERVICE(UPDATE) ALLOW -
          DATA(SDSF H AND O PANEL UCS ID FIELD)
       OUTPUT.WRITER UID(end-user-group) SERVICE(UPDATE) ALLOW -
          DATA(SDSF H AND O PANEL EXTERNAL WRITER NAME FIELD)
       OUTDESC.- UID(end-user-group) SERVICE(UPDATE) ALLOW -
192
                                          UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                       DISA Field Security Operations
21 January 2005                                                         Developed by DISA for the DOD
       $KEY(ISFOPER) TYPE(SDF)
       ANYDEST.JES* UID(end-user-group) SERVICE(READ) ALLOW -
         DATA(SDSF AUTHORITY TO ANY DESTINATION PRIMER)
       $KEY(ISFSE) TYPE(SDF)
       - UID(end-user-group) SERVICE(READ) ALLOW -
           DATA(WLM SCHEDULING ENVIRONMENTS)
Refer to Section 3.2.5.6, OS/390 System Command Controls, and Section 5.2.5, Security Controls
for JES2 Commands, for general ACF2 controls regarding MVS and JES2 system command
resources respectively. The following rules may be used to define MVS and JES2 command
resources that are permitted to all SDSF users, including end-users, as discussed in Section
13.2.1.7.8, MVS and JES2 Commands Generated by SDSF:
       $KEY(MVS) TYPE(OPR)
       DISPLAY.- UID(sysprog-group, oper-group, end-user-group) SERVICE(READ) -
          ALLOW DATA(VARIOUS MVS DISPLAY COMMANDS)
       CANCEL.ATX.- UID(sysprog-group, oper-group, end-user-group) -
          SERVICE(UPDATE) LOG DATA(CANCEL APPC TRANSACTION -
             PROGRAMS)
       CANCEL.TSU.- UID(sysprog-group, oper-group, end-user-group) -
          SERVICE(UPDATE) LOG DATA(CANCEL TSO USER SESSIONS)
       $KEY(JES2) TYPE(OPR)
       DISPLAY.- UID(sysprog-group, oper-group, end-user-group) SERVICE(READ) -
          ALLOW DATA(VARIOUS JES DISPLAY COMMANDS)
       MSEND.CMD UID(sysprog-group, oper-group, end-user-group) -
          SERVICE(READ) LOG DATA(SEND MESSAGES)
       MODIFY.BATOUT UID(sysprog-group, oper-group, end-user-group) -
          SERVICE(UPDATE) LOG DATA(MODIFY OUTPUT FILE STATUS FOR -
             BATCH JOBS)
       MODIFY.TSUOUT UID(sysprog-group, oper-group, end-user-group) -
          SERVICE(UPDATE) LOG DATA(MODIFY OUTPUT FILE STATUS FOR -
             TSO JOBS)
       MODIFY.STCOUT UID(sysprog-group, oper-group, end-user-group) -
          SERVICE(UPDATE) LOG DATA(MODIFY OUTPUT FILE STATUS FOR -
             STC JOBS)
       CANCEL.BAT UID(sysprog-group, oper-group, end-user-group) -
          SERVICE(UPDATE) LOG DATA(CANCEL / PURGE BATCH JOBS)
       CANCEL.TSU UID(sysprog-group, oper-group, end-user-group) -
          SERVICE(UPDATE) LOG DATA(CANCEL / PURGE TSO JOBS)
                                                                                                  193
                                       UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                         DISA Field Security Operations
21 January 2005                                                           Developed by DISA for the DOD
Refer to Section 5.2.3, Security Controls for Output, for general controls regarding printer and
punch resources in an ACF2 environment. The following rules may be used to control access to
JES2 printer and punch resources defined to the WRITER resource class as discussed in Section
13.2.1.7.12, Printers and Punches:
       $KEY(JES2) TYPE(WTR)
       LOCAL.device-name UID(sysprog-group, oper-group) -
          SERVICE(READ,UPDATE,ADD,DELETE) ALLOW -
             DATA(JES2 LOCAL PRINTER / PUNCH)
       RJE.device-name UID(sysprog-group, oper-group) -
          SERVICE(READ,UPDATE,ADD,DELETE) ALLOW -
             DATA(JES2 REMOTE PRINTER / PUNCH)
194
                                        UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                           DISA Field Security Operations
21 January 2005                                                             Developed by DISA for the DOD
Refer to Section 5.2.4, Security Controls for JES2 SPOOL Data Sets, for general controls
regarding JES2 spool resources in an ACF2 environment. The following rules may be used to
control access to JES2 job and output group resources defined to the JESSPOOL resource class
as discussed in Section 13.2.1.7.24, Jobs, Output Group, and SYSIN/SYSOUT Data Sets:
       $KEY(nodeid) TYPE(SPL)
        logonid.jobname.jobid.JCL UID(logonid) SERVICE(READ) LOG -
           DATA(VIEW AND EDIT JOB JCL)
        logonid.jobname.jobid UID(logonid) SERVICE(READ) LOG -
           DATA(VIEW JOB STATUS)
        logonid.jobname.jobid UID(logonid) SERVICE(READ,UPDATE,ADD,DELETE) -
           LOG DATA(MODIFY JOB STATUS)
        logonid.jobname.jobid.GROUP.ogroupid UID(logonid) SERVICE(READ) LOG -
          DATA(VIEW JOB OUTPUT STATUS)
        logonid.jobname.jobid.GROUP.ogroupid UID(logonid) -
           SERVICE(READ,UPDATE,ADD,DELETE) LOG -
              DATA(MODIFY JOB OUTPUT STATUS)
The following rules may be used to control access to resources specific to the control of the
SDSF Server as discussed in Section 13.2.1.7.25, SDSF Server Operations:
       $KEY(ISFCMD) TYPE(SDF)
       OPT.SERVER UID(sysprog-group) SERVICE(READ) ALLOW -
         DATA(USE OF THE SERVER PARAMETER ON THE SDSF COMMAND)
       $KEY(SERVER) TYPE(SDF)
       NOPARM UID(sysprog-logonid) SERVICE(READ) LOG -
         DATA(REVERT TO ISFPARMS IN ASSEMBLER MACRO FORMAT)
       $KEY(server) TYPE(OPR)
       MODIFY.DISPLAY UID(sysprog-group, oper-group) SERVICE(READ) ALLOW -
         DATA(USE OF DISPLAY PARAMETER ON MVS MODIFY COMMAND (F) -
            FOR THE SDSF SERVER)
       $KEY(server) TYPE(OPR)
       MODIFY.- UID(sysprog-group, oper-group) SERVICE(DELETE) -
         LOG DATA(USE OF VARIOUS MODIFY PARAMETERS ON MVS MODIFY -
            COMMAND (F) FOR THE SDSF SERVER)
                                                                                                      195
                                         UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                                DISA Field Security Operations
21 January 2005                                                                  Developed by DISA for the DOD
13.2.2.3.7 MQ Controls
Refer to Section 4.3.2.2.4, Queue Security, for general controls regarding MQ queue resources in
an ACF2 environment. The following rules may be used to control access to MQ queue
resources defined to the MQQUEUE resource class as discussed in Section 13.2.1.7.26.1, Queue
Protection:
       $KEY(ssid) TYPE(MQQ)
       prefix.SERVER.- UID(SDSF-server-logonid, MQ-logonid) -
           SERVICE(READ,UPDATE,ADD) ALLOW DATA(SDSF SERVER -
               REQUEST QUEUE)
       prefix.CLIENT.- UID(SDSF-server-logonid) SERVICE(READ,UPDATE,ADD) -
           ALLOW DATA(SDSF CLIENT REQUEST QUEUE TO SEND WORK TO -
               SERVER)
       prefix.CLIENT.- UID(sysprog-group, oper-group, end-user-group) -
          SERVICE(READ,UPDATE) ALLOW DATA(SDSF CLIENT REQUEST -
               QUEUE TO SEND WORK TO SERVER)
       prefix.USER.- UID(SDSF-server-logonid, oper-group, sysprog-group, end-user-group) -
           SERVICE(READ,UPDATE) ALLOW DATA(SDSF REPLYTO QUEUE TO -
               RECEIVE SERVER MESSAGES)
       prefix.MODEL.- UID(SDSF-server-logonid, oper-group, sysprog-group, -
           end-user-group) SERVICE(READ,UPDATE) ALLOW -
               DATA(SDSF MODEL QUEUE TO CREATE DYNAMIC QUEUES)
       XMIT.QUEUE UID(SDSF-server-logonid) SERVICE(READ,UPDATE) ALLOW -
           DATA(TRANSMISSION QUEUE TO SEND MESSAGES TO REMOTE SDSF-
               SERVERS)
In the previous example, MQ-logonid is the logonid associated with the MQ started task.
IMPORTANT NOTE: Standard ACF2 controls do not provide a practical solution for securing
                              individual ReplyTo queues to specific users. The fourth node of the
                              resource that protects access to the ReplyTo queue is the user’s logonid
                              (i.e., ssid.prefix.USER.logonid.-). Using standard ACF2 controls, rules
                              would have to be defined using specific logonids and specific UIDs to
                              restrict each user’s access to only their ReplyTo queue. Depending on
                              the environment, this may require hundreds of unique resource rules
                              defined. The use of logonid-specific rules to protect access to individual
                              ReplyTo queues may be implemented at the site’s discretion.
ACF2 provides an alternative to defining logonid-specific rules for ReplyTo queue protection.
The ACF2 resource pre-validation exit, RSCXIT1, or ACF2 resource post-validation exit,
RSCXIT2, may be used to restrict individual access to user ReplyTo queues instead of defining
logonid-specific rules. Implementation of these ACF2 exits is subject to the requirements for
exits as specified in Section 2.1.2.7, Access Control Product Exits.
196
                                              UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                          DISA Field Security Operations
21 January 2005                                                            Developed by DISA for the DOD
Refer to Section 4.3.2.2.4, Queue Security, and Section 4.3.2.2.9, Command Security, for general
controls regarding MQ queue and command resources in an ACF2 environment. The following
rules may be used to control access to MQ queue definition authority resources as discussed in
Section 13.2.1.7.26.2, Queue Definition Authority:
       $KEY(ssid) TYPE(MQC)
       DEFINE.QMODEL UID(SDSF-server-logonid, CSQ-oper-logonid) -
         SERVICE(READ,UPDATE,ADD) LOG DATA(DEFINE QUEUE COMMAND)
       DEFINE.QALIAS UID(SDSF-server-logonid, CSQ-oper-logonid) -
         SERVICE(READ,UPDATE,ADD) LOG DATA(DEFINE QUEUE ALIAS -
            COMMAND)
       $KEY(ssid) TYPE(MQA)
       QUEUE.prefix.- UID(SDSF-server-logonid) SERVICE(READ,UPDATE,ADD) -
         ALLOW DATA(ADMIN AUTHORITY TO DEFINE QUEUES)
       $KEY(ssid) TYPE(MQQ)
       SYSTEM.- UID(SDSF-server-logonid) SERVICE(READ,UPDATE,ADD) -
         ALLOW DATA(ACCESS SYSTEM QUEUES)
In the previous example, CSQ-oper-logonid is the operator logonid used by MQ for commands
entered from the console.
Refer to Section 4.3.2.2.3, Connection Security, general controls regarding connection security in
an ACF2 environment. The following rules may be used to control connect access to MQ as
discussed in Section 13.2.1.7.26.3, Connection Security:
       $KEY(ssid) TYPE(MQK)
       BATCH UID(SDSF-server-logonid, oper-group, sysprog-group, end-user-group) -
         SERVICE(READ) LOG DATA(ALLOW CONNECTION FOR BATCH -
            AND TSO USERS)
                                                                                                     197
                                         UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                           DISA Field Security Operations
21 January 2005                                                             Developed by DISA for the DOD
Refer to Section 4.3.2.2.8, Context Security, general controls regarding context security in an
ACF2 environment. The following rules may be used to control access to identity data in a
message as discussed in Section 13.2.1.7.26.4, Context Security:
          $KEY(ssid) TYPE(MQA)
          CONTEXT UID(SDSF-server-logonid) SERVICE(READ,UPDATE) ALLOW -
            DATA(SETTING THE IDENTITY CONTEXT FIELDS IN THE -
               MESSAGE HEADER)
          CONTEXT UID(MQ-logonid) SERVICE(READ,UPDATE,ADD) ALLOW -
            DATA(SETTING THE IDENTITY CONTEXT FIELDS IN THE -
               MESSAGE HEADER)
In the previous example, MQ-logonid is the logonid associated with the MQ started task.
13.2.3 RACF
This section describes the commands needed to implement the security requirements discussed
throughout Section 13.2, System Display and Search Facility, in a RACF environment. The
following task categories are described:
The following commands may be used to provide the required data set access controls
documented in Section 13.2.1.1, SDSF Data Set Protection:
The following commands may be used to define the required STC controls documented in
Section 3.3.2.3, Started Task Control (STC) Users:
•     (ZISFR360: CAT II) The IAO will create a RACF userid named SDSF, or in the case of
      multiple SDSF servers, prefixed with SDSF.
198
                                         UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                          DISA Field Security Operations
21 January 2005                                                            Developed by DISA for the DOD
This section describes the commands needed to implement the required controls for SDSF
resources and functions discussed in Section 13.2.1.7, SDSF Resource Protection.
Activate generic processing prior to defining generic profiles to ensure that profiles are
recognized as generic and not discrete. The following commands may be used to activate
generic processing for the resource classes used to protect the SDSF environment:
After all the necessary resource profiles are defined, activate the resource classes to enable SAF
protection. The following commands may be used to activate the resource classes used to protect
the SDSF environment:
NOTE: The OPERCMDS resource class is required to be RACLISTed. The other resource
           classes may be RACLISTed at the site’s discretion.
The following commands may be used to control access to SDSF groups as discussed in Section
13.2.1.7.1, Membership in SDSF Groups. This example establishes default protection and
defines an SDSF group named sysprog that is configured in ISFPARMS for an SDSF server
named sdsf.
The following command may be used to permit access to the SDSF sysprog group to systems
programming personnel:
                                                                                                     199
                                         UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                          DISA Field Security Operations
21 January 2005                                                            Developed by DISA for the DOD
This section shows examples of security controls as discussed in the following general sections:
The following commands may be used to establish default protection for resources defined to the
SDSF resource class:
200
                                         UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                         DISA Field Security Operations
21 January 2005                                           Developed by DISA for the DOD
                                                                                    201
                                     UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                       DISA Field Security Operations
21 January 2005                                                         Developed by DISA for the DOD
The following commands may be used to permit access to SDSF resources that are restricted to
both operations personnel and systems programming personnel:
202
                                       UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                       DISA Field Security Operations
21 January 2005                                                         Developed by DISA for the DOD
The following commands may be used to permit access to SDSF resources that are restricted to
systems programming personnel only:
                                                                                                  203
                                       UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                       DISA Field Security Operations
21 January 2005                                                         Developed by DISA for the DOD
The following commands may be used to permit access to SDSF resources that are permitted to
authorized SDSF end-users:
Refer to Section 3.3.5.6, OS/390 System Command Controls, and Section 5.3.5, Security Controls
for JES2 Commands, for general RACF controls regarding MVS and JES2 system command
resources respectively. The following commands may be used to define MVS and JES2
command resources that are permitted to all SDSF users, including end-users, as discussed in
Section 13.2.1.7.8, MVS and JES2 Commands Generated by SDSF:
204
                                       UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                        DISA Field Security Operations
21 January 2005                                          Developed by DISA for the DOD
                                                                                   205
                                     UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                       DISA Field Security Operations
21 January 2005                                                         Developed by DISA for the DOD
In preparation for permitting SDSF end-users access to system commands, conditional access
using SDSF must be defined. The following commands may be used to define SDSF as a
console and permit SDSF end-users access to the SDSF console:
The following commands may be used to permit access to MVS and JES2 command resources
for SDSF users, including end-users:
206
                                       UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                          DISA Field Security Operations
21 January 2005                                            Developed by DISA for the DOD
                                                                                     207
                                     UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                          DISA Field Security Operations
21 January 2005                                                            Developed by DISA for the DOD
Refer to Section 5.3.3, Security Controls for Output, for general controls regarding printer and
punch resources in a RACF environment. The following commands may be used to control
access to JES2 printer and punch resources defined to the WRITER resource class as discussed
in Section 13.2.1.7.12, Printers and Punches:
Refer to Section 5.3.4, Security Controls for JES2 SPOOL Data Sets, for general controls
regarding JES2 spool resources in a RACF environment. The following commands may be used
to control access to JES2 job and output group resources defined to the JESSPOOL resource
class as discussed in Section 13.2.1.7.24, Jobs, Output Group, and SYSIN/SYSOUT Data Sets:
ID(userid) ACCESS(ALTER)
The following commands may be used to control access to resources specific to the control of the
SDSF Server as discussed in Section 13.2.1.7.25, SDSF Server Operations:
13.2.3.3.7 MQ Controls
Refer to Section 4.3.3.2.4, Queue Security, for general controls regarding MQ queue resources in
a RACF environment. The following commands may be used to control access to MQ queue
resources defined to the MQQUEUE resource class as discussed in Section 13.2.1.7.26.1, Queue
Protection:
                                                                                                    209
                                        UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                         DISA Field Security Operations
21 January 2005                                                           Developed by DISA for the DOD
In the previous example, MQ-userid is the userid associated with the MQ started task.
Refer to Section 4.3.3.2.4, Queue Security, and Section 4.3.3.2.9, Command Security, for general
controls regarding MQ queue and command resources in a RACF environment. The following
commands may be used to control access to MQ queue definition authority resources as
discussed in Section 13.2.1.7.26.2, Queue Definition Authority:
210
                                        UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                          DISA Field Security Operations
21 January 2005                                                            Developed by DISA for the DOD
In the previous example, CSQ-oper-userid is the operator userid used by MQ for commands
entered from the console.
Refer to Section 4.3.3.2.3, Connection Security, general controls regarding connection security in
a RACF environment. The following commands may be used to control connect access to MQ
as discussed in Section 13.2.1.7.26.3, Connection Security:
Refer to Section 4.3.3.2.8, Context Security, general controls regarding context security in a
RACF environment. The following commands may be used to control access to identity data in
a message as discussed in Section 13.2.1.7.26.4, Context Security:
In the previous example, MQ-userid is the userid associated with the MQ started task.
This section describes the commands needed to implement the security requirements discussed
throughout Section 13.2, System Display and Search Facility, in a TOP SECRET environment.
The following task categories are described:
                                                                                                     211
                                         UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                       DISA Field Security Operations
21 January 2005                                                         Developed by DISA for the DOD
The following commands may be used to provide the required data set access controls
documented in Section 13.2.1.1, SDSF Data Set Protection:
The following commands may be used to define the required STC controls documented in
Section 3.4.2.3, Started Task Control (STC) Users:
•     (ZISFT360: CAT II) The IAO will create a TOP SECRET ACID named SDSF, or in the case
      of multiple SDSF servers, prefixed with SDSF.
This section describes the commands needed to implement the required controls for SDSF
resources and functions discussed in Section 13.2.1.7, SDSF Resource Protection.
The SDSF resource class is predefined in the TOP SECRET RDT. An administrator can give
default protection to SDSF resources by modifying the SDSF resource class entry in the RDT to
include the DEFPROT attribute. The following command may be used to assign default
protection to resources in the SDSF resource:
•     (ZISFT370: CAT II) The IAO will assign the DEFPROT attribute to the SDSF resource class
      entry in the TOP SECRET RDT.
The following commands may be used to control access to SDSF groups as discussed in Section
13.2.1.7.1, Membership in SDSF Groups. This example establishes default protection for SDSF
groups:
212
                                        UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                          DISA Field Security Operations
21 January 2005                                                            Developed by DISA for the DOD
This example presumes an SDSF group named sysprog is configured in ISFPARMS for an SDSF
server named sdsf. The following command may be used to permit access to the SDSF sysprog
group to systems programming personnel:
This section shows examples of security controls as discussed in the following general sections:
The following command may be used to establish default protection for resources defined to the
SDSF resource class:
The following commands may be used to permit access to SDSF resources that are restricted to
both operations personnel and systems programming personnel:
The following commands may be used to permit access to SDSF resources that are restricted to
systems programming personnel only:
The following commands may be used to permit access to SDSF resources that are permitted to
authorized SDSF end-users:
214
                                         UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                       DISA Field Security Operations
21 January 2005                                                         Developed by DISA for the DOD
          ACCESS(UPDATE)
       TSS PERMIT(end-user-group) SDSF(ISFATTR.OUTPUT.FLASH)
          ACCESS(UPDATE)
       TSS PERMIT(end-user-group) SDSF(ISFATTR.OUTPUT.FORMS)
          ACCESS(UPDATE)
       TSS PERMIT(end-user-group) SDSF(ISFATTR.OUTPUT.PRMODE)
          ACCESS(UPDATE)
       TSS PERMIT(end-user-group) SDSF(ISFATTR.OUTPUT.UCS)
          ACCESS(UPDATE)
       TSS PERMIT(end-user-group) SDSF(ISFATTR.OUTPUT.WRITER)
          ACCESS(UPDATE)
       TSS PERMIT(end-user-group) SDSF(ISFATTR.OUTDESC.)
          ACCESS(UPDATE)
       TSS PERMIT(end-user-group) SDSF(ISFATTR.JOB.PRTDEST)
          ACCESS(UPDATE)
       TSS PERMIT(end-user-group) SDSF(ISFOPER.ANYDEST.JES+)
          ACCESS(READ)
       TSS PERMIT(end-user-group) SDSF(ISFSE.) ACCESS(READ)
Refer to Section 3.4.5.6, OS/390 System Command Controls, and Section 5.4.5, Security Controls
for JES2 Commands, for general TOP SECRET controls regarding MVS and JES2 system
command resources respectively. The following commands may be used to permit access to
MVS and JES2 command resources for SDSF users, including end-users, as discussed in Section
13.2.1.7.8, MVS and JES2 Commands Generated by SDSF:
Refer to Section 5.4.3, Security Controls for Output, for general controls regarding printer and
punch resources in a TOP SECRET environment. The following commands may be used to
control access to JES2 printer and punch resources defined to the WRITER resource class as
discussed in Section 13.2.1.7.12, Printers and Punches:
216
                                         UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                         DISA Field Security Operations
21 January 2005                                                           Developed by DISA for the DOD
Refer to Section 5.4.4, Security Controls for JES2 SPOOL Data Sets, for general controls
regarding JES2 spool resources in a TOP SECRET environment. The following commands may
be used to control access to JES2 job and output group resources defined to the JESSPOOL
resource class as discussed in Section 13.2.1.7.24, Jobs, Output Group, and SYSIN/SYSOUT
Data Sets:
The following commands may be used to control access to resources specific to the control of the
SDSF Server as discussed in Section 13.2.1.7.25, SDSF Server Operations:
13.2.4.3.7 MQ Controls
Refer to Section 4.3.4.2.4, Queue Security, for general controls regarding MQ queue resources in
a TOP SECRET environment. The following commands may be used to control access to MQ
queue resources defined to the MQQUEUE resource class as discussed in Section 13.2.1.7.26.1,
Queue Protection:
                                                                                                    217
                                        UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                         DISA Field Security Operations
21 January 2005                                                           Developed by DISA for the DOD
In the previous example, MQ-acid is the ACID associated with the MQ started task.
Refer to Section 4.3.4.2.4, Queue Security, and Section 4.3.4.2.9, Command Security, for general
controls regarding MQ queue and command resources in a TOP SECRET environment. The
following commands may be used to control access to MQ queue definition authority resources
as discussed in Section 13.2.1.7.26.2, Queue Definition Authority:
In the previous example, CSQ-oper-acid is the operator ACID used by MQ for commands
entered from the console.
Refer to Section 4.3.4.2.3, Connection Security, for general controls regarding connection
security in a TOP SECRET environment. The following commands may be used to control
connect access to MQ as discussed in Section 13.2.1.7.26.3, Connection Security:
218
                                        UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                          DISA Field Security Operations
21 January 2005                                                            Developed by DISA for the DOD
Refer to Section 4.3.4.2.8, Context Security, for general controls regarding context security in a
TOP SECRET environment. The following commands may be used to control access to identify
data in a message as discussed in Section 13.2.1.7.26.4, Context Security:
In the previous example, MQ-acid is the ACID associated with the MFQF started task.
                                                                                                     219
                                         UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                             DISA Field Security Operations
21 January 2005                                                               Developed by DISA for the DOD
220
                                               UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                                DISA Field Security Operations
21 January 2005                                                                  Developed by DISA for the DOD
Systems management and control software serves many purposes. The most common purposes
include controlling production batch processing and automating operations functions. Systems
management products may be acquired separately or as integrated product suites.
All security and product interfaces must be carefully evaluated for possible system and data
integrity problems, and for potential security exposures. These include interfaces delivered with
the management and control software, and interfaces offered by other software packages that
may interact with the suite. These interfaces may offer their own internal security, provide the
potential to circumvent ACP security controls, or expose new or existing weaknesses in
protection.
Depending on the product, control access authority by using one of the following three methods:
Use ACP controls whenever possible. However, it may not be possible to provide a totally
secure environment using only ACP controls. In this case, the use of internal security may be
warranted and must be investigated for possible use. If it is determined that an enhanced level of
protection is gained that the ACP does not provide, the internal security may be activated. Under
no circumstances are base-level ACP controls compromised.
Use the following recommendations when securing access to systems management software:
(1)       Strictly control access to the on-line applications, and restrict access only to authorized
          personnel. Rigidly control the use of commands, options, and functions within the
          products. Restrict access only to those functions necessary for users to accomplish their
          assigned responsibilities.
(2)       Review all interfaces for possible system and data integrity problems, and for potential
          security exposures. Document any potential security exposures and notify DISA FSO.
The ACP controls access authority. Evaluate internal security for possible use, providing it does
not replace or compromise existing ACP security controls.
                                                                                                           221
                                              UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                            DISA Field Security Operations
21 January 2005                                                              Developed by DISA for the DOD
BMC’s INCONTROL for OS/390 is a suite of fully integrated products designed to automate,
manage, and streamline operations on the OS/390 platform. The following products from the
INCONTROL suite as standard components are included:
14.2.1 IOA
IOA acts as the installation path for the CONTROL-M and CONTROL-O products via the
INCONTROL Installation and Customization Engine (ICE). This process sets up and maintains
the INCONTROL operating environment. It is through the ICE process that system security is
specified. The system security product is specified once for the entire suite of products, not
during the installation of each product.
The ICE is an ISPF application consisting of a set of dialogs that provide a simplified method of
specifying data and creating installation jobs to install the INCONTROL products. Each activity
in the installation menu is invoked by selecting a product ID and an option number. The options
direct various activities during the installation of IOA. The options that directly affect security
are as follows:
SECURITY                  Option 5 of the Main menu. It allows the site to install IOA security
                          interfaces based on which resident ACP is installed (ACF2, RACF, or TOP
                          SECRET). The security product is specified during the IOA installation
                          process using the SECURITY installation parameter.
CUSTOMIZE                 Option 6 of the Main menu. This selection is used to customize certain
                          INCONTROL product operational parameters and other activities that affect
                          the operation of the INCONTROL products.
Once a major installation activity is selected from the Main menu, secondary screens are
displayed listing all the major and minor steps associated with the selected activity.
The IOA common security services module, IOASECUR, is invoked each time an INCONTROL
product requires a security service (such as creating the security environment, checking a user's
authority, extracting user information, or deleting a security environment). Module IOASECUR
is installed during the installation of IOA.
222
                                             UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                          DISA Field Security Operations
21 January 2005                                                            Developed by DISA for the DOD
The Extended Definition security mode for the IOA common components is implemented at all
sites. The Extended Definition mode grants each user discrete access for a specific action to a
protected item. A user granted access to an item may be granted or denied any action (add,
change, and update) separately. This mode requires the Administrator to define additional
access rules, as for each action there is an associated resource structure. However, it provides
the maximum flexibility and accuracy for granting authorizations.
The following table lists the IOA resources protected with Extended Definition mode enabled:
                        $$IOADIR.qname.
                        $$IOAVIW.qname.mem
                        $$IOAEDT.qname.mem
                        $$IOASAV.qname.mem
                        $$IOADEL.qname.mem
                                                                                                     223
                                           UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                              DISA Field Security Operations
21 January 2005                                                                Developed by DISA for the DOD
Use the following implementation and security recommendations for the IOA common
component:
(2)    Install IOA to use the resident ACP (ACF2, RACF, or TOP SECRET). Specify the ACP
       during the installation of IOA using the SECURITY option from the main ICE menu.
(3)    Using ICE, specify the following STIG standard values for the IOA security parameters for
       all ACP environments. Additional IOA security parameters with standard values specific
       to the ACP are documented in Sections 14.3.1 (ACF), 14.4.1 (RACF), and 14.5.1 (TOP
       SECRET):
Table B-52. IOA SECURITY PARAMETERS FOR ALL ACP ENVIRONMENTS (14.2.1 b)
(4)    IOA security exits are not modified by the site. If a modification is deemed necessary, it
       must be pre-approved by DISA FSO. A final source code review must be performed by
       DISA FSO prior to the implementation of the modified exit into a production environment.
(5)    Access to the IOA Online facility and other IOA resources listed in the IOA EXTENDED
       DEFINITION SECURITY CALLS table is restricted to system-level support personnel.
       Authorized personnel include systems programmers, system operators, automation
       operators, and production control staff.
       With the granularity and flexibility Extended Definition mode provides, access
       authorization to IOA resources outside the system-level support realm may be permitted for
       the purposes of job scheduling (i.e., CONTROL-M) only. For these authorized users, the
       following recommendations are in effect:
       In addition, access to IOA resources allowing the issuing of system commands (i.e.,
       $$IOACMD.qname.cmndtext) comply with the recommendations documented in Section
       3.1.5.6, OS/390 System Command Controls, to include authorization and logging.
(6)    Restrict access to IOA product data sets to system-level support personnel and IOA product
       suite of STCs. Authorized personnel include systems programmers, system operators,
       automation operators, and production control staff. More specifically:
- Alter access to IOA product data sets are restricted to systems programmers.
       -   Update access to IOA Base, Installation, and Maintenance libraries is restricted to the
           systems programmers.
                                                                                                       225
                                           UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                                 DISA Field Security Operations
21 January 2005                                                                   Developed by DISA for the DOD
       As noted in the previous item, access authorization to IOA resources outside the system-
       level support realm may be permitted for the purposes of job scheduling (i.e.,
       CONTROL-M) only. For these authorized users, , the following recommendations are in
       effect:
- Data set access rules are fully qualified and not generic in nature.
- Update access to IOA Core, Repository, and Operations files is permitted and logged.
       -   Program pathing is in effect to ensure data set access is performed using INCONTROL
           products.
       -   Justification documentation with IAO approval is required and must be filed with the
           IAO.
•     (ZIOA0010: CAT II) The IAO will ensure that IOA product data sets are protected in
      accordance with STIG requirements.
•     (ZIOA0022: CAT II) The IAO will ensure that IOA product security exits are installed and
      configured in accordance with STIG requirements.
•     (ZIOA0032: CAT II) The IAO will ensure that IOA security parameter values are specified
      in accordance with STIG requirements.
14.2.2 CONTROL-O
226
                                           UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                              DISA Field Security Operations
21 January 2005                                                                Developed by DISA for the DOD
The following table contains CONTROL-O operational parameters that have relevance to the
security of the product and depicts the STIG required values:
The Extended Definition security mode for CONTROL-O is implemented at all sites. The
Extended Definition mode grants each user discrete access for a specific action to a protected
item. A user granted access to an item may be granted or denied any action (add, change, and
update) separately. This mode requires the Administrator to define additional access rules, as for
each action there is an associated resource structure. However, it provides the maximum
flexibility and accuracy for granting authorizations.
                                                                                                         227
                                             UNCLASSIFIED
 OS/390 & z/OS STIG, V5R1, Volume 2                                     DISA Field Security Operations
 21 January 2005                                                       Developed by DISA for the DOD
 The following table lists the CONTROL-O resources protected with Extended Definition mode
 enabled:
 228
                                       UNCLASSIFIED
 OS/390 & z/OS STIG, V5R1, Volume 2                                           DISA Field Security Operations
 21 January 2005                                                             Developed by DISA for the DOD
                                                                                                       229
                                           UNCLASSIFIED
 OS/390 & z/OS STIG, V5R1, Volume 2                                              DISA Field Security Operations
 21 January 2005                                                                Developed by DISA for the DOD
        In the above entities, msg-text or command-text represents the first 26 characters of the
        command text (or message text). Note the following regarding the text of commands and
        messages within ACF2 entities:
 (2)    Install CONTROL-O to use the resident ACP (ACF2, RACF, or TOP SECRET). Specify
        the ACP during the installation of IOA using the SECURITY option from the main ICE
        menu.
 (1)    Using ICE, specify the following STIG required values for the CONTROL-O security
        parameters for all ACP environments:
 230
                                             UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                          DISA Field Security Operations
21 January 2005                                                            Developed by DISA for the DOD
(4)    CONTROL-O security exits are not modified by the site. If a modification is deemed
       necessary, it must be pre-approved by DISA FSO. A final source code review must be
       performed by DISA FSO prior to the implementation of the modified exit into a production
       environment.
(6)     Restrict access to CONTROL-O product sets to systems programmers, system operators,
        automation operators, and IOA product suite of STCs only. More specifically:
•     (ZIOA0010: CAT II) The IAO will ensure that IOA product data sets are protected in
      accordance with STIG requirements.
•     (ZIOA0024: CAT II) The IAO will ensure that Control-O product security exits are installed
      and configured in accordance with STIG requirements.
•     (ZIOA0034: CAT II) The IAO will ensure that Control-O Operational parameter values are
      specified in accordance with STIG requirements.
•     (ZIOA0036: CAT II) The IAO will ensure that Control-O Security parameter values are
      specified in accordance with STIG requirements.
                                                                                                     231
                                           UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                              DISA Field Security Operations
21 January 2005                                                                Developed by DISA for the DOD
14.2.3 CONTROL-M
The Extended Definition security mode for CONTROL-M is implemented at all sites. The
Extended Definition mode grants each user discrete access for a specific action to a protected
item. A user granted access to an item may be granted or denied any action (add, change, and
update) separately. This mode requires the Administrator to define additional access rules, as for
each action there is an associated resource structure. However, it provides the maximum
flexibility and accuracy for granting authorizations.
The following table lists the CONTROL-M resources protected with Extended Definition mode
enabled:
232
                                                UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                                   DISA Field Security Operations
21 January 2005                                                                     Developed by DISA for the DOD
                                                                                                              233
                                                  UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                             DISA Field Security Operations
21 January 2005                                                               Developed by DISA for the DOD
(1) Install and maintain the CONTROL-M product software using SMP/E.
(2)    Install CONTROL-M to use the resident ACP (ACF2, RACF, or TOP SECRET). Specify
       the ACP during the installation of IOA using the SECURITY option from the main ICE
       menu.
(1)    Using ICE, specify the following STIG required values for the CONTROL-M security
       parameters for all ACP environments. Additional CONTROL-M security parameters with
       standard values specific to the ACP are documented in sections 14.3.3 (ACF), 14.4.3
       (RACF), and 14.5.3 (TOP SECRET):
(4)    CONTROL-M security exits are not modified by the site. If a modification is deemed
       necessary, it must be pre-approved by DISA FSO. A final source code review must be
       performed by DISA FSO prior to the implementation of the modified exit into a production
       environment.
       With the granularity and flexibility Extended Definition mode provides, access
       authorization to CONTROL-M resources outside the system-level support realm may be
       permitted. For these authorized users, the following recommendations will be in effect:
- Access will be granted to specific individuals and not at the group level.
- Resource access rules will be fully qualified and not generic in nature.
       -   Justification documentation with IAO approval is required and must be filed with the
           IAO.
234
                                           UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                              DISA Field Security Operations
21 January 2005                                                                Developed by DISA for the DOD
(6)    Restrict access to CONTROL-M product data sets to system-level support personnel and
       IOA product suite of STCs. Authorized personnel include systems programmers, system
       operators, and production control staff. More specifically:
       As noted in the previous item, access authorization to CONTROL-M resources outside the
       system-level support realm may be permitted. For these authorized users, the following
       recommendations will be in effect:
- Access will be granted to specific individuals and not at the group level.
- Data set access rules will be fully qualified and not generic in nature.
       -   Update access to CONTROL-M Repository and Operations files will be permitted and
           logged.
       -   Program pathing will be in effect to ensure data set access is performed using
           INCONTROL products.
       -   Justification documentation with IAO approval is required and must be filed with the
           IAO.
•     (ZIOA0010: CAT II) The IAO will ensure that IOA product data sets are protected in
      accordance with STIG requirements.
•     (ZIOA0026: CAT II) The IAO will ensure that Control-M product security exits are installed
      and configured in accordance with STIG requirements.
•
•     (ZIOA0038: CAT II) The IAO will ensure that Control-M Security parameter values are
      specified in accordance with STIG requirements.
14.3 ACF2
The following sections define the ACF2 security requirements for the INCONTROL products.
                                                                                                         235
                                           UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                                 DISA Field Security Operations
21 January 2005                                                                   Developed by DISA for the DOD
14.3.1 IOA
In addition to the general security recommendations discussed in Section 14.2.1, the following
items outline ACF2 specific recommendations for the IOA component:
(1)    Using ICE, specify the following required standard values for the IOA security parameters
       on all ACF2 domains:
NOTE: Additional IOA security parameters with STIG standard values are required to be
           specified. These parameters and values are independent of the ACP and are referenced
           in the general IOA section (14.2.1).
(2)    If the IOA Online Monitor (IOAOMON) and VTAM Monitor (IOAVMON) are installed,
       define the logonids IOAOMON and IOAVMON for the started tasks of the same name
       with the following attributes:
           MUSASS
           NO-SMC
           STC
236
                                              UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                           DISA Field Security Operations
21 January 2005                                                             Developed by DISA for the DOD
(3)    For ACF2 environments, the STIG recommended resource class is IOAFAC and the STIG
       recommended resource type is IOA for all INCONTROL product resources. Edit and
       customize member IOASSAF5 in the IOA INSTALL library. This member contains ACF2
       commands that, by vendor default, translate the SAF resource class FACILITY to ACF2
       resource type CMF. Change all instances of FACILITY to IOAFAC and CMF to IOA in
       member IOASSAF5.
       Within the ACF2 database, define a CLASMAP record to translate resource class IOAFAC
       to resource type IOA. For example:
(4)    Using specific and generic ACF2 resource rules for TYPE(IOA), protect all the IOA
       resources listed in the table in Section 14.2.1, IOA. At the minimum all resource rules must
       be defined to include the entire first node of the IOA resource it is protecting. All rules
       specify a default access of prevent.
       Limit access to IOA resources as stated in Paragraph (5) of Section 14.2.1, IOA. Pay
       special attention to resources $$IOAONLINE and $$IOACMD as they control access to
       the IOA Online Facility and the issuing of operator commands respectively. For example:
           $KEY($$IOAONLINE) TYPE(IOA)
           qname UID(user1) ALLOW
           UID(sys-prog-grp) ALLOW
           UID(ops-grp) ALLOW
           UID(prod-cntl-grp) ALLOW
           - UID(-) PREVENT
           $KEY($$ADDCND) TYPE(IOA)
           qname.condition UID(user1)
           UID(prod-cntl-grp) ALLOW
           UID(ops-grp) ALLOW
           - UID(-) PREVENT
           $KEY($$IOACMD) TYPE(IOA)
           S.- UID(ops-grp) LOG
           qname.D.J.myjobs- UID(user1) ALLOW
           D.J- UID(prod-cntl-grp) ALLOW
           D.- UID(sys-prog-grp) ALLOW
           D.- UID(ops-grp) ALLOW
           - UID(-) PREVENT
(5)    Protect all IOA product data sets using ACF2 data set rules. Limit access to IOA data sets
       as stated in Paragraph 6, Section 14.2.1. All rules specify a default access of prevent.
                                                                                                      237
                                          UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                          DISA Field Security Operations
21 January 2005                                                            Developed by DISA for the DOD
       For authorized users outside the system-support realm access to IOA data sets is permitted
       using program pathing and logging. The following example permits user access to the IOA
       Conditions file only when using INCONTROL products:
           $KEY(sys2.ioa)
           -.cnd UID(user1) LIBRARY(sys2a.ioa.loadlib) PGM(IOA-)
           READ(A) WRITE(L)
           -.cnd UID(user1) LIBRARY(sys2a.ioa.loadlib) PGM(CTM-)
           READ(A) WRITE(L)
•     (ZIOA0040: CAT II) The IAO will ensure that IOA product resources are protected in
      accordance with STIG requirements.
•     (ZIOA0050: CAT II) The IAO will ensure that IOA product started tasks are defined in
      accordance with STIG requirements.
14.3.2 CONTROL-O
In addition to the general security recommendations discussed in Section 14.2.2, the following
items outline ACF2 specific recommendations for CONTROL-O:
(1)    Define the logonids CONTROLO and CTOSRVxx for the started tasks of the same name
       with the following attributes:
           MUSASS
           STC
           NO-SMC
(2)    Using specific and generic ACF2 resource rules for TYPE(IOA), protect all the
       CONTROL-O resources listed in the table in Section 14.2.2. At the minimum all resource
       rules must be defined to include the entire first node of the CONTROL-O resource it is
       protecting. All rules specify a default access of prevent.
           $KEY($$CTOORD) TYPE(IOA)
           UID(sys-prog-grp) ALLOW
           UID(ops-grp) ALLOW
           - UID(-) PREVENT
(3)    Protect all CONTROL-O product data sets using ACF2 data set rules. Limit access to
       CONTROL-O data sets to systems programming personnel and operations personnel only.
       All rules specify a default access of prevent.
238
                                         UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                                DISA Field Security Operations
21 January 2005                                                                  Developed by DISA for the DOD
•     (ZIOA0040: CAT II) The IAO will ensure that IOA product resources are protected in
      accordance with STIG requirements.
•     (ZIOA0050: CAT II) The IAO will ensure that IOA product started tasks are defined in
      accordance with STIG requirements.
14.3.3 CONTROL-M
In addition to the general security recommendations discussed in Section 14.2.3, the following
items outline ACF2 specific recommendations for CONTROL-M:
(1)    Using ICE, specify the following STIG required values for the CONTROL-M security
       parameters on all ACF2 domains:
NOTE:          Additional CONTROL-M security parameters with STIG standard values are
               required to be specified. These parameters and values are independent of the ACP
               and are referenced in the general CONTROL-M Section 14.2.3.
(2)    Define the logonids CONTROLM and CONTDAY for the started tasks of the same name
       with the following attributes:
           MUSASS
           NO-SMC
           STC
(3)    Using specific and generic ACF2 resource rules for TYPE(IOA), protect all the
       CONTROL-M resources listed in the table in Section 14.2.3. At the minimum all resource
       rules must be defined to include the entire first node of the CONTROL-M resource it is
       protecting. All rules specify a default access of prevent.
       Limit access to CONTROL-M resources as stated in Section 14.2.3, Paragraph (5). For
       example:
                                                                                                           239
                                             UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                         DISA Field Security Operations
21 January 2005                                                           Developed by DISA for the DOD
           $KEY($$CTMPNL3) TYPE(IOA)
           qname UID(user1) ALLOW
           UID(sys-prog-grp) ALLOW
           UID(ops-grp) ALLOW
           UID(prod-cntl-grp) ALLOW
           - UID(-) PREVENT
           $KEY($$STCORD) TYPE(IOA)
           UID(sys-prog-grp) ALLOW
           UID(ops-grp) ALLOW
           - UID(-) PREVENT
           $KEY($$JOB1ACT)
           qname.owner UID(user1)
           UID(prod-cntl-grp)
           - UID(-) PREVENT
(4)    Protect all CONTROL-M product data sets using ACF2 data set rules. Limit access to
       CONTROL-M data sets as stated in Paragraph 6, Section 14.2.3. All rules specify a
       default access of prevent.
       For authorized users outside the system-support realm access to CONTROL-M data sets is
       permitted using program pathing and logging. The following example permits a user
       access to the CONTROL-M Active Job file only when using INCONTROL products:
           $KEY(sys2.ioa)
           -.ckp UID(user1) LIBRARY(sys2a.ioa.loadlib) PGM(IOA-)
           READ(A) WRITE(L)
           -. ckp UID(user1) LIBRARY(sys2a.ioa.loadlib) PGM(CTM-)
           READ(A) WRITE(L)
•     (ZIOA0040: CAT II) The IAO will ensure that IOA product resources are protected in
      accordance with STIG requirements.
•     (ZIOA0050: CAT II) The IAO will ensure that IOA product started tasks are defined in
      accordance with STIG requirements.
14.4 RACF
The following sections define the RACF security requirements for the INCONTROL products.
14.4.1 IOA
In addition to the general security recommendations discussed in Section 14.2.1, IOA, the
following items outline RACF specific recommendations for the IOA component:
240
                                         UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                                 DISA Field Security Operations
21 January 2005                                                                   Developed by DISA for the DOD
(1)    Using ICE, specify the following STIG required values for the IOA security parameters on
       all RACF domains:
NOTE: Additional IOA security parameters with STIG standard values are required to be
           specified. These parameters and values are independent of the ACP and are referenced
           in Section 14.2.1, IOA (general IOA section).
(2)    If the IOA Online Monitor (IOAOMON) and VTAM Monitor (IOAVMON) are installed,
       define the userids IOAOMON and IOAVMON for the started tasks of the same name. The
       Default Group for these userids is a group for INCONTROL product STCs only.
       Define a matching profile for the IOAOMON and IOAVMON STCs to the STARTED
       resource class with no special attributes. For example:
                                                                                                            241
                                              UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                            DISA Field Security Operations
21 January 2005                                                              Developed by DISA for the DOD
(3)    For RACF environments, the STIG recommended resource class is $IOA for all
       INCONTROL product resources. If not previously performed, the $IOA resource class
       must be added to the RACF Class Descriptor Table and the RACF Router Table. Use the
       following macro examples to add the $IOA resource class to RACF:
                  ICHERCDE
                     CLASS=$IOA,
                     ID=n,
                     MAXLNTH=39,
                     POSIT=n,
                     OTHER=ANY,
                     RACLIST=ALLOWED,
                     OPER=NO,
                     DEFTUACC=NONE
                  ICHRFRTB
                     CLASS=$IOA,
                     ACTION=RACF
(4)    Using specific and generic RACF resource profiles defined to the $IOA resource class,
       protect all the IOA resources listed in the table in Section 14.2.1, IOA. At the minimum all
       resource profiles must be defined to include the entire first node of the IOA resource it is
       protecting. All profiles specify a universal access of none.
       Limit access to IOA resources as stated in Section 14.2.1, Paragraph (5). Pay special
       attention to resources $$IOAONLINE and $$IOACMD as they control access to the IOA
       Online Facility and the issuing of operator commands respectively. For example:
242
                                           UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                              DISA Field Security Operations
21 January 2005                                                                Developed by DISA for the DOD
(5)    Protect all IOA product data sets using RACF data set profiles. Limit access to IOA data
       sets as stated in Section 14.2.1, Paragraph (6). All profiles specify a universal access of
       none.
       For authorized users outside the system-support realm access to IOA data sets is permitted
       using program pathing and logging.
       (a)    In order for program pathing to work, the IOA load library must be defined as a
              controlled library to RACF. For example:
       (b)    Data set logging is specified in the RACF data set profile. Therefore a fully qualified
              data set profile must be defined to limit logging to the specific data set. For example,
              to enable update logging for the IOA Conditions file use the following command:
                                                                                                         243
                                            UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                            DISA Field Security Operations
21 January 2005                                                              Developed by DISA for the DOD
NOTE: There is no way to limit data set logging to only certain users such as authorized users
             outside the system-support realm.
       (c)    Permit user access to the IOA Conditions file only when using INCONTROL
              products. For example:
•     (ZIOA0040: CAT II) The IAO will ensure that IOA product resources are protected in
      accordance with STIG requirements.
•     (ZIOA0050: CAT II) The IAO will ensure that IOA product started tasks are defined in
      accordance with STIG requirements.
14.4.2 CONTROL-O
(1)    Define the userids CONTROLO and CTOSRVxx for the started tasks of the same name.
       The Default Group for these userids is a group for INCONTROL product STCs only.
(2)    Define a matching profile for the CONTROLO and CTOSRVxx STCs to the STARTED
       resource class with no special attributes. For example:
(3)    Using specific and generic RACF resource profiles defined to the $IOA resource class,
       protect all the CONTROL-O resources listed in the table in Section 14.2.2, CONTROL-O.
       At the minimum all resource profiles must be defined to include the entire first node of the
       CONTROL-O resource it is protecting. All profiles specify a universal access of none.
244
                                           UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                                DISA Field Security Operations
21 January 2005                                                                  Developed by DISA for the DOD
(4)    Protect all CONTROL-O product data sets using RACF data set profiles. Limit access to
       CONTROL-O data sets to systems programming personnel and operations personnel only.
       All profiles specify a universal access of none.
•     (ZIOA0040: CAT II) The IAO will ensure that IOA product resources are protected in
      accordance with STIG requirements.
•     (ZIOA0050: CAT II) The IAO will ensure that IOA product started tasks are defined in
      accordance with STIG requirements.
14.4.3 CONTROL-M
(1)    Using ICE, specify the following STIG required values for the CONTROL-M security
       parameters on all RACF domains:
NOTE: Additional CONTROL-M security parameters with STIG required values are to be
          specified. These parameters and values are independent of the ACP and are referenced
          in the general CONTROL-M section (Section 14.2.3).
(2)    Define the userids CONTROLM and CONTDAY for the started tasks of the same name.
       The Default Group for these userids is a group for INCONTROL product STCs only.
       Utilize propagation control for both CONTROL-M started tasks. The following commands
       may be used to define the CONTROLM and CONTDAY STC userids to the PROPCNTL
       resource class:
       The PROPCNTL resource class must be active and RACLISTed for this protection to be in
       effect. For example:
           SETROPTS CLASSACT(PROPCNTL)
           SETROPTS RACLIST(PROPCNTL)
(3)    Define a matching profile for the CONTROLM and CONTDAY STCs to the STARTED
       resource class with no special attributes. For example:
(4)    Using specific and generic RACF resource profiles defined to the $IOA resource class,
       protect all the CONTROL-M resources listed in the table in Section 14.2.3, CONTROL-M.
       At the minimum all resource profiles must be defined to include the entire first node of the
       CONTROL-M resource it is protecting. All profiles specify a universal access of none.
       Limit access to CONTROL-M resources as stated in Section 14.2.3, Paragraph (5). For
       example:
246
                                          UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                              DISA Field Security Operations
21 January 2005                                                                Developed by DISA for the DOD
(5)    Protect all CONTROL-M product data sets using RACF data set profiles. Limit access to
       CONTROL-M data sets as stated in Section 14.2.3, Paragraph (6). All profiles specify a
       universal access of none.
       For authorized users outside the system-support realm access to CONTROL-M data sets is
       permitted using program pathing and logging.
       (a)    In order for program pathing to work, the IOA load library must be defined as a
              controlled library to RACF. For example:
       (b)    Data set logging is specified in the RACF data set profile. Therefore a fully qualified
              data set profile must be defined to limit logging to the specific data set. For example,
              to enable update logging for the CONTROL-M Active Job file use the following
              command:
NOTE: There is no way to limit data set logging to only certain users such as authorized users
             outside the system-support realm.
       (c)    Permit user access to the CONTROL-M Active Job file only when using
              INCONTROL products. For example:
•     (ZIOA0040: CAT II) The IAO will ensure that IOA product resources are protected in
      accordance with STIG requirements.
•     (ZIOA0050: CAT II) The IAO will ensure that IOA product started tasks are defined in
      accordance with STIG requirements.
                                                                                                         247
                                            UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                                 DISA Field Security Operations
21 January 2005                                                                   Developed by DISA for the DOD
The following sections define the TOP SECRET security requirements for the INCONTROL
products.
14.5.1 IOA
In addition to the general security recommendations discussed in Section 14.2.1, IOA, the
following items outline TOP SECRET specific recommendations for the IOA component:
(1)    Using ICE, specify the following STIG required values for the IOA security parameters on
       all TOP SECRET domains:
NOTE: Additional IOA security parameters with STIG standard values are required to be
           specified. These parameters and values are independent of the ACP and are referenced
           in the general IOA section (Section 14.2.1).
248
                                             UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                         DISA Field Security Operations
21 January 2005                                                           Developed by DISA for the DOD
(2)    Define IOA as a Facility to TOP SECRET in the Facility Matrix table using the following
       example:
           FACILITY(USERxx=NAME=IOA)
           FACILITY(IOA=MODE=FAIL,ACTIVE,SHRPRF,SIGN(S))
           FACILITY(IOA=PGM=IOA,ASUBM,NOABEND,NOXDEF)
           FACILITY(IOA=ID=nn,MULTIUSER,RES,LUMSG,STMSG,WARNPW)
           FACILITY(IOA=NORNDPW,NOAUDIT,NOTSOC)
•     (ZIOAT060: CAT II) IOA will be defined to TOP SECRET in the Facility Matrix Table using
      the above parameters.
(3)    If the IOA Online Monitor (IOAOMON) and VTAM Monitor (IOAVMON) are installed,
       define the ACIDs IOAOMON and IOAVMON for the started tasks of the same name.
            TSS CREATE(IOAOMON) NAME('IOA ONLINE MONITOR')
               TYPE(USER) DEPT(dept-acid) PASS(password,0) FAC(STC)
                  MASTFAC(IOA) SOURCE(INTRDR)
(4)    For TOP SECRET environments, the STIG recommended resource class is IOA for all
       INCONTROL product resources. If not previously performed, the IOA resource class must
       be added to the TOP SECRET Resource Definition Table (RDT). Use the following
       command example to add the IOA resource class to the RDT:
(5)    Protect all the IOA resources listed in the table in Section 14.2.1, IOA, using TOP
       SECRET. Assign ownership of the IOA resources specifying the appropriate department
       ACID and IOA resource class. For example:
                                                                                                    249
                                         UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                             DISA Field Security Operations
21 January 2005                                                               Developed by DISA for the DOD
       Using specific and generic TOP SECRET permissions, limit access to IOA resources as
       stated in Section 14.2.1, Paragraph (5). At the minimum all resource permissions must be
       defined to include the entire first node of the IOA resource it is protecting. Default access
       to IOA resources is not allowed. Pay special attention to resources $$IOAONLINE and
       $$IOACMD as they control access to the IOA Online Facility and the issuing of operator
       commands respectively. For example:
(6)    Protect all IOA product data sets using TOP SECRET. Limit access to IOA data sets as
       stated in Section 14.2.1, Paragraph (6). Default access is not allowed.
       For authorized users outside the system-support realm access to IOA data sets is permitted
       using program pathing and logging. The following example permits user access to the IOA
       Conditions file only when using INCONTROL products:
•     (ZIOA0040: CAT II) The IAO will ensure that IOA product resources are protected in
      accordance with STIG requirements.
•     (ZIOA0050: CAT II) The IAO will ensure that IOA product started tasks are defined in
      accordance with STIG requirements.
250
                                           UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                       DISA Field Security Operations
21 January 2005                                                         Developed by DISA for the DOD
14.5.2 CONTROL-O
(1)    Define CONTROLO as a Facility to TOP SECRET in the Facility Matrix table using the
       following example:
           FACILITY(USERxx=NAME=CONTROLO)
           FACILITY(CONTROLO=MODE=FAIL,ACTIVE,SHRPRF,SIGN(S))
           FACILITY(CONTROLO =PGM=CTO,ASUBM,NOABEND,NOXDEF)
           FACILITY(CONTROLO=ID=nn,MULTIUSER,RES,LUMSG,STMSG)
           FACILITY(CONTROLO =NORNDPW,NOAUDIT,NOTSOC,WARNPW)
(2) Define the ACIDs CONTROLO and CTOSRVxx for the started tasks of the same name.
•     (ZIOAT060: CAT II) IOA will be defined to TOP SECRET in the Facility Matrix Table using
      the above parameters.
(4)    Protect all the CONTROL-O resources listed in the table in Section 14.2.2, CONTROL-O,
       using TOP SECRET. Assign ownership of the CONTROL-O resources specifying the
       appropriate department ACID and IOA resource class. For example:
                                                                                                  251
                                        UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                                DISA Field Security Operations
21 January 2005                                                                  Developed by DISA for the DOD
       Using specific and generic TOP SECRET permissions, limit access to CONTROL-O
       resources to systems programming personnel and operations personnel only. At the
       minimum all resource permissions must be defined to include the entire first node of the
       CONTROL-O resource it is protecting. Default access to CONTROL-O resources is not
       allowed. For example:
(5)    Protect all CONTROL-O product data sets using TOP SECRET. Limit access to
       CONTROL-O data sets to systems programming personnel and operations personnel only.
       Default access is not allowed.
•     (ZIOA0040: CAT II) The IAO will ensure that IOA product resources are protected in
      accordance with STIG requirements.
•     (ZIOA0050: CAT II) The IAO will ensure that IOA product started tasks are defined in
      accordance with STIG requirements.
14.5.3 CONTROL-M
(1)    Using ICE, specify the following STIG required values for the CONTROL-M security
       parameters on all TOP SECRET domains:
NOTE: Additional CONTROL-M security parameters with STIG required values are to be
          specified. These parameters and values are independent of the ACP and are referenced
          in Section 14.2.3, CONTROL-M (the general CONTROL-M section).
252
                                             UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                       DISA Field Security Operations
21 January 2005                                                         Developed by DISA for the DOD
(2)    Define CONTROLM as a Facility to TOP SECRET in the Facility Matrix table using the
       following example:
           FACILITY(USERxx=NAME=CONTROLM)
           FACILITY(IOA=MODE=FAIL,ACTIVE,SHRPRF,SIGN(S))
           FACILITY(IOA=PGM=CTM,ASUBM,NOABEND,NOXDEF)
           FACILITY(IOA=ID=nn,MULTIUSER,RES,LUMSG,STMSG,WARNPW)
           FACILITY(IOA=NORNDPW,NOAUDIT,NOTSOC)
•     (ZIOAT060: CAT II) IOA will be defined to TOP SECRET in the Facility Matrix Table using
      the above parameters.
(3) Define the ACIDs CONTROLM and CONTDAY for the started tasks of the same name.
       Utilize propagation control for both CONTROL-M started tasks. The following commands
       may be used to define the CONTROLM and CONTDAY STC ACIDs to the PROPCNTL
       resource class:
(5)    Protect all the CONTROL-M resources listed in the table in Section 14.2.3, CONTROL-M,
       using TOP SECRET. Assign ownership of the CONTROL-M resources specifying the
       appropriate department ACID and IOA resource class. For example:
                                                                                                  253
                                        UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                         DISA Field Security Operations
21 January 2005                                                           Developed by DISA for the DOD
       Using specific and generic TOP SECRET permissions, limit access to CONTROL-M
       resources as stated in Section 14.2.3, CONTROL-M, Paragraph (5). At the minimum all
       resource permissions must be defined to include the entire first node of the CONTROL-M
       resource it is protecting. Default access to CONTROL-M resources is not allowed. For
       example:
(6)    Protect all CONTROL-M product data sets using TOP SECRET. Limit access to
       CONTROL-M data sets as stated in Section 14.2.3, CONTROL-M, Paragraph (6). Default
       access is not allowed.
       For authorized users outside the system-support realm access to CONTROL-M data sets is
       permitted using program pathing and logging. The following example permits a user
       access to the CONTROL-M Active Job file only when using INCONTROL products:
•     (ZIOA0040: CAT II) The IAO will ensure that IOA product resources are protected in
      accordance with STIG requirements.
•     (ZIOA0050: CAT II) The IAO will ensure that IOA product started tasks are defined in
      accordance with STIG requirements.
254
                                         UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                          DISA Field Security Operations
21 January 2005                                                            Developed by DISA for the DOD
15.1 Overview
With the increased usage of the Internet and the migration to Open Systems, the role of the
mainframe has changed. Mainframes not only support the tremendous processing requirements
of legacy systems, but also serve as large repositories of data. Mainframe architecture and
technology has changed. Mainframes are able to run the UNIX operating system and
applications written in C and JAVA are supported.
Mainframes still provide a safe environment for processing sensitive systems and are becoming
more and more reliable in up time performance. This section addresses Web applications and the
systems software used to support their requirements.
15.2.1 Overview
The WebSphere Application Server (WAS) Standard Edition V3.5 is a Java application server
plug-in to the IBM HTTP server that uses the HTTP address space. When WebSphere is
installed, the HTTP configuration file is modified to enable the web server to redirect certain
requests to WebSphere for processing.
In a WebSphere environment, WAS is automatically started and shutdown when the HTTP web
server is started and stopped. The HTTP web server is responsible for providing the
communications link between browser-based applications and the application server. WAS
provides the run-time environment for enterprise beans, handles low-level programming tasks,
and interfaces with the OS/390 resources such as CICS and the databases.
WebSphere makes use of the Java development kit (JDK) and the JAVA Run-Time Environment
(JRE) to execute Java programs and web applications. (Also, it provides support for the creation
of an active web site and basic web applications.)
                                                                                                     255
                                         UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                           DISA Field Security Operations
21 January 2005                                                             Developed by DISA for the DOD
Whenever HTTP clients access web applications, they enter through the HTTP web server using
TCP/IP. The types of web server resources they access are HTML, images, and Common
Gateway Interface (CGI) programs. Java clients access WebSphere resources using Internet
Inter ORB Protocol (IIOP). WebSphere resources include Enterprise Java Beans (EJBs),
servlets, and Java Server Pages (JSPs). IIOP enables Java clients to locate and use objects across
platforms written in a variety of languages. IIOP is based on the Common Object Request
Broker Architecture CORBA industry standard.
The primary differences between the advanced edition and the standard edition are the support
for Enterprise Java Bean development, multiple server support, and additional features provided
by the WebSphere administration application. The Enterprise edition encompasses all of the
features of both the standard and advanced editions.
NOTE: This section primarily addresses WebSphere Application Server Standard Edition V3.5
           for OS/390. Wherever possible, WebSphere 4.0.1 for z/OS differences will be noted.
•     The web server application software and the WebSphere application server software will be
      a version supported by the vendor and appropriate to the host operating system of the server.
•     Web server resources will be protected in accordance with the Web and appropriate
      platform STIGs.
•     WebSphere Application Server resources will be protected in accordance with the Web and
      appropriate platform STIGs.
•     The Web Manager or SA will ensure that before installing the web server application, the
      server host platform operating system will be configured in accordance with the appropriate
      STIG.
•     The Web Manager or SA will ensure the WebSphere Application Server is configured such
      that a user cannot traverse from a document directory to a directory that does not contain
      web content.
•     The Web Manager or SA will ensure that each readable web document directory contains a
      default, home, index, or equivalent file.
•     The Web Manager or SA will ensure that the server root directory is not NFS mountable or
      sharable in the case of an NT server.
•     When using Java Servlets Engines or Java Server Pages, any sample files that accompany
      the product's installation will be removed.
•     When using Java Server Pages (JSPs), the IAO will ensure that all user-provided input is
      checked for malicious code.
256
                                           UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                            DISA Field Security Operations
21 January 2005                                                              Developed by DISA for the DOD
The WebSphere Application Server Standard Edition V3.5 does not interface with OS/390
security. It depends on the HTTP web server to perform this function. In addition, WebSphere
security is designed to sit on top of and compliment the operating system, Java-language, and
CORBA and EJB security. Under WebSphere V4.0.1 for z/OS the WebSphere Application
Server interfaces with the ACP.
The WebSphere Application Server provides security components that collaborate with other
elements to secure a WebSphere environment. Security is established at two levels. The first
level is global security. Global security applies to all applications running in the environment.
Global values are specified in the admin.config file.
The second level of security is application security. Application security can vary from
userid/password to PKI or a combination of both. In some cases, these values can override
global defaults. WAS values are specified in the was.config file. The WebSphere
Administrative Console is used to maintain the admin.config and the was.config files.
Security can be applied to applications and to individual resources. Setting up security involves
the following general steps:
•   The IAO and IAM, in coordination with the SA and Web Manager, will be responsible for
    ensuring that all IAVA bulletins are responded to within the specified time period.
•   The Web Manager or SA will ensure that before installing the web server application, the
    server host platform operating system will be configured in accordance with the appropriate
    STIG.
•   The Web Manager or SA will ensure that users do not have access to the JAVA development
    kit compiler in a production environment.
•   The IAO will ensure that in the case of web applications or java clients, services will, at a
    minimum, restrict the userid and password. Shared user accounts are not authorized.
•   The IAO will ensure that the web server password and the WebSphere application server
    password are entrusted to the SA or Web Manager.
•   The IAO will ensure that the web server and the application services passwords are changed
    at least annually.
•   Development servers will comply with the recommendations set forth in the Web Server STIG
    and the appropriate platform STIG.
                                                                                                       257
                                          UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                             DISA Field Security Operations
21 January 2005                                                               Developed by DISA for the DOD
•     Remote authors or content providers will not be able to upload files to the Document Root
      directory without the use of a secure logon and a secure connection.
•     The IAO will ensure that the admin.config file is password protected and access is restricted
      to authorized personnel.
•     The IAO will ensure that the was.config file is password protected and its access is restricted
      to authorized personnel.
•     The IAO will ensure that the WebSphere Administrative console is restricted to authorized
      personnel. Restrictions will be applied in accordance with the appropriate STIG.
Within the WebSphere Application Server, security requirements are defined in terms of:
1. Resources:
           Files or programs that require restricted access. They belong to an application and the
           methods are associated with method groups. Web pages, enterprise beans, servlets, and
           JSP files are examples of resources.
2. Applications:
•     Uniform Resource Identifier (URI) resources will be protected in accordance with the Web
      Server STIG.
•     Enterprise bean resources will be restricted by home and in accordance with the Web Server
      STIG and the appropriate platform STIG. (An Enterprise JAVA Bean is a cross platform
      component that enables the development and deployment of JAVA applications.)
•     Authentication and authorization policies for enterprise applications will be defined by the
      Web Administrator.
258
                                            UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                            DISA Field Security Operations
21 January 2005                                                              Developed by DISA for the DOD
•   Users will be required, at a minimum, to access WebSphere applications by the userid and
    password. Applications will specify this as Basic mode for application security.
WebSphere Application Server Standard Edition V3.5 security complements operating system,
Java-language, and CORBA and EJB security. Each of the above provides a security layer that
has been addressed in other STIGs (i.e., Web, UNIX, NT). WebSphere provides an
administration/security application and an administrative console to address WebSphere security.
NOTE: Because the architecture of the OS/390 system and security is different from the
           mid-tier platforms, some of the guidelines specified in the mid-tier STIGs may not
           apply. In that case, this section identifies the guideline.
The WebSphere Security Application is a security runtime consisting of two components: the
security plug-in and the security collaborator. The security plug-in is attached to the HTTP web
server and is used to control access to web resources such as HTML files and servlets. The
security collaborator is attached to the application server and is used to control access to methods
calls hosted by WAS.
Requests are submitted to WebSphere either through the HTTP server or through the application
server. The type of client and request determines whether the HTTP server or the WebSphere
application server processes the request. Web client requests are submitted through the HTTP
web server. Java clients submit requests through the application server. Both servers utilize the
security application and repository to determine authentication and authorization.
Whenever a web client submits a request to the HTTP server, the service directives within the
Web server's httpd.conf file indicate which requests the Application Server is to process. If the
requested URL matches a URL or URL pattern specified in a directive in the httpd.conf file, the
request is routed to the application server. The Application Server then uses the
webapp.webapp-name property in the was.config file to determine to which web application the
request should be routed.
Whenever a request is to be submitted to the application server by a Java client, the client is
prompted for a userid and password. The security collaborator authenticates the information
against the user registry. If the user is authorized, the method invocation request is authenticated
against the security policies as specified in security application repository. (The repository can
be a DB2 database or an LDAP directory.) The method is then executed and the results passed
back to the client.
                                                                                                       259
                                          UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                             DISA Field Security Operations
21 January 2005                                                               Developed by DISA for the DOD
•     The IAO or IAM will verify that local policies have been developed to ensure that all DOD
      originated information posted to the Internet and/or Intranet (i.e., Open and/or Limited or
      Certificate-based web servers) is reviewed and approved by the respective Deputy Director
      or Commander and as needed by the Public Affairs Officer (PAO).
•     The IAO or IAM will verify that local policies have been developed to ensure that all
      information that is hosted on a its site, which originated from a DOD or other Federal
      organization, has been reviewed and approved for posting by the originating organization
      according to the Web Site Administration Policies and Procedures, dated 25 November 1998.
•     The IAO or IAM will verify that the approval of the Chief Information Officer (CIO) is
      obtained prior to entering into any agreements with commercial Internet service providers or
      non-DOD web hosting services.
•     A Web Manager and a System Administrator will be appointed for each web server and
      administration server on the OS/390 platform. (The Web Manager may be an additional
      duty or a separate role.)
•     The httpd.conf and was.config files will be protected in accordance with requirements as
      specified in the Web Server STIG, the UNIX STIG, and the Windows Addendum.
•     The SA or Web Manager will ensure that the web server is configured to use a local or
      related .mil DNS service.
•     An Open web server will be isolated in accordance with the Enclave Security Instruction
      dated 30 March 2001. That is to say, an open web server will be on a separate public
      enclave (subnet), isolated from the internal systems.
•     An Open web server will not allow, or be allowed, a trust relationship with any asset that is
      not also in a separate public enclave.
•     A Limited or Certificate-based web server will be located inside the premise router or site
      firewall.
•     The Web Manager or SA will ensure that utility/productivity programs, development tools,
      and system files (both operating system and WebSphere/HTTP files) are not accessible
      through the production web and application servers.
•     The Web Manager will ensure the web and application servers are configured such that a
      user cannot traverse from a document directory to a directory that does not contain
      web/application content.
•     The Web Manager will ensure that each readable web/application document directory
      contains a default, home, index, or equivalent file.
260
                                           UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                          DISA Field Security Operations
21 January 2005                                                            Developed by DISA for the DOD
•   The IAO will ensure that access to the web and WebSphere administration tools are
    restricted to the Web Manager, SA, and/or the Web/SA Manager's designees.
•   The IAO will ensure that the SA or Web Manager performs all administrative tasks through a
    secure path.
•   Web/JAVA users, either anonymous or authenticated, will have their access restricted to
    web/application document (content) directories on the web and application servers.
•   The Web Manager or SA will ensure that logs of web/application server access and errors
    are established and maintained.
•   The IAO will ensure that the auditors are the only users with greater than read access to log
    files. This will not apply to the active log files.
Security server:
The security server controls security policies and provides authentication and authorization
services. The run-time components enforce these policies. In essence, the security server acts as
a trusted third-party for security policy and control. The runtime components consult the
security server for policy information and for services such as authentication and authorization,
including token services for Lightweight Third Party Authentication (LTPA). The security
server uses persistent storage (such as a DB2 database) to store its configuration information.
Security collaborator:
The security collaborator is a component of the application server process. It acts as a common
runtime environment for servlets, Java Server Pages (JSP) files, and enterprise beans. When a
Java client attempts to invoke a method on a servlet or an enterprise bean, the security
collaborator performs the authorization checking in conjunction with the security server.
                                                                                                     261
                                         UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                            DISA Field Security Operations
21 January 2005                                                              Developed by DISA for the DOD
Security plug-in:
The security plug-in resides with the Web server and protects access to HTML pages served by
the Web server. The security collaborator interfaces with the ACP security server to perform
userid and password authentication. When a Web resource is protected by WebSphere
Application Server security, the security plug-in consults the security server for authentication
and authorization services. If a client is authorized to use a URL, the plug-in sets up a security
context for the client, including the security credentials, and passes the request to the servlet
engine in the application server.
•     The IAO will ensure that Uniform Resource Identifier (URI) resources will be protected in
      accordance with the Web Server STIG.
• The IAO will ensure that the HelloWorld servlet will be removed from the server.
•     The IAO will ensure that Enterprise beans resource will be restricted by home and in
      accordance with the Web Server STIG and the appropriate platform STIG.
•     The Web Administrator will define the authentication and authorization policies for
      enterprise applications.
•     The Web Manager will ensure that each readable web/application document directory
      contains a default, home, index, or equivalent file.
•     The IAO will ensure that remote administration of an OS/390 WebSphere security
      application server will not be allowed.
•     The IAO will ensure that access to the web and WebSphere administration tools are
      restricted to the Web Manager, SA, and/or the Web/SA Manager's designees.
•     The IAO will ensure that the SA or Web Manager performs all administrative tasks through a
      secure path.
•     Web/JAVA users, either anonymous or authenticated, will have their access restricted to
      web/application document (content) directories on the web and application servers.
•     The Web Manager or SA will ensure that logs of web/application server access and errors
      are established and maintained.
•     The IAO will ensure that the auditors are the only users with greater than read access to log
      files. This will not apply to the active log files.
•     The IAO will ensure that the WebSphere Administrative Console is restricted to authorized
      personnel.
262
                                           UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                             DISA Field Security Operations
21 January 2005                                                               Developed by DISA for the DOD
•   The Web Manager or SA will ensure that the IBM WebSphere default administrator ID
    CBADMIN is not used. This includes the removal of the CBADMIN user ID from all
    appropriate configuration files. Additionally, the IAO will ensure that the CBADMIN user
    account is removed or not defined to the ACP.
•   (ZWAS0040: CAT I /CAT II) The IAO will ensure that the CBADMIN user account is
    removed or not defined to the ACP.
1. Define the user in the operating system user registry or in the LDAP directory service.
    2. Use the Assign Permissions task in the Security Task Group to authorize the user access
       to the protected functions. The functions are listed in the format
       AdminApplication-function_name in the task.
NOTE:
    -    On UNIX platforms use the root account.
    -    On Windows, the WebSphere administrator account must be a member of the Windows
         Administrators group and must have the rights to "Log on as a service" and to "Act as
         part of the operating system.”
    -    On Windows 2000, the WebSphere administrator account must be a member of the
         Windows 2000 Administrators group and must have the rights to "Log on as a service"
         and to "Act as part of the operating system."
    -    If using an LDAP directory service for authentication, then the process identity does not
         require any special privileges.
    -    Remote authors or content providers will not be able to upload files to the Document
         Root directory without the use of a secure logon and secure connection.
    -    Administrators must be limited to a minimal number of userids.
    -    Resource controls as specified in the appropriate STIG, (i.e., Database) will be restricted
         in accordance with the Resource STIG.
    -    The IAO will ensure that the appropriate class restrictions and file permissions are
         enforced for the servers and data sets.
                                                                                                        263
                                           UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                                DISA Field Security Operations
21 January 2005                                                                  Developed by DISA for the DOD
Passwords for administrative accounts are changed on a regular basis as specified in the Web
Server STIG and appropriate platform STIG. In order to do this, the passwords have to be
changed in two places, and in a particular order. If this is done incorrectly, it can create a
situation in which the WebSphere administrative server cannot restart. The following steps
describe the procedures for changing WebSphere Administrative Account passwords and the
order in which to apply the changes.
Steps:
      1. Make sure the WebSphere administrative server is running. This is crucial. Do not
         change an administrative password unless the server is running.
      2. Change the password in the user registry by using the utility for the operating system or
         LDAP service.
      3. Log on to the WebSphere administrative console using the new password. Attempts to
         use the old password will fail.
5. Change the password for the administrative user to the new password.
• The IAO will ensure that a Web Server Administration ID and its ACP group are established.
•     The IAO will ensure that a unique user ID is created for each instance of the web server.
      Refer to Section H.3.1.1, Web Server Identification, of the Web Server STIG for requirements
      regarding web server user IDs.
•     The IAO will restrict the anonymous access userid (PUBLIC) as it is specified in the Web
      Server STIG.
264
                                           UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                            DISA Field Security Operations
21 January 2005                                                              Developed by DISA for the DOD
Some of the vendor-supplied components of WebSphere for OS/390 are stored in data sets as
follows:
    -    Distribution data sets hold the master copy of the product's elements. There is no typical
         need for general users to access these data sets. The standard naming convention for
         these data sets is to use the prefix SYS1.
         Target data sets hold the execution copy of the product's elements. General users may
         require read access to some of these data sets.
The following table describes the products and data sets that interface with WebSphere V3.5:
•   Update and alter access to product data sets will be restricted to systems programming
    personnel.
The WebSphere Application Server uses the contents of the following libraries for resolving link
edits for the WebSphere Application Server. The following list identifies the libraries as
provided by IBM.
        SYS1.CSSLIB
        SYS1.LE.SCEELKED
        SYS1.LE.SCEELKEX
        SYS1.LE.SCEEOBJ
The following describes the data set prefix used for WebSphere V4.0.1:
SYS2.WAS.V401.xxxxxxx
•   (ZWAS0010: CAT II) The IAO will ensure that WebSphere server data sets restrict UPDATE
    and/or ALLOCATE access to systems programming personnel.
                                                                                                       265
                                          UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                          DISA Field Security Operations
21 January 2005                                                            Developed by DISA for the DOD
The WebSphere Application Server accesses multiple files and tables during execution. These
files provide WAS with the information necessary to determine how the Application Server
handles Web applications deployed within it. The following table lists files that are used by
WebSphere and a description of each:
•     (ZWAS0020: CAT II) The IAO will ensure that the above configurations are protected in
      accordance with the Web Server STIG, the UNIX STIG, and OS/390 STIG guidelines. Access
      will be restricted to authorized personnel.
•     The WebSphere Application Server files will have permissions of owner: read/write, group:
      read, and others: none (640) or more restrictive (configuration files need only read
      permission), where the group is the SA or Web Manager account that controls the web
      service.
• The Web server files will be protected in accordance with the Web Server STIG guidelines.
As mentioned earlier the admin.config file contains global values. This file is maintained by the
WebSphere Administration Application. Because this file contains passwords, it must be
restricted from view from non-authorized personnel. The following table is a layout of the
property files.
266
                                          UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                            DISA Field Security Operations
21 January 2005                                                              Developed by DISA for the DOD
Permission bit settings for the environment variables file and the directories and files specified in
environment variables are discussed in the Web Server STIG, Section H.3.3, Web Server HFS
Objects.
•   The IAO will ensure that the above property files are protected in accordance with the Web
    Server STIG, the UNIX STIG, and OS/390 STIG guidelines. Access will be restricted to
    authorized personnel.
•   The WebSphere Application Server Property files will have permissions of owner: read/write,
    group: read, and others: none (640) or more restrictive (configuration files need only read
    permission), where the group is the SA or Web Manager account that controls the web
    service.
•   The Web Manager and SA will ensure that the above property files are protected from
    manual editing.
• The IAO will ensure that the makeserver.sh program is restricted to authorized personnel.
The following path entries were added to the /etc/httpd.conf file for WebSphere 3.5:
       ServerInit /usr/lpp/WebSphere/AppServer/bin/was350plugin.so:init_exit
            /usr/lpp/WebSphere/etc/WebSphere/AppServer/properties/was.conf
       Service /webapp/examples/*
            /usr/lpp/WebSphere/AppServer/bin/was350plugin.so:service_exit
       Service /*.jhtml
            /usr/lpp/WebSphere/AppServer/bin/was350plugin.so:service_exit
       Service /*.shtml
            /usr/lpp/WebSphere/AppServer/bin/was350plugin.so:service_exit
       Service /servlet/*
            /usr/lpp/WebSphere/AppServer/bin/was350plugin.so:service_exit
       Service /*.jsp
            /usr/lpp/WebSphere/AppServer/bin/was350plugin.so:service_exit
       ServerTerm /usr/lpp/WebSphere/AppServer/bin/was350plugin.so:term_exit
                                                                                                       267
                                          UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                             DISA Field Security Operations
21 January 2005                                                               Developed by DISA for the DOD
The following path entries are added to the /etc/httpd.conf file for WebSphere 4.0.1:
       ServerInit -
            /usr/lpp/WebSphere401/WebServerPlugIn/bin/was400plugin.so:init_exit
       Service -
            /usr/lpp/WebSphere401/WebServerPlugIn/bin/was400plugin.so:service_exit
       ServerTerm -
            /usr/lpp/WebSphere401/WebServerPlugIn/bin/was400plugin.so:term_exit
NOTE: The /etc/WebSphere clause for ServerInit matches the directory name above where the
           site customization was.conf file was established.
•     (ZWAS0050: CAT II) The IAO will ensure that the WebSphere Application Server directives
      in the httpd.conf file are configured as outlined in this STIG.
•     The Web Manager or SA will ensure that the above path entries are added into the httpd.conf
      file.
•     The Web Manager will follow the guidelines for local server permission bits as specified in
      the Web Server STIG (Appendix I, Guidelines for Software Review of Vendor-provided
      Programs and Scripts).
•     The Web Manager will follow the permission and user audit bits and owner and group
      settings for the local server configuration files as specified in the Web Server STIG,
      Appendix H.
•     The Web Manager will follow the permission and user audit bits and owner and group
      settings for the local server log directories as specified in the Web Server STIG, Appendix H.
The LDAP Server product provides secure access to directory information held on an OS/390
platform from applications and systems on the network, enabling clients to add, delete, search,
and extract data via the server using Lightweight Directory Access Protocol. The LDAP Server
is packaged as part of the OS/390 Security Server. This reinforces the concept that directory
services and security services are closely tied together. The LDAP server makes use of DB2 to
store directory content. This allows the server to take advantage of the data storage and
searching capabilities of DB2. LDAP uses access control lists to control client access to naming
services.
268
                                           UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                             DISA Field Security Operations
21 January 2005                                                               Developed by DISA for the DOD
WebSphere security authenticates clients based on policies that are associated with the resource
the client has requested. When a request is made for a protected resource from either a web
server or a WebSphere application server, the web server authenticates the user. WebSphere
supports authentication mechanisms based on validating such credentials as PKI certificates,
tokens, or userid and password pairs. Credentials are verified against a user registry that
supports the scheme.
A user registry usually contains user, group, and user's authentication information (i.e.,
password). This information is provided by a client so that it can be verified or validated by the
user registry. The user registry is also consulted to obtain user and group information when
configuring authorization. WebSphere supports user registries based on two user domains—
LDAP user registry and native operating system. In the case of the Windows NT operating
system, the NT Domain and NT WorkGroup registries are supported. Though other directories
that comply with the LDAP protocol can be configured to perform the function of user registries,
they are not supported.
                                AUTHENTICATION
 CHALLENGE TYPE                    MECHANISM            USER REGISTRY           CLIENT SUPPORT
None                           None                    None                Web, Java
Basic                          LTPA                    LDAP                Web, Java
                               Native OS               Native OS
Certificate                    LTPA (trusted           LDAP (cred.mapping) Web
                               delegation-similar to
                               Kerberos)
Custom                         LTPA (Single Sign-on    LDAP                   Web
                               should be enabled)
A WebSphere application with a challenge type of None specified causes the runtime to not
challenge a client for authentication data. If the requested resource is protected, then the client is
not served the resource.
A WebSphere application with a challenge type of Basic specified causes the web server to
challenge a client for userid and password. The userid and password are used to authenticate
access and usage of resources.
                                                                                                        269
                                             UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                            DISA Field Security Operations
21 January 2005                                                              Developed by DISA for the DOD
A WebSphere application with a challenge type of Certificate specified causes the web server to
perform mutual authentication over SSL. The client is required to present an X.509 certificate in
order to establish the connection. This certificate is then credential mapped to a user registry. In
WebSphere Application Server Standard Editions V3.5, an LDAP directory is the only registry
that can be configured to support certificate-based authentication. Therefore, LTPA must be use
as the authentication mechanism.
A WebSphere application with a challenge type of Custom specified causes the web server to use
an HTML form to retrieve the userid and password. The administrator specifies the URL to
which a client requesting a resource is redirected in order to be authenticated.
NOTE: Limited or Certificate-based web servers will be protected from unauthorized remote
           access at the enclave perimeter and host levels. All sensitive WWW applications will
           use 128-bit SSL encryption, and will migrate to Public Key Infrastructure (PKI) in
           accordance with the Assistant Secretary of Defense (C3I) Memorandum, subject:
           "Department of Defense (DOD) Public Key Infrastructure (PKI) 8520.2," 1 April 2004.
           Sensitive WWW applications are defined as web sites that contain unclassified
           information that would not be released to the public (i.e., FOUO, SBU), or information
           that is sensitive by aggregation or compilation. WWW applications not deemed to be
           sensitive, but are not intended for complete access by the general public, may use 40-bit
           or 58-bit SSL encryption and/or some combination of domain name, IP, userid, and
           password constraints.
•     The Web Server STIG will be used to provide guidance regarding the access limitations on
      Limited or Certificate-based web servers.
•     The Program Manager or content manager will determine an appropriate method to limit
      access to the Limited or Certificate-based web server based on the STIG on Enclave
      Security.
•     The Web Manager or SA will set the secure channel constraint (SSL property) through the
      administrative console when SSL is required.
•     The Web Server STIG or the appropriate platform STIG will establish the guideline for
      userids and passwords.
•     The IAO will ensure that the guidelines for creating, obtaining, maintaining, and using PKI
      Certificates are followed as specified in the Web Server STIG.
•     The IAO will ensure that the guidelines, as specified in the Web Server STIG, are followed
      with respect to the use of cookies on a Web server.
•     The LDAP started task will be protected using the started task class in accordance with the
      OS/390 STIG.
270
                                           UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                           DISA Field Security Operations
21 January 2005                                                             Developed by DISA for the DOD
WebSphere Application Standard Edition V4.0 uses DB2 as a persistent store. (A persistent
store is used to describe the storage of objects in a database to allow them to persist over time
rather than being destroyed when the application.) When WebSphere is installed on an OS/390
system a DB2 database is installed as part of the process. The database is used to store
information about WebSphere and the applications.
Before DB2 can be used to store data required by servlets running under the Application Server,
the Application Server must be able to locate and communicate with DB2. This is accomplished
in the following way:
    1. The name of the DB2 JDBC driver classes file, db2jdbcclasses.zip, is added to the
       appserver.classpath property. This enables the Application Server to locate the DB2
       JDBC driver.
    2. The location of the DB2 JDBC driver is added to the values specified on the
       appserver.libpath property.
At startup, the Application Server constructs an in-memory name space from the information in
the was.conf file. The Application Server also registers an implementation of a Java Naming and
Directory Interface (JNDI) naming context with JNDI Context Factory services. Applications
use this class as input to JNDI Factory services to produce an initial naming context that serves
as the starting point for name resolution within the Application Server name space.
For performance reasons, applications often establish pools of connections that are serially
reusable to DB2 databases. Java Database Connectivity (JDBC) handles connections to the DB2
database. Applications have no knowledge or dependency on how a connection is established.
The data source may have gotten the connection from a pool of JDBC connections that it is
maintaining or may have been required to instantiate a new JDBC connection using the JDBC
Core driver package that is configured on each request.
At request time, the servlet prepares a specification object identifying information necessary for
connection to a DB2 JDBC database. If the connection pool property (useServerIdentity=true) is
specified for the Connection Manager pool, the Application Server gets a connection using the
Web server's identity even if %%CLIENT is specified or a userid and password are coded in the
connection specification.
If useServerIdentity=false, the Application Server gets a connection using the identity specified
by the user and password in the connection specification. The servlet asks the Connection
Manager for a connection to a DB2 JDBC database using the connection specification. The
connection object returned is from a Connection Manager pool, and is an instance of a class
defined in the Connection Manager APIs. It is not an object from a class in the JDBC API set.
This first connection is called a Connection Manager connection. Usually, a servlet gets a
Connection Manager connection for every client request. The Connection Manager connection
is not part of the JDBC API set. The connection class is from the JDBC API and is documented
with the java.sql package. Methods of the Connection class are used to interact with DB2.
                                                                                                      271
                                         UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                           DISA Field Security Operations
21 January 2005                                                             Developed by DISA for the DOD
WebSphere stores this type of information in the admin.config file and the was.conf file,
ncf.jvm.classpath property. The following table describes the database connections referenced in
the admin.config file.
•     The Web Manager or SA will ensure that the database connection controls follow the
      guidelines as specified in the Database STIG.
•     Passwords and userids for database access will be created in accordance with the Web
      Server STIG, the Database STIG, and the appropriate platform STIG.
• The DB2 Administrator will set up DB2 tables in accordance with the Database STIG.
•     The IAO will ensure that the DB2 resources are protected in accordance with the DB2
      resource profiles. The DB2 resource profile protects databases by protecting the ability to
      access DB2 itself and the DB2 tables.
The Component Broker runtime (specifically the application adaptor to which the object is
configured) is responsible for authenticating requests made on the data system for that object's
persistent data. To do this, credentials are mapped between the Component Broker security
credentials and those of an entity in the data system's security mechanism.
When an object in a Component Broker application server calls a method that accesses the
backing data system, the credential mapping is used to authenticate and authorize the Component
Broker credentials to the data system's security mechanism (ACF2, RACF, or TOP SECRET).
In some cases, an application uses several backing data systems with different security
mechanisms. Credential mappings can be used to map from one Component Broker principal to
multiple different data system entities.
The Component Broker authorization services enable a client to control access to individual
methods on business objects in application servers. Component Broker uses Distributed
Computing Environment (DCE) security for all authentication of application servers and for
authentication of clients to servers.
272
                                          UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                         DISA Field Security Operations
21 January 2005                                                           Developed by DISA for the DOD
A DCE account must be created for each client that uses Component Broker. Component Broker
clients must have accounts created in the DCE user registry. In DCE, cells are sometimes also
referred to as realms. DCE uses cells to organize administrative domains. The Component
Broker Administration application is used to maintain realms. Thus by working in conjunction
with security services provided by the OS/390 Security Server, the Component Broker is able to
ensure resource security.
•   The data set BBO.SBBOULIB or SBBOMIG will not be APF authorized because it should
    run under the authority of the client.
•   (ZWAS0010: CAT II) The IAO will ensure that WebSphere server data sets restrict UPDATE
    and/or ALLOCATE access to systems programming personnel.
• The SOMDOBJS class will be used to control a client's access to and invoking of methods.
•   The IAO will ensure that access to the Component Broker Administration application will be
    restricted to authorized personnel.
•   The IAO will ensure that method-level access checking as performed through the OS/390
    Component Broker Administration application will follow the guidelines of the Web Server
    STIG.
Resource Recovery Services (RRS) is used by the Component Broker backup persistent DB2
objects. RRS uses System Logger to record events related to protected resources in log streams.
RRS is defined as a subsystem in an OS/390 environment by placing the following statement in
the IEFSSNxx member in SYS1.PARMLIB:
SUBSYS SUBNAME(RRS)
The following RRS log streams are used by System Logger to support backup:
    1.    RM.DATA
    2.    MAIN.UR
    3.    DELAYED.UR
    4.    RESTART
    5.    ARCHIVE
                                                                                                    273
                                        UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                               DISA Field Security Operations
21 January 2005                                                                 Developed by DISA for the DOD
WebSphereVersion 4.0.1 for z/OS uses many of the same profiles and rules as WebSphere V3.5.
A major difference between WebSphere 3.5 and WebSphere 4.0.1 for z/OS is in the area of
security. Under WebSphere 4.0.1 for z/OS, the WebSphere Application Server interfaces with
the security ACPs. WebSphere 3.5 runs as a plug-in to the HTTP server and as a result runs
under HTTP server's address space and depends on HTTP server for ACP support. WebSphere
4.0.1 for z/OS is capable of servicing multiple machines, sysplexes, servers and nodes. It fully
implements the J2EE Standard. WebSphere 4.0.1 for z/OS supports the development and
maintenance of Enterprise Java Beans (EJBs).
By default, WebSphere 4.0.1 for z/OS provides four system servers. They are as follows:
NOTE: Any number of application servers may be run under WebSphere V4.0.1 for z/OS.
Each server has a control region that handles the management of the workloads and the
allocation and de-allocation of server regions. All application processing is handled by the
server regions. Securing these servers is described in the upcoming sections.
274
                                               UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                           DISA Field Security Operations
21 January 2005                                                             Developed by DISA for the DOD
The following section describes the considerations that must be addressed during a RACF
implementation of WebSphere. Some of the classes identified are available under z/OS and
examples have been created for z/OS. In addition, this section assumes that the present file
authorization already exists and that the V3.5 file replaces the V3.2 that is loaded in the RACF
database.
The following table lists all the RACF classes as they relate to WebSphere and provides a
description of each:
                                                                                                      275
                                         UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                           DISA Field Security Operations
21 January 2005                                                             Developed by DISA for the DOD
276
                                         UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                             DISA Field Security Operations
21 January 2005                                                               Developed by DISA for the DOD
There are two profiles to create when using the CBIND class. They are the
CB.BIND.server_name profile, which controls whether a local or remote client can access
servers. The CB.BIND is mandatory for the first two qualifiers for the profile; the third qualifier
is the server name. Also, there is the CB.server_name profile that controls whether a client can
use components in a server; again these definitions are mandatory.
       SETROPTS CLASSACT(CBIND)
       SETROPTS RACLIST(CBIND)
       SETROPTS GENERIC(CBIND)
Once the class is defined, the server needs to be defined (it has the name of the started task) to
the CBIND class.
Now that the CBIND class is activated the CBIND class and the WebSphere server needs to be
given the started task id CONTROL access to the new profile.
To activate the SERVER class for server access the following could be used.
       SETROPTS CLASSACT(SERVER)
       SETROPTS RACLIST(SERVER)
Once the SERVER class is activated, add the WebSphere profiles for our server as profiles
within the SERVER class.
                                                                                                        277
                                          UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                          DISA Field Security Operations
21 January 2005                                                            Developed by DISA for the DOD
•     (ZWAS0030: CAT II) The IAO will ensure that the CBIND resource is defined to the ACP
      with an access of none.
The z/OS Communication Server can use the SERVAUTH class to perform authorization checks
and determine if specific users can connect to servers using specific communication ports.
Servers can be authorized to accept connections for clients whose certificates contain a
hostIdMappings extension by administering profiles in the SERVAUTH class. Be sure that each
server to be authorized has a unique RACF userid, if not already defined. Servers may run as
jobs or started procedures. TCP/IP ports can also be protected using the SERVAUTH class.
       SETROPTS CLASSACT(SERVAUTH)
       SETROPTS RACLIST(SERVAUTH)
       SETROPTS GENERIC(SERVAUTH)
Read authority to the IRR.HOST.hostname resource in the SERVAUTH class allows a server to
accept client connections for the host name specified in the resource name.
Permitting servers to access this resource with read authority, allows them to accept logons for
the host name specified in the resource name.
Now that we are protecting the host using the SERVAUTH class, we can now go a step further
and protect the ports. We can protect the stack and any individual port.
278
                                         UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                            DISA Field Security Operations
21 January 2005                                                              Developed by DISA for the DOD
The TCP qualifier is the name of the TCP/IP started task. Now that we have protected the
TCP/IP stack, give read access to specific servers.
Again we need to give the port read access to the started tasks, userids, and so forth.
Now web server clients can logon to the host, access the TCP/IP stack, and access by a specific
port. All ports can be protected and access restricted to ensure any access from the outside world
is controlled.
The application data field in a resource profile in the PTKTDATA class is used to control the
replay protection function of PassTicket support. Replay protection prevents the reuse of
PassTickets. Since by design PassTickets has a one second granularity, replay protection needs
to be turned off if more than one PassTicket might be generated for a single userid within the
same second. In the application data field, if no replay protection is specified, the result would
be replay protection being bypassed. Before using the secured signon function, the PTKTDATA
class must be activated. All profiles that contain PassTicket information are defined in this class:
       SETROPTS CLASSACT(PTKTDATA)
       SETROPTS RACLIST(PTKTDATA)
At least one profile in the PTKTDATA class must be created for each application that users can
gain access to with a PassTicket. The profile associates a secret secured signon application key
with a particular application on a particular system.
The application name can be an application name only, an application name appended (or
qualified) by a RACF connect group, an application name qualified by a RACF userid, or an
application name qualified by both a RACF connect group name and a RACF userid.
                                                                                                       279
                                          UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                             DISA Field Security Operations
21 January 2005                                                               Developed by DISA for the DOD
The key description defines the signon application key and specifies the method RACF is to use
to protect it in the RACF database on the host. When defining the secured signon application
keys, RACF either masks or encrypts each key. If the system has a cryptographic product
installed and available, the secured signon application keys may be encrypted for added
protection.
NOTE: The profile must be a discrete profile due to each application being uniquely defined.
           Generic profiles cannot be specified. If a generic profile was specified, it would be
           ignored and there would be no authentication for the PassTicket.
To define a profile for an application in the PTKTDATA class with a masked signon application
key value of encodedkeyvalue, code the following:
For best performance, RACLIST the DIGTCERT class by issuing the SETROPTS
RACLIST(DIGTCERT) command.
After creating a new digital certificate, refresh the DIGTCERT class by issuing the SETROPTS
RACLIST(DIGTCERT) REFRESH command.
NOTE: If the RACLISTed DIGTCERT profiles are not refreshed, RACF will still use the new
           digital certificate. Performance may be impacted.
RACF uses RACLISTed digital certificates first, so any RACLISTed digital certificates that
have been altered, re-added, or deleted does not reflect those changes until the DIGTCERT class
has been refreshed.
NOTE: Profiles in the DIGTCERT and DIGTRING classes are maintained automatically
           through RACDCERT command processing. Do not administer profiles in the
           DIGTCERT and DIGTRING classes using the RDEFINE, RALTER, and RDELETE
           commands. These commands do not operate with profiles in the DIGTCERT and
           DIGTRING classes. Since these profiles contain lower-case characters, the SEARCH
           FILTER and RLIST commands are not intended for use and will deliver unpredictable
           results.
280
                                           UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                           DISA Field Security Operations
21 January 2005                                                             Developed by DISA for the DOD
serial-number.issuer's-distinguished-name
    1. The data set permissions for the HTTP server have already been specified in the Web
       Server STIG. WebSphere runs under the HTTP server userid. The RACF rules defined
       in the Web Server STIG cover WebSphere. The only difference is that the HTTP server
       userid need read access to the following data sets:
    2. The HTTP server userid requires read authority for all structures subordinate to
       /usr/lpp/WebSphere.
CA-ACF2 protects information systems and the data they manage from unauthorized disclosure,
modification, and destruction. It does this by authenticating the users of the system and then by
limiting each user to the authorizations established for them. CA-ACF2 helps ensure the
integrity and security of the critical information assets.
The various resources used within the WebSphere environment are divided into classes or
profiles that are used to secure the resource. The following table lists all of the relevant
resources for the CA-ACF2 environment with their resource rule default type code and a brief
description of them.
                                                                                                      281
                                         UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                            DISA Field Security Operations
21 January 2005                                                              Developed by DISA for the DOD
CA-ACF2 protects resources by default, assuming access is denied unless specifically permitted
by a CA-ACF2 rule or privilege. This means that the resources do not need to be activated to
ensure their protection. If a site deems that a particular class of resource does not need
protection, then a generic rule similar to the following can be added for that resource.
       COMPILE *
       $KEY(********) TYPE(type_code) UID(*) ALLOW
282
                                             UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                            DISA Field Security Operations
21 January 2005                                                              Developed by DISA for the DOD
If desired, a resource sharing a type code can have a unique type code by redefining the class and
type code in a GSO CLASMAP record. If the APPL class was not being protected and a unique
type code of APP was used instead of SAF, code the following CLASMAP record:
        SET CONTROL(GSO)
        INSERT CLASMAP.APPL RESOURCE(APL) RSRCTYPE(APP) -ENTITYLN(8)
Because the resource rule $KEY, as specified above, contains masking, create a directory for the
specific set of rules under that type code. This is done by adding the group of resource rules to
the GSO INFODIR record as follows:
        SET CONTROL(GSO)
        CHANGE INFODIR TYPES(APL)
To activate all of these changes without waiting for the next initialization of CA-ACF2, issue the
following commands:
        F ACF2,REFRESH(CLASMAP)
        F ACF2,REFRESH(INFODIR)
        F ACF2,REBUILD(APL)
Use the CBIND class to restrict a client's ability to access servers. There are two types of
resources that WebSphere uses in the CBIND class:
    -    One that controls whether a local or remote client can access servers. The name of the
         resource has the form CB.BIND.server_name where server_name is the name of the
         server.
    -    One that controls whether a client can use objects in a server. The name of the resource
         has the form CB.server_name where server_name is the name of the server.
NOTE: When adding a new server, all systems management logonids (e.g., WebSphere
           administrator ID) must be authorized to have read access to the CB.server_name and
           CB.BIND.server_name resources.
Example: To allow the WebSphere administrator ID read authority to the CB.BBOASR1 and
CB.BIND.BBOASR1 resources, add the following to the CBIND class CB resource rule:
The CBIND class defaults to a generic type code of SAF. It is recommended that a GSO
CLASMAP record be added to change this to a site selected resource unique to the CBIND class
such as CBI. The following shows how the suggested change example would be coded:
                                                                                                       283
                                          UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                              DISA Field Security Operations
21 January 2005                                                                Developed by DISA for the DOD
       SET CONTROL(GSO)
       INSERT CLASMAP.cbind RESOURCE(CBIND) RSRCTYPE(cbi) -ENTITYLN(41)
F, ACF2,REFRESH(CLASMAP)
•     (ZWAS0030: CAT II) The IAO will ensure that the CBBIND resource is defined to the ACP
      with an access of none.
Access to an enterprise bean can be controlled through security roles that are the group of
permissions that a user must have to successfully use an application. Using a Java method called
isCallerInRole, the application programmer or systems administrator specifies the security role
names, in the WebSphere Administration Application, that are allowed to access a particular
bean. Only users having access to these security role names are granted access to the bean.
Execution of isCallerInRole in an OS/390 environment causes invokes IRRPNL00 profile name
list service routine.
This routine returns a list of all of the Java security roles that a user has access to. CA-ACF2
fully supports this use of the IRRPNL00 routine through the use of EJB generalized resource
rules. (By default, the internal CLASMAP record maps the EJBROLE resource class to an EJB
type code.) When SAF processing passes the IRRPNL00 routine request to external security,
CA-ACF2 processes each EJB resource rule to determine if the specified user has access to each
defined role. After processing all of the EJB rules, CA-ACF2 passes a list of all allowed roles
for use by the Java isCallerInRole method, which then allows or prevents access to the bean
based on this list.
      2. Write and store EJB resource rules for each security role. There are some special
         guidelines that apply to EJBROLE resource rules as follows:
         -    Since the purpose of the EJB rules is to provide a specific list of allowable roles for
              each user, each defined role in an environment must have a specific rule for it. Thus,
              masking is not allowed in the resource name of an EJB rule.
         -    EJBROLE names use mixed case names. The CA-ACF2 resource rules now support
              mixed case resource names. To identify this, the resource class is designated as
              mixed by using the MIXED operand in the appropriate CLASMAP record. The
              SHOW CLASMAP output now indicates that the MIXED operand is turned on when
              a yes was placed in the column labeled MIXED.
284
                                            UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                            DISA Field Security Operations
21 January 2005                                                              Developed by DISA for the DOD
         -    Once the MIXED keyword is set on, mixed case in the $KEY, the $PREFIX, the
              $USERDATA, the resource name, and the NEXTKEY parameter can be used.
              Ensure that the administrative platform used for processing the EJB rules supports the
              entry and display of mixed case.
EJB resource rules must be globally resident by means of a resident directory so that CA-ACF2
can process them. To accomplish this, enter the following commands:
       SET CONTROL(GSO)
       CHANGE INFODIR TYPES(R-REJB)
When a resident resource rule is created or changed, the directory for it must be rebuilt through
the following command:
F ACF2,REBUILD(EJB)
Example: The ACCOUNT bean is an isCallerInRole Java method coded to allow access only by
those users having access to the accounting.clerk and the accounting.manager security roles. The
following resource rule can be written to accomplish this:
       COMPILE
       $KEY(ACCOUNTING) TYPE(EJB)
       CLERK UID(uid_string_clerk) ALLOW
       MANAGER UID(uid_string_manager) ALLOW
       END
The application assembler must assign method permissions to the bean or method using the
Application Assembly Tool. To do this:
2. Once defined, the role can be assigned to access an application (as a method permission).
    3. After the application assembly is complete, the application must be reinstalled using the
       Administration application.
                                                                                                       285
                                           UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                           DISA Field Security Operations
21 January 2005                                                             Developed by DISA for the DOD
Use the SOMDOBJS class in CA-ACF2 to control a client's access to CORBA objects.
Resource names in SOMDOBJS have the form server_name.home.method, where server_name
is the server name.
If a method is protected by SOMDOBJS, a client must have read or update authority, depending
on the type of access being attempted. If a client program is using the method to update an
attribute of an object, give the client update authorization for the method; if a client program is
using the method to read an attribute of an object, give the client read authorization for the
method. All names are folded into uppercase characters, regardless of how they are entered.
In addition to the SOMDOBJS definitions, specify method-level access checking through the
WebSphere Administration application. Check the box for method-level access checking when
defining the application's container.
Resource managers such as DB2, IMS, and CICS have implemented their own resource controls,
which control the ability of clients to access resources. When resource controls are used by
DB2, use CA-ACF2 for DB2 or issue the relevant DB2 GRANT statements.
Access to OTMA for IMS access is through the FACility resource class IMSXCF.OTMACI.
Access to EXCI for CICS is through the SURROGAT class resource logonid DFHEXCI.
      1. The data set permissions for the HTTP server have already been specified in the Web
         Server STIG. WebSphere runs under the HTTP server logonid. The ACF2 rules defined
         in the Web Server STIG cover WebSphere. The only difference is that the HTTP server
         logonid needs read access to the following data set:
SYS2.WAS401
      2. The HTTP server logonid requires read authority for all structures subordinate to
         /usr/lpp/WebSphere.
Through individual accountability, access permissions, and a comprehensive audit trail, CA-TOP
SECRET controls and monitors who can access and change data. CA-TOP SECRET
permissions are issued to control how new data is shared. Additional advanced technology
within CA-TOP SECRET provides further assurance of data integrity.
286
                                          UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                         DISA Field Security Operations
21 January 2005                                                           Developed by DISA for the DOD
The following table briefly describes the resource classes and special records that CA-TOP
SECRET employs to control WebSphere:
              CONTROL                                      AUTHORIZATION
 Access control lists in LDAP            Controls access to WebSphere for z/OS naming and
                                         interface repository data
 CBIND class                             Access to a server
 DATASET class                           Access to data sets
 DCEUUIDS and IBMFAC classes             Mapping DCE credentials to CA-TOP SECRET
                                         userids
 DSNR class                              Access to DB2
 EJBROLE class                           Access to methods in enterprise beans
 IBMFAC (IRR.DIGTCERT.LIST) &            SSL key rings certificates and mappings
 (IRR.DIGICERT.LISTING)
 IBMFAC (IMSXCF.OTMACI)                  Access to OTMA for IMS access
 IBMFAC (IRR.RUSERMAP)                   Kerberos credentials
 File permissions                        Access to HFS files
 GRANT (DB2)                             DB2 access to plans and database
 KERBLINK                                Specifies a label-name to identify the foreign
                                         principal mapping record. Up to 8 alphanumeric
                                         characters are used. It must be a unique name within
                                         the KERBLINK SDT record type.
 LOGSTRM class                           Access to log streams
 OPERCMDS class                          Start and stop servers by Daemon
 PTKTDATA class                          PassTicket enabling in the Sysplex (This relates to
                                         the session keys in the NDT within CA-TOP
                                         SECRET.
 REALM                                   Used to define the local and foreign realms.
                                         Required for Kerberos setup as defining the local
                                         realm to this class. This class is also used to define
                                         foreign realms.
 SERVER class                            Access to control region by server region.
 SERVAUTH class                          TCP/IP in OS/390 2.10 and above uses the
                                         SERVAUTH resource class to protect TCP/IP
                                         resources from unauthorized access. There are four
                                         functions protected by the SERVAUTH class: Stack
                                         Access, Net Access, Port and TN3270 Access.
 SOMDOBJS class                          Access to methods in CORBA objects
 STC                                     Associate procname and userid in the STC table.
 SURROGAT class (*.DFHEXCI)              Access to EXCI for CICS access
                                                                                                    287
                                        UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                              DISA Field Security Operations
21 January 2005                                                                Developed by DISA for the DOD
The CBIND class is used to restrict a client's ability to access servers. There are two types of
resources that WebSphere uses in the CBIND class:
The other resource controls whether a local or remote client can access servers. The name of the
resource follows the following format:
CB.BIND.server_name
NOTE: When adding a new server, all systems management userids (e.g., WebSphere
           administrator ID) must be authorized to have read access to the CB.server_name and
           CB.BIND.server_name resources.
•     (ZWAS0030: CAT II) The IAO will ensure that the CBBIND resource is defined to the ACP
      with an access of none.
Example: The WebSphere administrator ID needs read authority to the CB.BBOASR1 and
CB.BIND.BBOASR1 servers:
GEJBROLE, EJBROLE, and SOMDOBJS classes use the EJBROLE (or GEJBROLE) class in
CA-TOP SECRET to control a client's access to enterprise beans. There are two distinct sets of
tasks that are required to protect an application using EJB roles”
      1. The security administrator must define the roles and set up access rights in CA-TOP
         SECRET.
2. A profile name, with the same name as the EJBROLE classname, must be defined.
Example:
Where department is a department already defined in the CA-TOP SECRET database and
role_name matches the security role attribute specified either in the jar file or for the application.
Create membership in the role by permitting CA-TOP SECRET userids or profiles permission to
the defined EJBROLE resource.
Example:
The application assembler must assign method permissions to the bean or method using the
Application Assembly Tool. It is done in the following way:
    1. Define the roles relevant to the application. These role names must match the resource
       names defined to CA-TOP SECRET.
2. Once defined, the role can be assigned to access an application (as a method permission).
    3. After the application assembly is complete, the application must be reinstalled using the
       Administration application.
Use the SOMDOBJS class in CA-TOP SECRET to control a client's access to CORBA objects.
Resource names in SOMDOBJS have the form:
server_name.home.method
where:
    1. A client program is using the method to update an attribute of an object; give the client
       update authorization for the method.
    2. A client program is using the method to read an attribute of an object; give the client read
       authorization for the method.
All names are folded into uppercase characters, regardless of how they are entered. Thus, there
is no difference between:
       my_server_my_home.my_method; and,
       my_SERVER.my_HOME.my_METHOD
In addition to the SOMDOBJS definitions, specify the method-level access checking through the
WebSphere Administration application. Check the box for method-level access checking when
defining the application's container.
Resource managers such as DB2, IMS, and CICS have implemented their own resource controls,
which control the ability of clients to access resources. When resource controls are used by
DB2, use the DSNR CA-TOP SECRET class or issue the relevant DB2 GRANT statements.
                                                                                                      289
                                           UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                          DISA Field Security Operations
21 January 2005                                                            Developed by DISA for the DOD
Access to OTMA for IMS access is through the IBMFAC class (IMSXCF.OTMACI).
Access to EXCI for CICS is through the SURROGAT class (*.DFHEXCI). Access to data sets
is controlled through the DATASET class. Access to HFS files is controlled through file
permissions or the HFSSEC class.
      1. The data set permissions for the HTTP server have already been specified in the Web
         Server STIG. WebSphere runs under the HTTP server ACID. The TSS rules defined in
         the Web Server STIG cover WebSphere. The only difference is that the HTTP server
         ACID needs read access to the following data sets:
SYS2.WAS401
      2. The HTTP server ACID requires read authority for all structures subordinate to
         /usr/lpp/WebSphere.
290
                                          UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                      DISA Field Security Operations
21 January 2005                                                        Developed by DISA for the DOD
Government Publications
Defense Information Systems Agency (DISA) S/390 Logical Partition Security Technical
Implementation Guide, Version 1, Release 5, 13 May 2003.
National Security Agency (NSA), "Information Systems Security Products and Services
Catalog" (Current Edition).
Defense Logistics Agency Regulation (DLAR) 5200.17, "Security Requirements for Automated
Information and Telecommunications Systems," 9 October 1991.
Navy Staff Office Publication (NAVSO Pub) 5239-15, "Controlled Access Protection
Guidebook," August 1992.
Public Law 100-235, 100th Congress, an Act cited as the "Computer Security Act of 1987,"
8 January 1988.
                                                                                                 291
                                        UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                    DISA Field Security Operations
21 January 2005                                                      Developed by DISA for the DOD
•     IBM Communications Server for OS/390 V2R10 TCP/IP Implementation Guide Volume 1:
      Configuration and Routing (SG24-5227)
•     IBM Communications Server for OS/390 V2R10 TCP/IP Implementation Guide Volume 2:
      UNIX Applications (SG24-5228)
•     OS/390 UNIX System Services Planning (SC28-1890)
•     OS/390 UNIX System Services User’s Guide (SC28-1891)
•     OS/390 UNIX System Services Command Reference (SC28-1892)
•     OS/390 Version 2 Release 6 UNIX System Services Implementation and Customization
      (SG24-5178)
•     OS/390 MVS Initialization and Tuning Reference (SC28-1752)
•     OS/390 MVS System Management Facilities (SMF) (GC28-1783)
•     OS/390 MVS System Commands (GC28-1781)
•     OS/390 SecureWay Communications Server IP Configuration (SC31-8513)
•     OS/390 SecureWay Communications Server User’s Guide (GC31-8514)
•     OS/390 Security Server (RACF) Callable Services (GC28-1921)
•     OS/390 IBM Communications Server IP User’s Guide (GC31-8514)
•     OS/390 IBM Communications Server IP Configuration Guide (SC31-8725)
•     OS/390 IBM Communications Server IP Configuration Reference (SC31-8726)
•     OS/390 IBM SDSF Customization and Security (SC28-1623-03)
•     z/OS IBM SDSF Operation and Customization (SA22-7670-03)
Other
292
                                      UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                          DISA Field Security Operations
21 January 2005                                                            Developed by DISA for the DOD
The following table depicts the default values for the Program Properties Table (PPT), as
provided by IBM in module IEFSDPPT for OS/390, Version 2 Release 10. Please refer to the
IBM OS/390 MVS Initialization and Tuning Reference documentation for the version and release
of OS/390 installed at the individual site for the actual contents of the default IEFSDPPT
module.
                                                                                                     293
                                            UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                          DISA Field Security Operations
21 January 2005                                                            Developed by DISA for the DOD
EPWINIT FFST X X X X 00 X
EZAPPAAA NPF X 08
EZAPPFS NPF X 01
294
                                            UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                          DISA Field Security Operations
21 January 2005                                                            Developed by DISA for the DOD
                                                                                                     295
                                            UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                                            DISA Field Security Operations
21 January 2005                                                                              Developed by DISA for the DOD
The following table lists the known user-defined Program Properties Table (PPT) entries and
values in effect at DISA sites. Vendor documentation has been verified to include both IBM and
non-IBM programs:
                                                                                     SCHEDxx
                       SYNONYM                          MEANING                     KEYWORD
                     NC                     Non-cancelable                        NOCANCEL
                     NS                     Non-swappable                         NOSWAP
                     PR                     Privileged                            PRIV
                     ST                     System task                           SYST
                     ND                     No data set integrity                 NODSI
                     BP                     Bypass password protection            NOPASS
                     Key                    PSW key for this program              KEY(x)
                     Proc Affinity          Processors eligible                   AFF(y)
                     2P                     Second-level preferred storage        SPREF
                     1P                     First-level preferred storage         LPREF
                     NP                     No preferred storage                  NOPREF
296
                                                    UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                       DISA Field Security Operations
21 January 2005                                                         Developed by DISA for the DOD
0 (00) – IPL
6 (06) – External Writer/ JES Output Writer/ Print Services Facility (PSF)
7 (07) – [SMF] Data Lost
14 (0E) – INPUT or RDBACK Data Set Activity
15 (0F) – OUTPUT, UPDAT, INOUT, or OUTIN Data Set Activity
17 (11) – Scratch Data Set Status
18 (12) – Rename Non-VSAM Data Set Status
24 (18) – JES2 Spool Offload
25 (19) – JES3 Device Allocation
26 (1A) – JES Job Purge
30 (1E) – Common Address Space Work
32 (20) – TSO/E User Work Accounting
43 (2B) – JES Start
45 (2D) – JES Withdrawal/Stop
47 (2F) – JES SIGNON/Start Line (BSC)/LOGON
48 (30) – JES SIGNOFF/Stop Line (BSC)/LOGOFF
49 (31) – JES Integrity
52 (34) – JES2 LOGON/Start Line (SNA)
53 (35) – JES2 LOGOFF/Stop Line (SNA)
54 (36) – JES2 Integrity (SNA)
55 (37) – JES2 Network SIGNON
56 (38) – JES2 Network Integrity
57 (39) – JES2 Network SYSOUT Transmission
58 (3A) – JES2 Network SIGNOFF
60 (3C) – VSAM Volume Data Set Updated
61 (3D) – Integrated Catalog Facility Define Activity
62 (3E) – VSAM Component or Cluster Opened
63 (3F) – VSAM Catalog Entry Defined
64 (40) – VSAM Component or Cluster Status
65 (41) – Integrated Catalog Facility Delete Activity
66 (42) – Integrated Catalog Facility Alter Activity
67 (43) – VSAM Catalog Entry Delete
68 (44) – VSAM Catalog Entry Renamed
69 (45) – VSAM Data Space Defined, Extended, or Deleted
80 (50) – RACF/TOP SECRET Processing
81 (51) – RACF Initialization
83 (53) – RACF Audit Record For Data Sets
90 (5A) – System Status
92 (5C) except subtypes 10, 11 – OpenMVS File System Activity
101 (65) – DATABASE 2 Accounting
103 (67) - IBM HTTP Server
110 (6E) – CICS/ESA Statistics
118 (76) – TCP/IP Statistics
230 – ACF2 or as specified in ACFFDR (vendor-supplied default is 230)
                                                                                                  297
                                       UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                             DISA Field Security Operations
21 January 2005                                                               Developed by DISA for the DOD
298
                                               UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                                                            DISA Field Security Operations
21 January 2005                                                                                              Developed by DISA for the DOD
                                                                               DATACOM
                                         SYSPROG
ROSCOE
                                                                                                               GLOBAL
                                                          ADMIN
                                                   OPER
                                                                  CICS
                                                                         DB2
IMS
                                                                                                        MQ
                      ABENDX              X
                      ACTIVITY            X        X
                      AGENTS              X        X
                      ALERTS              X        X
                      ALLFILES            X        X
                      ALLIST              X
                      ALLOCAS             X        X
                      ALLOCDS             X        X
                      APFLIST             X
                      APPCOUTQ            X        X
                      APPLMON             X        X
                      APPLMOND            X        X
                      AR                  X
                      ASADMIN             X        X
                      ASID                X
                      ASVT                X
                      ATLIST              X
                      ATTNX               X
                      AXATABLE            X
                      BOTTOM              X        X X X X X X X X X
                      BROWSE              X        X X X X X X X X X
                      CA90LMP             X
                      CA90RIM             X
                      CA90SMF             X
                      CACHECTL            X        X
                      CACHEDEV            X        X
                      CAIDS               X
                      CARTM               X        X
                      CATALOG             X
                      CCONFIG             X                       X
                      CDBCTL              X                       X X
                      CDB2CON             X        X              X X
                      CDB2ENTR            X                         X
                      CDB2PLAN            X                         X
                      CDB2RCT             X                         X
                      CDIR                X                       X
                      CDOMAINS            X                       X
                                                                                                                                       299
                                        UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                                                         DISA Field Security Operations
21 January 2005                                                                                           Developed by DISA for the DOD
                                                                            DATACOM
                                      SYSPROG
ROSCOE
                                                                                                            GLOBAL
                                                       ADMIN
                                                OPER
                                                               CICS
                                                                      DB2
IMS
                                                                                                     MQ
                      CDSAS           X                        X
                      CDSAX           X                        X
                      CDUMPMGT        X                        X
                      CDUMPS          X                        X
                      CEDA            X                        X
                      CELEMENT        X                        X
                      CELLPOOL        X
                      CEMT            X                        X
                      CENQPOOL        X         X              X
                      CENQUEUE        X         X              X
                      CFCACHE         X         X
                      CFCONFIG        X         X
                      CFILES          X
                      CFLIST          X         X
                      CFPATH          X         X
                      CFPROC          X         X
                      CFSTRUCT        X         X
                      CFUSER          X         X
                      CGBLEXIT        X             X
                      CGROUPS         X         X   X
                      CHANGES         X         X X X X X                             X X X X
                      CHANPATH        X         X
                      CICE                          X
                      CICS            X         X   X
                      CICSLOGR        X         X   X
                      CIMS            X             X                                 X
                      CIMSDMB         X             X                                 X
                      CIMSPSB         X             X                                 X
                      CIMSSTAT        X         X   X                                 X
                      CIMSTASK        X         X   X                                 X
                      CJMODEL         X         X   X
                      CJOURNAL        X         X   X
                      CKTCB           X             X
                      CLIFE           X         X   X
                      CLIST           X         X
                      CLISTLIB        X         X
                      CLOGS           X             X
                      CLSRBUFF        X             X
                      CLSRPOOL        X             X
300
                                     UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                                                         DISA Field Security Operations
21 January 2005                                                                                           Developed by DISA for the DOD
                                                                            DATACOM
                                      SYSPROG
ROSCOE
                                                                                                            GLOBAL
                                                       ADMIN
                                                OPER
                                                               CICS
                                                                      DB2
IMS
                                                                                                     MQ
                      CMCT            X             X
                      CMONITOR        X             X
                      COLS            X         X X X X X X X X X
                      COMMENT         X         X X X X X X X X X
                      COMMON          X
                      CONFLICT        X         X
                      CONSOLE         X         X
                      CONTROL         X         X
                      COPYOUTP        X         X
                      CPAS            X                        X
                      CPFTABLE        X         X
                      CPROGRAM        X                        X
                      CPU             X         X
                      CREMOTE         X         X              X
                      CREVIEW         X         X              X
                      CSFBUSY         X                        X            X
                      CSFCODES        X                        X            X
                      CSFIO           X                        X            X
                      CSFLOAD         X                        X            X
                      CSFTABLE        X                        X            X
                      CSFTASKS        X                        X            X
                      CSFTCBS         X                        X            X
                      CSFTRACE        X                        X            X
                      CSFREQS         X                        X            X
                      CSFURTS         X                        X            X
                      CSFUSERS        X                        X            X
                      CSIT            X                        X
                      CSRT            X                        X
                      CSTATUS         X                        X
                      CSUBPOOL        X                        X
                      CSUBSPAC        X                        X
                      CSYMBOLS        X                        X
                      CSYSDATA        X                        X
                      CTASKENT        X                        X
                      CTASKS          X         X              X
                      CTCLASS         X                        X
                      CTDATA          X                        X
                      CTEMPSTG        X                        X
                      CTERMS          X         X              X
                                                                                                                                    301
                                     UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                                                         DISA Field Security Operations
21 January 2005                                                                                           Developed by DISA for the DOD
                                                                            DATACOM
                                      SYSPROG
ROSCOE
                                                                                                            GLOBAL
                                                       ADMIN
                                                OPER
                                                               CICS
                                                                      DB2
IMS
                                                                                                     MQ
                      CTHRESH         X         X        X
                      CTIMERS         X         X        X
                      CTRANLOG        X                  X
                      CTRANS          X                  X
                      CTRANSUM        X                  X
                      CTSQUEUE        X                  X
                      CUMBRELA        X                  X
                      CURSOR          X         X      X X X X X X X X
                      CUSERS          X                X
                      CVARLIST        X                  X
                      CVSAM           X         X        X
                      CWAITS          X         X        X
                      CXLOG           X         X        X
                      DASD            X         X
                      DAT             X
                      DATACOM         X                 X
                      DATE            X         X X X X X X X X X
                      DCACCESS        X                 X
                      DCACNT          X                 X
                      DCAREAIO        X                 X
                      DCAREAS         X                 X
                      DCBUFFER        X                 X
                      DCCOLUMN        X                 X
                      DCDBASES        X                 X
                      DCDIR           X                 X
                      DCDSETS         X                 X
                      DCELEMEN        X                 X
                      DCKEYFLD        X                 X
                      DCKEYS          X                 X
                      DCLOG           X                 X
                      DCMRDF          X                 X
                      DCMUFS          X                 X
                      DCOPEN          X                 X
                      DCOPTION        X                 X
                      DCPRODS         X                 X
                      DCRATES         X                 X
                      DCREQS          X                 X
                      DCSMP           X                 X
                      DCSMPTSK        X                 X
302
                                     UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                                                         DISA Field Security Operations
21 January 2005                                                                                           Developed by DISA for the DOD
                                                                            DATACOM
                                      SYSPROG
ROSCOE
                                                                                                            GLOBAL
                                                       ADMIN
                                                OPER
                                                               CICS
                                                                      DB2
IMS
                                                                                                     MQ
                      DCSTATS         X                                     X
                      DCSYSTEM        X                                     X
                      DCTABLES        X                                     X
                      DCTABREQ        X                                     X
                      DCTASKS         X                                     X
                      DCVOLUME        X                                     X
                      DCXCF           X                                     X
                      DDLIST          X
                      DELMAPS         X
                      DEST            X         X
                      DESTID          X         X
                      DEVPATH         X         X
                      DISASSEM        X
                      DOMAIN          X         X
                      DOWN            X         X X X X X X X X X
                      DROP            X
                      DSALLOC         X         X
                      DSCAT           X         X X X X X X X X X
                      DSID            X         X
                      DSINFO          X         X X X X X X X X X
                      DSLIST          X
                      DUMP            X
                      DUMPDS          X         X
                      DUMPOPTS        X
                      DUPLICAT        X
                      DYNEXIT         X
                      ECHO            X         X X X X X X X X X
                      EDIT            X         X X X X X X X X X
                      EDT             X         X
                      EFRAMES         X
                      END             X         X X X X X X X X X
                      ENFLIST         X
                      ENQJOB          X         X
                      ENQSUM          X         X
                      ENQUEUE         X         X
                      EQUATE          X
                      ESRTABLE        X
                      EST             X
                      ETCON           X
                                                                                                                                    303
                                     UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                                                         DISA Field Security Operations
21 January 2005                                                                                           Developed by DISA for the DOD
                                                                            DATACOM
                                      SYSPROG
ROSCOE
                                                                                                            GLOBAL
                                                       ADMIN
                                                OPER
                                                               CICS
                                                                      DB2
IMS
                                                                                                     MQ
                      ETLIST          X
                      ETRINFO         X
                      EXTENTS         X         X
                      FIND            X         X X X X X X X X X
                      FLUSH           X
                      FRAMES          X
                      FREEMAIN        X
                      GETMAIN         X
                      HELP            X         X X X X X X X X X
                      HEX             X
                      HSMREQ          X         X
                      IDCAMS          X
                      IDENTIFY        X
                      INDEX           X
                      INIT            X         X
                      INTRDR          X         X
                      INVOKE          X
                      IOCDATA         X
                      IPLINFO         X         X
                      ISERVE          X
                      ISPFCMD         X         X X X X X X X X X
                      ISPTCM          X
                      JINPRTY         X         X
                      JLOGON          X         X
                      JOBCLASS        X         X
                      JOBSUM          X         X
                      JPA             X
                      JPATHS          X         X
                      JREMOTES        X         X
                      JRESOURC        X         X
                      JSESSION        X         X
                      KEYS            X         X      X X X X X X X X
                      LABEL           X         X      X X X X X X X X
                      LEFT            X         X      X X X X X X X X
                      LINES           X         X
                      LINK            X         X      X X X X X X X X
                      LINKACT         X
                      LINKDEF         X
                      LINKDEL         X
304
                                     UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                                                         DISA Field Security Operations
21 January 2005                                                                                           Developed by DISA for the DOD
                                                                            DATACOM
                                      SYSPROG
ROSCOE
                                                                                                            GLOBAL
                                                       ADMIN
                                                OPER
                                                               CICS
                                                                      DB2
IMS
                                                                                                     MQ
                      LINKJOBS        X
                      LINKLIBS        X
                      LINKLIST        X
                      LINKOPT         X
                      LINKSETS        X
                      LINKUPD         X
                      LISTCICS        X         X   X
                      LISTCONS        X         X
                      LISTDCOM        X         X       X
                      LISTDIR         X         X X X X X X X X X
                      LISTFILE        X         X
                      LISTHELD        X         X
                      LISTINP         X         X
                      LISTJOBS        X         X
                      LISTLAB         X         X X X X X X X X X
                      LISTLOAD        X
                      LISTMAPS        X
                      LISTMODS        X
                      LISTMVAR        X
                      LISTOUT         X         X
                      LISTSEL         X         X X X X X X X X X
                      LISTSYS         X         X
                      LLAREFR         X
                      LOADMAPS        X
                      LOCATE          X         X X X X X X X X X
                      LOGREC          X         X
                      LOOKUP          X         X X X X X X X X X
                      LPA             X
                      LPALIST         X
                      LXATABLE        X
                      MAP             X
                      MAPLIB          X
                      MASTER            X
                      MENU            X X X X X X X X X X
                      MODIFY          X X X X X X X X X X
                      MOREINFO        X X
                      MPFTABLE        X
                      MQACTIVE        X X             X
                      MQALERTS        X X             X
                                                                                                                                    305
                                     UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                                                         DISA Field Security Operations
21 January 2005                                                                                           Developed by DISA for the DOD
                                                                            DATACOM
                                      SYSPROG
ROSCOE
                                                                                                            GLOBAL
                                                       ADMIN
                                                OPER
                                                               CICS
                                                                      DB2
IMS
                                                                                                     MQ
                      MQBROWSE        X         X                                                    X
                      MQCHAN          X         X                                                    X
                      MQCHCCON        X         X                                                    X
                      MQCHRCVR        X         X                                                    X
                      MQCHRQSR        X         X                                                    X
                      MQCHSCON        X         X                                                    X
                      MQCHSNDR        X         X                                                    X
                      MQCHSRVR        X         X                                                    X
                      MQCHSTAT        X         X                                                    X
                      MQCLEAN         X         X                                                    X
                      MQCLEAR         X         X                                                    X
                      MQCMD           X         X                                                    X
                      MQCONN          X         X                                                    X
                      MQDEAD          X         X                                                    X
                      MQDISC          X         X                                                    X
                      MQDQMGR         X         X                                                    X
                      MQEVENT         X         X                                                    X
                      MQINDOUT        X         X                                                    X
                      MQLIST          X         X                                                    X
                      MQLOG           X         X                                                    X
                      MQMGR           X         X                                                    X
                      MQNAME          X         X                                                    X
                      MQPAGE          X         X                                                    X
                      MQPERF          X         X                                                    X
                      MQPROC          X         X                                                    X
                      MQQALIAS        X         X                                                    X
                      MQQLOCAL        X         X                                                    X
                      MQQMODEL        X         X                                                    X
                      MQQREMOT        X         X                                                    X
                      MQQUEUE         X         X                                                    X
                      MQRMGR          X         X                                                    X
                      MQSECUR         X         X X                                                  X
                      MQSERIES        X         X                                                    X
                      MQSTGCL         X         X                                                    X
                      MQTHRESH        X         X                                                    X
                      MQTRACE         X                                                              X
                      MSGCOLOR        X         X
                      MTT             X
                      MVS                       X
306
                                     UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                                                         DISA Field Security Operations
21 January 2005                                                                                           Developed by DISA for the DOD
                                                                            DATACOM
                                      SYSPROG
ROSCOE
                                                                                                            GLOBAL
                                                       ADMIN
                                                OPER
                                                               CICS
                                                                      DB2
IMS
                                                                                                     MQ
                      NAMETOKN        X
                      NODES           X         X
                      NOOP            X         X X X X X X X X X
                      NUCLEUS         X
                      OFFLOAD         X         X
                      OUTCLASS        X         X
                      OUTDES          X         X X X X X X X X X
                      OUTPUT          X         X X X X X X X X X
                      OWNER           X         X X X X X X X X X
                      PAGEDS          X
                      PAGES           X
                      PAGING          X
                      PARMLIB         X
                      PARMLIST        X
                      PARTINFO        X         X
                      PCLIST          X
                      PFSHOW          X         X X X X X X X X X
                      PFT             X
                      PLEXARM         X         X
                      PLEXCPL         X         X
                      PLEXGRPS        X         X
                      PLEXMBRS        X         X
                      PLEXPATH        X         X
                      PLEXPEND        X         X
                      PLEXSYS         X         X
                      PLOT            X         X
                      PLOTATTR        X         X
                      PLOTLIB         X         X
                      PLOTLIST        X         X
                      PLOTLOG         X         X
                      PPT             X
                      PREFIX          X         X X X X X X X X X
                      PRINT           X         X X X X X X X X X
                      PRINTER         X         X
                      PRISM           X         X
                      PRIVATE         X
                      PROCLIST        X
                      PRODCODE        X
                      PRODUCTS        X
                                                                                                                                    307
                                     UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                                                         DISA Field Security Operations
21 January 2005                                                                                           Developed by DISA for the DOD
                                                                            DATACOM
                                      SYSPROG
ROSCOE
                                                                                                            GLOBAL
                                                       ADMIN
                                                OPER
                                                               CICS
                                                                      DB2
IMS
                                                                                                     MQ
                      PROFILE         X         X      X X X X X X X X
                      PROMPT          X         X      X X X X X   X X
                      PUNCH           X         X
                      QUERY           X         X      X X X X X X X X
                      QUICKREF        X         X
                      READER          X         X
                      RECALL          X         X      X X X X X X X X
                      REGION          X
                      REGPRODS        X
                      REPEAT          X         X      X X X X X X X X
                      RESERVE         X         X
                      RETURN          X         X      X X X X X X X X
                      REVIEW          X         X      X X X X X X X X
                      RIGHT           X         X      X X X X X X X X
                      RNLIST          X         X
                      ROSAWS          X         X                X
                      ROSBUFF         X         X                X
                      ROSCOE          X         X                X
                      ROSLIBS         X         X                X
                      ROSLIST         X         X                X
                      ROSMON          X         X                X
                      ROSMPL          X         X                X
                      ROSRESP         X         X                X
                      ROSUSER         X         X                X
                      SCM             X         X                X
                      SCREEN          X         X      X X X X X X X X
                      SECURITY                         X
                      SEGMENTS        X
                      SELECT          X         X X X X X X X X X
                      SESSIONS        X         X
                      SET             X         X X X X X X X X X
                      SFTABLE         X
                      SMF             X         X
                      SMFEXIT         X
                      SNAP            X
                      SORT            X         X X X X X X X X X
                      SPACE           X         X
                      SPLIT           X         X X X X X X X X X
                      SPOOLS          X         X
308
                                     UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                                                         DISA Field Security Operations
21 January 2005                                                                                           Developed by DISA for the DOD
                                                                            DATACOM
                                      SYSPROG
ROSCOE
                                                                                                            GLOBAL
                                                       ADMIN
                                                OPER
                                                               CICS
                                                                      DB2
IMS
                                                                                                     MQ
                      STATUS          X
                      STCK            X         X X X X X X X X X
                      STEPSUM         X         X X X X X X X X X
                      STORGRP         X         X
                      STREXCL         X         X
                      STRLIST         X         X
                      STRPREF         X         X
                      SUBCHAN         X         X
                      SUBMIT          X         X X
                      SUBPOOL         X
                      SUBSYS          X
                      SVCTABLE        X
                      SWAP            X         X X X X X X X X X
                      SWAPDS          X
                      SWAPPING        X
                      SYMBOLS         X
                      SYMPTOMS        X
                      SYSGROUP        X         X
                      SYSLOG          X         X
                      SYSSYM          X
                      SYSVIEW         X         X X X X X X X X X
                      TAPE            X         X
                      TASK            X
                      TASKLIB         X
                      TERMINAL        X         X X X X X X X X X
                      THRESH          X         X
                      TIME            X         X X X X X X X X X
                      TIMERS          X
                      TIMEZONE        X         X
                      TOP             X         X X X X X X X X X
                      TOPICS          X         X X X X X X X X X
                      TOTAL           X         X X X X X X X X X
                      TRACE           X
                      TSO             X         X X X X X X X X X
                      TSOTABLE        X
                      TYPE            X         X X X X X X X X X
                      UNIT            X         X
                      UP              X         X X X X X X X X X
                      UPDATE          X         X X X X X X X X X
                                                                                                                                    309
                                     UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                                                         DISA Field Security Operations
21 January 2005                                                                                           Developed by DISA for the DOD
                                                                            DATACOM
                                      SYSPROG
ROSCOE
                                                                                                            GLOBAL
                                                       ADMIN
                                                OPER
                                                               CICS
                                                                      DB2
IMS
                                                                                                     MQ
                      USE             X
                      USERS           X         X      X
                      VALPATH         X         X
                      VCHECK          X         X      X       X      X     X         X     X        X      X
                      VDEFAULT        X         X      X       X      X     X         X     X        X      X
                      VDEFINE         X         X      X       X      X     X         X     X        X      X
                      VDELETE         X         X      X       X      X     X         X     X        X      X
                      VIEW            X         X      X       X      X     X         X     X        X      X
                      VLFIELD         X         X      X       X      X     X         X     X        X      X
                      VLFLIST         X         X      X       X      X     X         X     X        X      X
                      VLIST           X         X      X       X      X     X         X     X        X      X
                      VM              X         X
                      VRESET          X         X      X X X X X X X X
                      VSET            X         X      X X X X X X X X
                      VSMTRACK        X
                      VTAM            X X
                      VTOC            X X
                      WAIT            X X X X X X X X X X
                      WTOACTN         X X
                      WTOR              X
                      XCFADMIN        X X
                      XCONSOLE          X
                      XMVS              X
                      ZAP             X
310
                                     UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                  DISA Field Security Operations
21 January 2005                                                    Developed by DISA for the DOD
APPENDIX E. FORMS
This document has been removed from this STIG and will be placed in a different manual
to be shared by all technologies. Once the manual name is decided, the STIG will be
updated to reference the new manual.
                                                                                             311
                                        UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                             DISA Field Security Operations
21 January 2005                                                               Developed by DISA for the DOD
312
                                               UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                                          DISA Field Security Operations
21 January 2005                                                                            Developed by DISA for the DOD
1.   PURPOSE: This MOU policy is to establish and assign responsibilities for the decentralized security
     functions, security maintenance and security training for the DISA Area Command Ogden decentralized
     security system. This decentralized security system is being developed for the Centralized Purchasing and
     Accounting System (CPAS) which will encompass both Ogden and Oklahoma City Area Commands. This
     agreement will define the roles and responsibilities of the CPAS Operating Locations (OPLOCs) decentralized
     administrators and the DISA Area Commands. AC Ogden will develop these decentralized CPAS security
     programs as requested by the OPLOC CPAS customers.
1) Maintain the Operating System software packages for IBM system, OS390, CA-TOP SECRET, etc.
3) Provide overall maintenance support for the IBM security system, CA-TOP SECRET.
          5) Monitor CPAS userid activity. If the CPAS userid is inactive over the specified limit (currently 180
             days) and the CPAS decentralized administrator has not taken action, DAC Ogden/Oklahoma City will
             delete the userid with no prior notification to the CPAS OPLOC. This action is required to maintain
             the security environment consistent with applicable security policy and guidelines.
          6) Serve as the backup Point of Contact for CPAS users with security problems. (CPAS users will
             contact AC help desks FIRST, prior to contacting DAC Security Administrators.)
          7) Develop and maintain CPAS security profiles, as required, granting access to the CPAS application.
             The Security Administrators located at the DISA Area Commands will maintain these profiles.
          8) Provide TSO access, on a limited basis, as required. Access request forms will be processed through
             the appropriate central Security Administrators.
          3) Provide decentralized security training for the CPAS OPLOC customers. (The CPAS customers will
             incur the TDY costs for DAC security trainers.)
          1) Serve as Security Administrators for the CPAS application and abide by all DOD, DISA, and other
             applicable security regulations, policies, and guidelines.
2) Serve as the main security Point of Contact for all CPAS users with security problems.
          3) Grant access to the CPAS application using security profiles provided and designated by the Area
             Commands.
                                                                                                                     313
                                                  UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                                       DISA Field Security Operations
21 January 2005                                                                         Developed by DISA for the DOD
         4) Ensure System Authorization Access Requests (DISA Form 41s) are filled out in accordance with
            (IAW) DISA specifications and all other applicable regulatory guidelines.
         5) Maintain CPAS access request form files at the OPLOC sites in accordance with DISA policy. Upon
            request, OPLOCs will provide Area Commands with user access request forms as needed for audits
            and/or investigations.
         7) Be responsible for auditing security violations and deleting inactive CPAS user accounts in accordance
            with inactivity thresholds (currently 180 days).
314
                                                UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                           DISA Field Security Operations
21 January 2005                                                             Developed by DISA for the DOD
F.9.2 IMS/DB/DC
Internal Product Security Controls within IMS provide the capability to restrict access for the
product's functions. User data is potentially accessible without appropriate approvals.
(1) Control access to an IMS system for a user using the ACP.
(3)    Several commands within IMS are sensitive in nature and will be restricted for the orderly
       execution of IMS. At a minimum, restrict the following commands to authorized
       personnel:
                                                                                                      315
                                          UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                         DISA Field Security Operations
21 January 2005                                                           Developed by DISA for the DOD
Coordinate authorization for command use between the IAO, Operations, and IMS support
personnel.
F.9.2.1 ACF2
Secure every IMS control region using the ACF2/IMS sub-product. This allows I&A processing
and the verification of resource access within IMS.
Assign every IMS region a unique @MUSASS and @MLID macro pair in the ACF2 ACFFDR.
Assign every IMS region a unique set of the following:
(5)    A unique set of ACF2 Infostorage IMS control records, associated with the control region
       by each control record's DIVISION field (containing the MUSID from the control region's
       logonid record)
(6)    A unique set of primary and secondary IMS transaction types (specified in ACF2
       Infostorage IMS Control RESOURCE records), associated with the control region by each
       control record's DIVISION field (containing the MUSID from the control region's logonid
       record)
Every IMS control region will process in ABORT mode, as specified in the OPTS ACF2
Infostorage IMS control record.
The ability to update the ACF2 Infostorage IMS control records for an IMS region will be
strictly controlled.
316
                                           UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                             DISA Field Security Operations
21 January 2005                                                               Developed by DISA for the DOD
F.9.2.2 RACF
*** Information was not available at the time this document was prepared.       ***
*** Recommendations for this product will be added in a future update to this document.
    ***
*** Information was not available at the time this document was prepared.       ***
*** Recommendations for this product will be added in a future update to this document.
    ***
F.9.3 MICS
MICS security management will be implemented by using a combination of ACP and Internal
Product Security Controls. MICS internal security must be used within the MWF. MICS
currently does not make use of the MVS SAF facility.
The MICS environment is comprised of numerous data sets classified in two distinct categories:
Both the MICS administrator and the backup administrator must have complete access to both
complex and unit-level data sets.
The integrity of the data within the MICS database is strictly based on the data set controls in
effect for the SMF data and other data used as input into the MICS processes. Rigid data set
controls are essential to ensure the integrity of the MICS environment. Refer to Section 3.1.5.1,
Data Set Controls, for further information.
       (b)    MICS production jobs will be restricted to read authority except the
              <sharedprefix>.MICS.LOAD library, which is restricted to program execute only
              authority.
       (c)    MICS System Administrators require, and will be granted, complete access to all
              complex-level data sets.
       (d)    The authorized exceptions to complex-level (sharedprefix) data set access read-only
              authority are as follows:
1) <sharedprefix>.MICS.CAPACITY
                     The MICS Capacity Planner uses this data set. Only MICS users responsible
                     for capacity planning or production jobs that update this file will be granted
                     read and update authority to this data set.
2) <sharedprefix>.MICS.TABLES
                     MICS Accounting and Charge-back uses this data set. The data entered in this
                     file is done so manually or by monthly Accounting and Charge-back processing.
                     Only the MICS Accounting and Charge-back administrator, the person(s)
                     responsible for entering accounting data from MWF, and production jobs that
                     update this file will be granted read and update authority to this data set.
3) <tsharedprefix>.MICS.ACCT.MONTHC
                     This data set is kept on tape as indicated by the different high-level qualifier. It
                     contains all the debits and credits used to create the Financial Recap file. Only
                     the MICS Accounting and Charge-back administrator and production jobs, such
                     as CLOSETBL, INVOICE, and FINRECAP, will be granted alter, read, and
                     update authority to this data set.
4) <sharedprefix>.MICS.MWFPDS.DATA
                     The MICF Shared Output Catalog feature uses this data set. Reports produced
                     from MICS inquiries are stored in this file for later review. Only MICS users
                     responsible for adding reports and deleting existing entries and for production
                     jobs, such as DAILYRPT, WEEKRPT, and MONTHRPT, will be granted read
                     and update authority to this data set.
318
                                              UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                              DISA Field Security Operations
21 January 2005                                                                Developed by DISA for the DOD
5) <sharedprefix>.MICS.MWFSAS.DATA
                     The MICF Shared Output Catalog feature uses this data set. Color graphics
                     produced from MICS inquiries are stored in this file for later review. Only
                     MICS users responsible for adding reports and deleting existing entries and for
                     production jobs, such as DAILYRPT, WEEKRPT, and MONTHRPT, will be
                     granted read and update authority to this data set.
6) <sharedprefix>.MICS.DTF.INDEX
                     This data set is used by the EasyReach Data Manager (EDM) as a directory to
                     all EDM files. Only MICS users responsible for creating EDM files and for
                     production jobs, such as DAILYRPT, WEEKRPT, and MONTHRPT, will be
                     granted read and update authority to this data set.
7) <sharedprefix>.MICS.ISPTLIB
                     Many different features within MWF use this data set. Only persons
                     responsible for batch production reporting jobs, and for the following functions,
                     will be granted read and update authority to this data set:
       (c)    MICS System Administrators require, and will be granted, complete access to all
              unit-level (prefix) data sets.
       (d)    The ACP will log all alter and update access to the unit-level (prefix) data sets
              (except MICS production jobs).
       The MICS complex contains multiple units, and each unit consists of one or more MICS
       components. The units are grouped together by informational area. For instance, one unit
       may contain OS/390 performance data and another unit may consist of DASD management
       data.
                                                                                                         319
                                             UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                              DISA Field Security Operations
21 January 2005                                                                Developed by DISA for the DOD
       Each unit consists of a group of data sets specific to that unit, meaning they are not shared
       among other units. This group of files includes MICS application data sets and database
       files. To differentiate one set of MICS unit data sets from another, unique high-level data
       set qualifiers or prefixes are used.
       Each MICS unit will be considered a separate entity and will be individually protected
       against unauthorized access. For example, MICS users responsible for accessing OS/390
       performance data will not be given access to DASD management data. The unique
       prefixes between units will be used to facilitate security within each ACP.
(3)    Another group of MICS unit data sets pertains to backup and archive processing. These
       data sets are indicated by a MICS tapeprefix.
(b) Restrict MICS production jobs to alter, read, and update authority.
       (c)    MICS System Administrators require, and will be granted, complete access to all
              unit-level (tapeprefix) data sets.
       (d)    The ACP will log all alter and update access to the unit-level (tapeprefix) data sets
              (except MICS production jobs).
       (e)    An authorized exception to unit-level (tapeprefix) data set access authority exists for
              the MICS Accounting and Charge-back administrator. This administrator requires,
              and will be granted, complete access to the following data sets:
1) <tapeprefix>.MICS.ACCT.DAY1
                     This data set contains current month-to-date DETAIL-level data from all the
                     journal files.
2) <tapeprefix>.MICS.ACCT.DAY2
3) <tapeprefix>.MICS.ACCT.MONTH
                     This data set contains a complete month of data for a previous month at the
                     DETAIL-level from all the journal files.
320
                                             UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                             DISA Field Security Operations
21 January 2005                                                               Developed by DISA for the DOD
(4)    The MICS MWF (MICS Workstation Facility) is a set of powerful ISPF dialog
       applications used to provide access to the MICS complex. The invocation of the MICS
       MWF driver application is through a clist. Limit the execution of this clist only to MICS
       users and administrators.
       MWF does not interface with SAF at present. It has its own internal security application,
       Authorization Assignment, which will be used to limit access to each MWF application,
       and to restrict the use of options within those applications. Refer to the MICS PIOM
       (Planning, Installation, Operation, and Maintenance) Guide, Section 4.4.3, for details on
       how to set up MWF internal security.
NOTE: A possible security exposure exists within MWF regarding MICS internal security.
           The MICS Authorization Assignment facility uses the ISPF table format to store its
           security information. If a user creates a security table and allocates it before the MICS
           ISPTLIB data set, MWF will use the user-created table instead, thus bypassing MICS
           internal security.
(5)    For batch production jobs, a unique batch logonid will be used for each distinct MICS unit
       when submitting any scheduled MICS production job, such as DAILY, WEEKLY,
       MONTHLY, YEARLY, BACKUP, etc. These batch logonids will be the only logonids
       with update authority to the MICS database files, except for the MICS System
       Administrator, as discussed in Section H.9.3, MICS, Paragraph (2)(c).
       The batch logonids and MICS System Administrator will be the only logonids with the
       authority to alter and update the audit, history, and backup tapes, as discussed in Section
       H.9.3, MICS, Paragraph (3)(c).
       Any restore processing of the MICS complex and unit data sets, along with the MICS
       database files, will be strictly handled by the MICS System Administrator. Any MICS
       Accounting and Charge-back files requiring restore processing may be alternatively
       handled by the MICS Accounting and Charge-back administrator.
F.9.3.1 ACF2
MICS external security utilizing ACF2 will be accomplished through data set resource controls.
Refer to Section H.9.3, MICS, for information on MICS data set access authority requirements.
For additional information on data set resource controls, refer to Section 3.1.5.1, Data Set
Controls.
MICS internal security will be used to secure the MICS MWF environment. Refer to Section
H.9.3, MICS, Paragraph (4) for further information.
For additional information about MICS data sets and MICS internal security, refer to the MICS
PIOM (Planning, Installation, Operation, and Maintenance) Guide.
                                                                                                        321
                                           UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                             DISA Field Security Operations
21 January 2005                                                               Developed by DISA for the DOD
F.9.3.2 RACF
MICS external security utilizing RACF will be accomplished through data set resource controls.
Refer to Section H.9.3, MICS, for information on MICS data set access authority requirements.
For additional information on data set resource controls, refer to Section 3.1.5.1, Data Set
Controls.
MICS internal security will be used to secure the MICS MWF environment. Refer to Section
H.9.3, MICS, Paragraph (4), for further information.
For additional information about MICS data sets and MICS internal security, refer to the MICS
PIOM (Planning, Installation, Operation, and Maintenance) Guide.
MICS external security utilizing TOP SECRET will be accomplished through data set resource
controls. Refer to Section H.9.3, MICS, for information on MICS data set access authority
requirements. For additional information on data set resource controls, refer to Section 3.1.5.1,
Data Set Controls.
MICS internal security will be used to secure the MICS MWF environment. Refer to Section
H.9.3, MICS, Paragraph (4), for further information.
For additional information about MICS data sets and MICS internal security, refer to the MICS
PIOM (Planning, Installation, Operation, and Maintenance) Guide.
FDR (Fast Dump Restore) and its associated sub-products allow backup and restoration of data
on DASD. Optional capabilities include optimization of data set placement, release of unused
space, and extent management.
The product, as provided by the vendor, allows unlimited access to DASD resources. The
product operates on a track level, versus a data set level, thus potentially bypassing security
validation routines.
Interfaces are provided with the product that allows it to query the ACP for verification of the
access request at the data set and/or volume level. Install this interface to support discretionary
access controls.
The FDRZAPOP utility allows an installation to set up the security controls, as well as other
installation options. The FDRZAPOP program will be protected. (Refer to Section 3.1.5.3,
Sensitive Utility Controls, for further information.)
322
                                          UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                           DISA Field Security Operations
21 January 2005                                                             Developed by DISA for the DOD
Control maintenance jobs that back up data for use in recovery situations with batch userid
controls designed for such processes. (Refer to Section 3.1.2.5, Special Storage Management
Users, for further information.)
F.10.2.1 ACF2
Access to the FDRZAPOP utility (used to modify FDR) will be protected using the Protected
Program List facility, as discussed previously. (Refer to Section 3.2.5.3, Sensitive Utility
Controls, for further information.) Standard data set access rules are required for the library
containing the program.
FDR will be installed with full volume-level and data set-level validation enabled. Use the FDR
exits, FDRYOPEN and FDRYPASS, supplied with ACF2 to accomplish this. This will ensure
that data set backup and restore functions and full-volume restore functions are protected via
data set rules.
F.10.2.2 RACF
Access to the FDRZAPOP utility (used to modify FDR) will be protected as a protected
program, as discussed previously. (Refer to Section 3.3.5.3, Sensitive Utility Controls for further
information.) Standard data set access protections are required for the library containing the
program.
During the installation of FDR, generate the product with the ALLCALL option enabled.
Protection of FDR processing is performed by SAF calls validated by RACF. Further
documentation of the protection mechanisms can be found in the Installation section of the FDR
product documentation.
Access to the FDRZAPOP utility (used to modify FDR) will be protected using appropriate TSS
protection mechanisms. (Refer to Section 3.3.5.3, Sensitive Utility Controls, for further
information.) Standard data set access rules are required for the library containing the program.
During the installation of FDR, generate the product with the ALLCALL option enabled.
Protection of FDR processing is performed by SAF calls issued that TOP SECRET validates.
Further documentation of the protection mechanisms can be found in the Installation section of
the FDR product documentation.
F.10.4 ICKDSF
ICKDSF is a tool used for the initialization, scanning, and debugging of DASD units. It is a
stand-alone utility program provided by IBM to its customers as a courtesy. It also comes
bundled as a standard component of OS/390. ICKDSF is known colloquially as DSF.
                                                                                                      323
                                         UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                            DISA Field Security Operations
21 January 2005                                                              Developed by DISA for the DOD
ICKDSF operates at the device level and does not interface with the ACP to verify individual
data set access. Additionally, the utility can over-write selected tracks of data. Such capabilities
pose a risk to data integrity.
Full volume-level access will be granted to authorized users through the volume protection
capabilities of the ACP.
Access to ICKDSF will be protected using program protection controls. (Refer to Section
3.1.5.3, Sensitive Utility Controls, for further information.)
F.10.4.1 ACF2
Protect access to ICKDSF using the Protected Program List facility, as discussed in Section
3.2.5.3, Sensitive Utility Controls. Standard data set access rules are required and will be written
for the library containing the utility.
F.10.4.2 RACF
Protect access to ICKDSF using the sensitive program protection mechanisms, as discussed in
Section 3.3.5.3, Sensitive Utility Controls. Standard data set access rules are required and will be
written for the library containing the utility.
Protect access to ICKDSF using the sensitive program protection mechanisms, as discussed in
Section 3.4.5.3, Sensitive Utility Controls. Standard data set access rules are required and will be
written for the library containing the utility.
F.12.3 NetView
NetView Internal Product Security Controls can be used to limit access to NetView. This
mechanism performs user identification, authentication, and validation based on security
information stored in a NetView data set. However, all information (e.g., userids and passwords)
is stored in clear text format, which makes this method of validation undesirable. A more secure
approach is to use the services of an ACP.
(1)    Secure user access to NetView using the services of an ACP. Implementation details are
       documented in Section F.12.3.1, ACF2, Section F.12.3.2, RACF, and Section F.12.3.3,
       TOP SECRET.
(2)    Define a span of control for each NetView user to limit the user control boundaries using
       the ISPAN and SPAN statements in the user’s profile. The user cannot execute any
       command for a network resource that is outside that user’s span of control. SPAN names
       are defined in member DSISPN of data set DSIPARM using the SPANLIST statement,
       and in SYS1.VTAMLST using the SPAN operand.
(3)    Define the scope of commands for each NetView user using the OPCLASS statement in
       the profile data set to restrict users to the set of NetView commands that matches their
       roles, needs, and responsibilities.
(5)    Restrict the ability to issue OS/390 commands only to NetView automation processes (e.g.,
       clist). General users will not be given the authority to issue OS/390 commands.
(6)    Use the services of an ACP to secure access to key NetView data sets. Restrict access to
       data sets having the following DD names in the NetView JCL start procedure only to the
       network systems programming staff and authorized users:
F.12.3.1 ACF2
(1)    Use ACF2 to perform authentication of userids, user passwords, and user terminal names
       by specifying OPTIONS VERIFY=MAXIMUM in member DSIDMN of the DSIPARM
       data set. When using this option with ACF2, the user passwords in member DSIOPF will
       no longer be used. ACF2 will perform password validation and pass a return code to
       NetView. If the return code is zero (0), NetView will allow the session. Otherwise, the
       logon request will be rejected. Under this same option, user profiles, scopes of command,
       and span of control authorities will remain in force and will continue to be controlled
       internally by NetView.
(2)    Assign invalid values to all user passwords stored in member DSIOPF of the DSIPARM
       data set. They will not be used to authenticate any individual.
                                                                                                          325
                                               UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                           DISA Field Security Operations
21 January 2005                                                             Developed by DISA for the DOD
F.12.3.2 RACF
(1)    Use RACF to perform authentication of operator ID, operator password, and operator
       terminal name by specifying OPTIONS VERIFY=MAXIMUM in member DSIDMN of
       the DSIPARM data set. When using this option with RACF, the user passwords in
       member DSIOPF will no longer be used. RACF will perform password validation and
       pass a return code to NetView. If the return code is zero (0), NetView will allow the
       session. Otherwise, the logon request will be rejected. Under this same option, user
       profiles, scopes of command, and span of control authorities will remain in force and will
       continue to be controlled internally by NetView.
(2)    Assign invalid values to all user passwords stored in member DSIOPF of the DSIPARM
       data set. They will not be used to authenticate any individual.
NetView will be defined as a TOP SECRET Facility (FAC). This FAC will be used to validate
a user’s authority to access NetView.
Apply the following recommendations when using NetView with TOP SECRET:
(1)    Use TOP SECRET to perform authentication of userids, user passwords, and user terminal
       names by specifying OPTIONS VERIFY=MAXIMUM in member DSIDMN of the
       DISPARM data set. When using this option with TOP SECRET, the user passwords in
       member DSIOPF will no longer be used. TOP SECRET will perform password validation
       and pass a return code to NetView. If the return code is zero (0), NetView will allow the
       session. Otherwise, the logon request will be rejected. Under this same option, user
       profiles, scopes of command, and span of control authorities will remain in force and will
       continue to be controlled internally by NetView.
(2)    Assign invalid values to all user passwords stored in member DSIOPF of the DSIPARM
       data set. They will not be used to authenticate any individual.
F.12.4 CA-EXAMINE
CA-EXAMINE also provides the capability to maintain documentation related to the review of
selected areas of MVS on-line. The status and results of a review can be stored within the
EXAMINE product database itself and retained on an indefinite basis.
CA-EXAMINE runs as an ISPF application. It also can be run as a background (batch) job.
326
                                          UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                            DISA Field Security Operations
21 January 2005                                                              Developed by DISA for the DOD
CA-EXAMINE requires read access to all load libraries that it will audit (e.g., libraries in the
Linklist, APF list, etc.).
Section 2.1.4, Auditing, describes the requirements for using CA-EXAMINE as the repository for
system documentation.
(1)    The IAO will strictly control authorization to access the CA-EXAMINE environment.
       Update and alter access to the CA-EXAMINE product libraries will be restricted only to
       systems programming and security/audit personnel.
(2)    All requests for access to CA-EXAMINE will be justified in writing and approved by the
       IAO.
(4)    Grant external audit personnel update access to prefix.FSO.EXAMINE.CAIDBS1 for the
       duration of performing a review.
(5)    The IAO will review and audit update and alter access to the
       prefix.FSO.EXAMINE.CAIDBS1 file on a daily basis.
(6)    In addition to the FSO file, the site may allocate multiple prefix.EXAMINE.CAIDBS1
       files. Access to these files also will be strictly controlled and audited.
For more detailed procedures about auditing, refer to Section 2.1.4, Auditing.
F.12.4.2 ACF2
Use standard ACF2 data set controls to control access to the CA-EXAMINE product libraries.
No additional ACF2 controls are required.
F.12.4.3 RACF
Use standard RACF data set controls to control access to the CA-EXAMINE product libraries.
No additional RACF controls are required.
                                                                                                       327
                                          UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                           DISA Field Security Operations
21 January 2005                                                             Developed by DISA for the DOD
Use standard TOP SECRET data set controls to control access to the CA-EXAMINE product
libraries. No additional TOP SECRET controls are required.
F.12.5 CA-SYSVIEW/E
F.12.5.1 Overview
CA-SYSVIEW/E provides data center operators with an efficient full screen front-end to many
OS/390, CICS, and JES2 commands. It provides easy-to-use utilities to perform system tasks
such as dynamically changing the LINKLIST, adding or deleting Link Pack Area (LPA)
modules, and adding entries to the Program Properties Table (PPT). CA-SYSVIEW/E a1so
provides extensive resource displays such as cross memory connectivity between system
components and the task structure of address spaces.
CA-SYSVIEW/E can be accessed on-line, in local 3270 mode, through the application interface
(API), through the CICS Monitor Exit Interface (MEI), or through the batch interface. Access to
this product must be restricted to systems programmers, Security Administrators, and only those
operation specialists that have a unique requirement. The program product data sets must be
secured, thereby giving access to only authorized personnel. All commands that have the
capability to alter operating system control blocks or display sensitive data must also be secured.
On-line access is available from VTAM (as a VTAM application), TSO, ISPF, CICS, and from
CMS if OS/390 is running in a VM (virtual machine) environment. The local 3270 device
interface of CA-SYSVIEW/E can be used to run the product in a dedicated mode from any
locally attached 3270 device. This interface can be used to start a session with CA-SYSVIEW/E
when TSO and VTAM are not active. It can even be used when JES2 is not active.
328
                                         UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                                DISA Field Security Operations
21 January 2005                                                                  Developed by DISA for the DOD
(2)    Ensure that the system consoles and/or terminals dedicated to CA-SYSVIEW/E are in a
       controlled area accessible only to operations and systems programming personnel.
(3)    Ensure that access to the consoles and/or terminals dedicated to CA-SYSVIEW/E are
       further restricted to those personnel authorized to use the product.
ISPF and TSO Mode execution of CA-SYSVIEW/E occurs within the user’s TSO address space.
Authorized access to CA-SYSVIEW/E from ISPF and TSO will be controlled using the
following mechanisms:
(2)    CA-SYSVIEW/E will only appear as ISPF panel selection options for those individuals
       authorized access.
The following CICS transactions must be secured allowing access to only authorized personnel:
The CICS MEI allows you to customize your applications to pass information to
CA-SYSVIEW/E. Adding interface calls to existing packages running in CICS provides more
data collection information about the transaction. Information passed to CA-SYSVIEW/E is
collected for individual transactions. The MEI provides support for umbrella-type transactions.
XPFCMEI, a macro used as the interface to the monitor exit, is provided with CA-SYSVIEW/E.
Since this is a one-directional access to CA-SYSVIEW/E (i.e., the CICS transaction is sending
information to CA-SYSVIEW/E for collection), there is no requirement to enforce security to
use this interface.
                                                                                                           329
                                              UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                          DISA Field Security Operations
21 January 2005                                                            Developed by DISA for the DOD
The batch interface provides the capability to supply CA-SYSVIEW/E display commands as
input, and to receive simulated screen output to SYSOUT or a data set. The userid for the batch
session is controlled by the userid field on the JOB card. Access to the program GSVXBAT or
SYS2.SYSVIEW.LOADLIB should be restricted to only those userids that are associated with
the personnel authorized to use CA-SYSVIEW/E.
In order to use the API from TSO/E REXX, the REXX host command environment table must
include the entry SYSVIEWE. This can be done in one of two ways:
(2)    The SYSVIEWE entry can be added to the REXX modules IRXPARMS, IRXTSPRM,
       and/or IRXISPRM,
OR
(3)    It can be added dynamically by coding the statement ADDRESS ‘LINK’ GSVXRXAA at
       the beginning of the REXX routine that invokes the API.
With the latter method, the module GSVXRXAA will add the SYSVIEWE entry to the REXX
host command environment table if it does not exist. For that reason, the latter method must be
the only method for avoiding security risks. Since the GSVXRXAA module must be invoked
from the user’s TSO address space, normal controls can be enforced as specified in Section
H.12.5.2.1.3, ISPF and TSO Modes. The first method provides no mechanism to enforce
security controls.
330
                                         UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                                DISA Field Security Operations
21 January 2005                                                                  Developed by DISA for the DOD
When a user issues a command, CA-SYSVIEW/E checks the definitions in the GLOBAL
security group first. The user-defined security groups are also checked. If a userid is found in
any of these groups, the more specific definition in the user-defined group will override the
GLOBAL group definition. If a userid is not found in any other security group, use the
DEFAULT security group.
                                                                                                           331
                                               UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                               DISA Field Security Operations
21 January 2005                                                                 Developed by DISA for the DOD
The chart below lists the security categories that can be available for a security group. These
categories are options on the Group Access Display.
•     Security definitions that apply to sub-administrators are transferred to the users in the
      security groups that the sub-administrators create. Also, sub-administrators can change only
      the capabilities of the security groups they create, not their own.
•     The only security definitions that sub-administrators can change for their security groups are
      definitions affecting userids and commands.
332
                                               UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                            DISA Field Security Operations
21 January 2005                                                              Developed by DISA for the DOD
Userid and password validation is performed by either the Access Control Product (ACP) or the
internal security facility. Coding SAF=USER in the GSVXGEN module will enable
CA-SYSVIEW/E to call the ACP to validate the userid and password when accessing the
product through either the VTAM or the local 3270 interface. The USER setting has no effect on
the TSO, ISPF, and ROSCOE interfaces.
CA-SYSVIEW/E provides an exit that can be used to control the product’s security with any
Access Control Product. The security exit can be used to control access through the ACP instead
of, or in addition to, CA-SYSVIEW/E’s internal security tables. It is DOD’s direction to use the
ACP whenever possible. If the security exit is not going to be used, code SECEXIT= in the
GSVXGEN module; or code SECEXIT=AUTH.
Ensure that CA-SYSVIEW/E internal security allows access to all entities that are to be
controlled by the ACP. If internal security does not allow access to an entity, the security exit
will not be able to grant access. In the security exit source SYS2.SYSVIEW.SAMPLIB
(SAFSECX), set the global variable (i.e., GRCLASS) for the name of the General Resource
Class that the exit will use for an entity class according to the ACP:
         ACF2:                       SYSVIEW
         RACF:                       #SYSVIEW
         TOP SECRET:                 CAGSVX
Sections F.12.5.3.3, ACF2, F.12.5.3.4, RACF, and F.12.5.3.5, TOP SECRET, describe the
necessary steps required to define the General Resource Class for ACF2, RACF, and TOP
SECRET respectively.
This call is made when the user first enters CA-SYSVIEW/E. The purpose of the user validation
call is to determine if the user is authorized to use CA-SYSVIEW/E from the particular
environment (i.e., VTAM, TSO, CICS, etc.) that was used to log on, if the user is allowed
multiple sessions, and if display field checking is required.
                                                                                                       333
                                           UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                           DISA Field Security Operations
21 January 2005                                                             Developed by DISA for the DOD
Each environment that will provide access to CA-SYSVIEW/E will require an entity in the
ACP’s General Resource Class, along with an access list to identify those users that can access
CA-SYSVIEW/E resources. The following entities with an access list should be defined as
needed:
       SV.ENV.VTAM
       SV.ENV.TSO
       SV.ENV.ISPF
       SV.ENV.CICS
       SV.ENV.BATCH
Initialization Call
The purpose of the initialization call is to determine the commands for CA-SYSVIEW/E for
which the user is authorized. Only authorized commands will be displayed when the MENU
command is used. The initialization call is made when the user first enters CA-SYSVIEW/E and
is made only during CA-SYSVIEW/E’s session initialization. Only commands that are
authorized through CA-SYSVIEW/E internal security are checked with an initialization call.
Scrolling commands and function commands (e.g., FIND, HELP, MENU, etc.) are not checked.
The purpose of the command validation call is to provide the security exit with the command and
parameters entered by the user on the command line of CA-SYSVIEW/E. In order to grant
access to the CA-SYSVIEW/E commands using the ACP, define the generic entity SV.CMND.*
in the SYSVIEW resource class (i.e., #SYSVIEW) that permit universal access. Using the table
in Appendix E, CA-SYSVIEW/E Commands, as a guide, grant access to the sensitive commands
based on the users’ roles. For each command that requires controlled access, define an entity
(i.e., SV.CMND.command) in the CA-SYSVIEW/E resource class with no universal access,
defining only those users in the access list that are permitted to use the command.
The jobname validation call provides the security exit with the job information that the user
might access. Jobname validation calls are made when a command displays job-related
information.
The purpose of the resource validation call is to validate access to a resource name. Resource
validation calls are made when a user enters a line command that affects the resource.
334
                                         UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                             DISA Field Security Operations
21 January 2005                                                               Developed by DISA for the DOD
Termination Call
The purpose of the termination call is to allow the security exit to free any storage it has
acquired. The termination call is made after the user issues the END command.
All CA-SYSVIEW/E data sets need to be protected by the ACP. The level of access for each
data set by group is defined in the table that follows.
                      Table B-64. CA-SYSVIEW/E DATA SETS (G.12.5.3.2.3)
          DATA SET OR LIBRARY             ADMIN           SYSPROG            OPERATIONS
         SYS2.SYSVIEW.LOADLIB            READ           ALTER                READ
         SYS2.SYSVIEW.ISPFLIB            READ           ALTER                READ
         SYS2.SYSVIEW.SECURITY           UPDATE         READ                 READ
         SYS2.SYSVIEW.SAMPLIB                           ALTER
         SYS2.SYSVIEW.MACLIB                            ALTER
         SYS2.SYSVIEW.PARMLIB            READ           ALTER                READ
         SYS2.SYSVIEW.CLISTLIB           READ           ALTER                READ
         SYS2.SYSVIEW.PANELLIB           READ           ALTER                READ
         SYS2.SYSVIEW.HELPLIB            READ           ALTER                READ
         SYS2.SYSVIEW.BOOKS              READ           ALTER                READ
         SYS2.SYSVIEW.PLOTLIB                           ALTER                READ
         SYS2.SYSVIEW.PROFILE            UPDATE         READ                 READ
The following CICS transactions must be secured allowing access to only authorized personnel:
       XPFS
       XPFT
       XPFI
       SYSV
Please refer to Section 8.2, CICS, for guidance on using an ACP to restrict access to these
transactions.
                                                                                                        335
                                          UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                      DISA Field Security Operations
21 January 2005                                                        Developed by DISA for the DOD
F.12.5.3.3 ACF2
Associate the STIG recommended resource type SVW with the resource class CA-SYSVIEW/E.
NOTE: When coding entity rules in ACF2, use an entity rule TYPE of SVW and a mode of
           RESOURCE.
Define resource entities as required for controlling access to CA-SYSVIEW/E environments and
commands. Unless there is a unique restriction (see Table B-28 below for CA-SYSVIEW/E
resource entities), access is granted for all CA-SYSVIEW/E resources that are not explicitly
controlled. The following example grants access to all CA-SYSVIEW/E resources and then
establishes an entity and access control to the TSO environment and the DUMP command:
336
                                      UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                                DISA Field Security Operations
21 January 2005                                                                  Developed by DISA for the DOD
Define the APPLID to the APL resource class for only authorized users of CA-SYSVIEW/E in
VTAM mode:
                                                                                                           337
                                               UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                       DISA Field Security Operations
21 January 2005                                                         Developed by DISA for the DOD
F.12.5.3.4 RACF
(1)    Define the #SYSVIEW resource class to the RACF Class Descriptor Table (ICHRRCDE).
       The following is an example of an ICHRRCDE table source update using the ICHERCDE
       macro:
           ICHERCDE CLASS=#SYSVIEW,
                    ID=nnn,     <== This number must be a unique numeric.
                    FIRST=ANY,
                    OTHER=ANY,
                    POSIT=nnn
NOTE: The values specified for ID and POSIT are site-specific. Refer to the IBM RACF
          Macros and Interfaces manual for more information.
(2)    Assemble and link-edit ICHRRCDE into SYS1.LINKLIB. In accordance with Section
       2.1.2, Software Integrity, the RACF Class Descriptor Table must be installed and
       maintained using SMP/E.
(1)    Add the #SYSVIEW resource class to the RACF Router Table (ICHRFR01). Update the
       RACF Router Table source with the following entry:
           ICHRFRTB CLASS=#SYSVIEW,
                     ACTION=RACF
(2)    Assemble and link-edit ICHRFR01 into SYS1.LINKLIB. In accordance with Section
       2.1.2, Software Integrity, the RACF Class Descriptor Table must be installed and
       maintained using SMP/E.
NOTE: An IPL of the operating system is required for these changes to take effect.
(3)    Activate the RACF resource classes by using the RACF SETROPTS command using the
       following examples to perform the activation:
SETROPTS CLASSACT(#SYSVIEW)
338
                                        UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                        DISA Field Security Operations
21 January 2005                                                          Developed by DISA for the DOD
Define resource entities as required for controlling access to CA-SYSVIEW/E environments and
commands. Unless there is a unique restriction (see Table B-28 for CA-SYSVIEW/E resource
entities), access is granted for all CA-SYSVIEW/E resources that are not explicitly controlled.
The following example grants access to all CA-SYSVIEW/E resources and then establishes an
entity and access control to the TSO environment and the DUMP command:
Define the APPLID to the APPL resource class for only authorized users of CA-SYSVIEW/E in
VTAM mode. Examples of the commands to control access are shown below:
(1) Define a FACILITY. Add these statements to TOP SECRET's startup parameters:
         FAC(USERnn=NAME=GSVX)
         FAC(GSVX=PGM=GSV,MULTIUSER,SHRPRF,KEY=8,NOLUMSG,NOSTMSG)
         FAC(GSVX=MODE=FAIL,LOG(NONE),ACTIVE,TENV,NOABEND)
         FAC(GSVX=SIGN(M),NOTRACE,AUTHINIT)
         FAC(GSVX=NOAUDIT,ASUBM,DEFACID(*NONE*))
         FAC(GSVX=UIDACID=8)
                                                                                                   339
                                        UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                        DISA Field Security Operations
21 January 2005                                                          Developed by DISA for the DOD
(4) Allow all users associated to the ACID GSVX to have access to the Facility GSVX:
(1)    Define a new Entity Class Name in the Resource Definition Table (RDT), using the
       command:
       The following example grants access to all CA-SYSVIEW/E resources and then establishes
       an entity and access control to the TSO environment and the DUMP command:
NOTE: When adding generic entity names to TOP SECRET, do NOT include the “.*”.
Define the APPLID to the KLS resource class for only authorized users of CA-SYSVIEW/E in
VTAM mode:
340
                                        UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                                DISA Field Security Operations
21 January 2005                                                                  Developed by DISA for the DOD
System maintenance software products facilitate one or more of the following tasks regarding
program products and executable code:
      -    Installation
      -    Maintenance
      -    Customization
      -    Debugging
The products typically provide programmers with a comprehensive set of tools, which includes
commands, utilities, and reports, to perform these tasks in either interactive on-line mode or a
batch environment.
Consideration will be given to securing the data sets that contain the system maintenance
software products. Access to these data sets will not be permitted to the general user community,
but will only be granted to authorized personnel.
Use of sensitive utility controls will be considered. Evaluate all programs to determine if they
pose possible data or system integrity problems and/or potential security exposures. For
example, the SMP/E program, GIMSMP, should be considered sensitive and therefore be
restricted.
Interactive execution of the system maintenance software products will be available under the
appropriate TMP. Prohibit access to these on-line applications from general use. Only grant
access to authorized personnel.
Some system maintenance software products provide ACP resource interfaces for various
functions and options. Review and evaluate these interfaces for potential security exposures and
possible implementation. If it is determined that an enhanced level of protection is gained, an
interface may be installed. However, base-level ACP security controls will never be
compromised.
Use the following recommendations when securing access to system maintenance software:
(1)       Control access to the software product's data sets, and restrict access only to authorized
          personnel.
(2) Implement program protection for especially sensitive utilities (e.g., SMP/E).
(3)       Control access to the interactive on-line applications, and restrict access only to authorized
          users.
                                                                                                           341
                                              UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                                DISA Field Security Operations
21 January 2005                                                                  Developed by DISA for the DOD
(4)    Review and evaluate resource interfaces for potential implementation to ensure they do not
       pose a security risk or compromise base-level ACP controls.
F.13.2 SMP/E
SMP/E is the primary tool used to perform maintenance on the OS/390 operating system. If
adequate controls are not in place, the possibility exists that someone could alter the operating
system and product code. Additionally, problem diagnosis with IBM and other vendors becomes
difficult because the current maintenance level of a product can become questionable.
(1)    Protect all SMP/E data sets (i.e., SMPLOG, the CSI (Consolidated Software Inventory),
       SMPMTS, and SMPPTS) with data set-level controls. Access to these data sets will not
       be permitted to the general user community. Only grant access to authorized personnel.
(2)    Restrict access to the SMP/E program, GIMSMP, only to authorized personnel. Refer to
       Section 3.1.5.3, Sensitive Utility Controls, for further information.
(3)    Protect access to the libraries that SMP/E controls with data set-level controls. This
       includes target libraries and distribution libraries.
F.13.2.1 ACF2
Standard data set access rules are required and will be written for the library containing the
SMP/E utility, and for all files used and maintained by the product. Protect access to the
GIMSMP (SMP/E) program using the Protected Program List (PPGM) facility, as discussed
previously. Only grant program access to authorized users.
F.13.2.2 RACF
Protect SMP/E by using standard data set controls to protect the SMP/E product data sets. Also,
protect the GIMSMP program using the PROGRAM resource class. Only grant program
access to authorized users. Protect all SMP/E libraries using normal data set protection.
342
                                           UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                        DISA Field Security Operations
21 January 2005                                                          Developed by DISA for the DOD
Protect SMP/E by using standard data set controls to protect the SMP/E product data sets. Also,
protect the GIMSMP program using the PROGRAM resource class. Only grant program
access to authorized users. Protect all SMP/E libraries using normal data set protection.
Refer to Section 3.4.5.3, Sensitive Utility Controls, for further information.
                                                                                                   343
                                        UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                                    DISA Field Security Operations
21 January 2005                                                                      Developed by DISA for the DOD
Abort Mode Term used in ACF2 to indicate that the system is in full protection mode.
ACP                         Access Control Product. Industry term that designates an add-on system
                            component/product that performs system-wide security validation (e.g., ACF2,
                            RACF, and TOP SECRET).
APF                         Authorized Program Facility. MVS component that allows programs to access
                            protected facilities of the operating system.
AUTOTRAN                    Product marketed by Universal Software Inc. to provide support for transferring
                            files from a local host computer to a remote computer.
Batch                       Concept of taking work that needs to be accomplished and allowing MVS to
                            process it in background mode.
BLP                         Bypass Label Processing. Feature provided by MVS that allows bypassing of the
                            labels written on tapes that identify the actual data set name.
CA                          Computer Associates Inc. Corporation that markets the ACF2 and TOP
                            SECRET Access Control Products.
344
                                                UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                                    DISA Field Security Operations
21 January 2005                                                                      Developed by DISA for the DOD
CA-11                       Automated Rerun and Tracking System. Performs as a rerun handler, as a job
                            analysis and tracking system, or as a combination of both.
CA-LOOK                     Product marketed by Computer Associates that displays MVS internals and
                            system information.
CA-TOP SECRET               Access Control Product marketed by Computer Associates. Also referred to as
                            CA-TSS.
CICS                        Customer Information Control System. Interactive system marketed by IBM for
                            processing interactive, transaction-based applications.
CPU                         Central Processing Unit. Computer hardware that processes computer software
                            instructions.
DASD                        Direct Storage Device. A hardware device used for temporary or permanent
                            storage of data and software.
                                                                                                               345
                                                 UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                                     DISA Field Security Operations
21 January 2005                                                                       Developed by DISA for the DOD
Data Integrity              Concept of ensuring that data is not manipulated or accessed in any way other
                            than what was originally intended.
Data Labels                 Labels that identify the classification level of data. Normally associated with B1
                            security processing.
Data Owner                  Organization or individual that owns the data on a system and is responsible for
                            the contents and integrity of that data.
DFDSS                       Data Facility Data Set Services. Product marketed by IBM that is designed to
                            perform data set management.
DFHSM                       Data Facility Hierarchical Storage Manager. Product marketed by IBM that is
                            designed to perform hierarchical storage management.
DSF                         Device Support Facilities. Product marketed by IBM that is designed to perform
                            DASD maintenance and DASD error identification.
EXCP                        Execute Channel Program. MVS macro instruction used to execute channel
                            commands to perform I/O processing to an auxiliary device.
Fail Mode                   Term used in RACF and TOP SECRET processing to indicate that the security
                            system is in full protection mode.
346
                                                UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                                    DISA Field Security Operations
21 January 2005                                                                      Developed by DISA for the DOD
FDR                         Fast Dump Restore. Product marketed by Innovation that is used to perform
                            DASD management.
FLASHER                     Product marketed by Tone Software to provide interactive viewing of the JES3
                            spool queue and consoles.
GID                         Group Identifier. Defined in OS/390 UNIX as the numeric ID that identifies a
                            group to which users belong for the purpose of file security.
GSO                         Global System Options. Type of ACF2 records that specifies overall processing
                            options for the ACF2 Access Control Product.
HFS                         Hierarchical File System. The collection of mountable file systems, organized in
                            a tree structure with the root file system as the highest member.
IAM                         Information Assurance Manager. The individual responsible for the information
                            assurance program of a DOD information system or organization.
IANA                        Internet Assigned Numbers Authority. The IANA defines standards for various
                            protocol implementations commonly used on the Internet.
IBM                         International Business Machines. Corporation that markets the MVS operating
                            system and the RACF security product.
                                                                                                               347
                                                UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                                     DISA Field Security Operations
21 January 2005                                                                       Developed by DISA for the DOD
I/O Appendage               Input/Output Appendage. Routine designed to provide additional controls for
                            system I/O operations.
IPL Initial Program Load. Initial load of the operating system into the CPU.
IPSC                        Internal Product Security Controls are security mechanisms internal to COTS
                            products and GOTS applications.
ISPF                        Interactive Systems Productivity. Product marketed by IBM that runs under TSO
                            to provide menu-driven capabilities for programmer functions.
JCL                         Job Control Language. Language provided by MVS to define input, output, and
                            processing parameters to job streams.
JES2/JES3                   Job Entry Subsystem. Subsystem designed to process job streams in the MVS
                            environment.
LCF                         Limited Command Function. TOP SECRET method for authorizing access to
                            system resources.
Legacy Site                 DOD facility scheduled for eventual migration into a site, but still functioning as
                            a separate entity.
LID                         Logon ID. Term used by ACF2 to uniquely identify a user of resources (i.e.,
                            userid).
LOOK Product marketed by Computer Associates that allows MVS diagnostic functions.
348
                                                UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                                    DISA Field Security Operations
21 January 2005                                                                      Developed by DISA for the DOD
LPA                         Link Pack Area. Area of storage used for re-entrant programs. Loaded during
                            IPL.
LSCA                        Limited Central Security Control ACID. Has authority of an SCA, but has a
                            limited scope of control that is customized by the MSCA.
MAINVIEW                    Product marketed by Boole and Babbage used to monitor MVS system
                            performance and analyze system problems.
MRO                         Multiple Region Option. Concept to link multiple CICS regions together and
                            make it look like one region to the system user.
MSCA                        Master Security Control ACID. Highest level Security Administrator who
                            controls the master password for updating the security database. Scope includes
                            the entire installation. Has authority to designate and authorize SCAs, LSCAs,
                            ZCAs, VCAs, and DCAs.
MUSASS                      Multiple User Single Address Space System. Term used to identify an address
                            space that multiple users can access at one time.
MVS                         Multiple Virtual Storage. Operating system designed by IBM to allow multiple
                            processes to concurrently use mainframe computing resources.
NFS                         Network File System. A protocol that allows users to directly access files that
                            reside on other network-connected systems.
OI Operating Instructions.
                                                                                                               349
                                                UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                                    DISA Field Security Operations
21 January 2005                                                                      Developed by DISA for the DOD
PD Position Description.
PKCS                        Public Key Cryptography Standards. The set of standards for elements used in
                            the deployment of public key cryptography.
PPT                         Program Properties Table. Facility provided by IBM to identify programs that
                            require special designation when invoked in an OS/390 environment.
RACF                        Resource Access Control Facility. Access Control Product marketed by IBM to
                            protect OS/390 operating system resources.
RACROUTE Macro provided by the OS/390 operating system to interface with SAF.
RCC                         Regional Control Center (now referred to as the Regional Operations Service
                            Center [ROSC]).
RESOLVE                     Product marketed by Boole and Babbage that is designed to perform MVS
                            diagnostics.
RJE                         Remote Job Entry. Workstations used to submit background work to the MVS
                            system.
ROSC                        Regional Operations Service Center (formerly referred to as the Regional Control
                            Center [RCC]).
SCPLIST                     Scope List. ACF2 feature used to identify and limit the level of administration
                            authorized for a delegated Security Administrator.
SETROPTS                    Set RACF Options. Mechanism by which security control defaults are
                            established for RACF.
SM Security Manager.
SMF                         System Management Facility. MVS-provided facility that provides for the
                            tracking of system activity (used by Access Control Products to store security-
                            related information).
SNIFFER                     Network interface that is designed to interrogate data passed through the network
                            communication links.
SNT                         Sign-on Table. Facility provided in CICS to allow CICS internal security
                            functions.
Spawn The act of creating and starting a child process running a named program.
SSO Software Support Organization (local Executive Software group at the site).
STC                         Started Task Control. Facility provided by MVS to submit work to run in the
                            background mode (generally used for operations-controlled software).
Sticky bit                  Defined in OS/390 UNIX as an FSP permission bit that can be applied to
                            directories or executable files.
                                                                                                               351
                                                UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                                    DISA Field Security Operations
21 January 2005                                                                      Developed by DISA for the DOD
Super IDs                   Userids defined to be used in emergency situations to correct problems when the
                            systems programmer access is insufficient to do so.
Superuser                   Defined in OS/390 UNIX as a user who passes all security checks with respect to
                            privileged commands and file accesses. Users assigned a UID of 0 (zero) have
                            superuser status.
SVC                         Supervisor Call. Code executed by the OS/390 operating system on behalf of a
                            user to perform system-level functions.
SYSLOG                      System Log. JES spool file of all system messages issued to, or by, the OS/390
                            operating system and its components.
TMON                        The Monitor. Series of products marketed by Landmark Corp. that allows
                            diagnosis and analysis of operating system components.
TSO                         Time Sharing Option. Product marketed by IBM that is designed to allow
                            flexibility to programmers in modifying the operating environment.
UACC                        Universal. Definition within RACF software that can be established for profiles
                            to give all users a particular level.
UID                         UNIX User Identifier. Defined in OS/390 UNIX as the numeric ID that
                            identifies a user for the purpose of file and process management security.
                            Although highly discouraged, it is possible to assign the same UID to multiple
                            users. See also superuser.
Userid User ID. Mechanism used to uniquely identify a user of system resources.
352
                                                UNCLASSIFIED
OS/390 & z/OS STIG, V5R1, Volume 2                                                      DISA Field Security Operations
21 January 2005                                                                        Developed by DISA for the DOD
VCA                         Divisional Control ACID. Has capability to define user ACIDs with ability to
                            create authorization profiles. Scope of authority is limited to the ACID's
                            assigned division.
ZCA                         Zone Control ACID. Administrative ACID whose scope of authority includes an
                            entire zone. Controls all VCAs, DCAs, divisions, departments, profiles, users,
                            and resources owned within the ACID's zone.
                                                                                                                 353
                                                UNCLASSIFIED