ACP00260 - Memory and privileged program dumps must be protected in accordance with proper security requirements.
Release : 16.0
Component : CA Top Secret for z/OS
STIG ID - BTSS0017: Protect Memory and Privileged Program DumpsSeverity: 2- MediumAccess to memory and privileged program dumps running Trusted Control Block (TCB) key 0 to 7 may hold passwords,encryption keys, or other sensitive data that must remain secure. Failure to control access to these facilities could resultin unauthorized personnel modifying sensitive z/OS lists. This exposure may threaten the integrity and availability of theoperating system environment and compromise the confidentiality of customer data.The organization must ensure that memory and privileged program dumps running TCB key 0 to 7 are protected inaccordance with proper security requirements.This STIG article shows how to ensure that access to memory and privileged program dumps running TCB key 0 to 7 arerestricted to appropriate system tasks and/or system programming personnel.Identify Audit FindingComplete these steps to determine if you should consider remediation:
Follow these steps:
TSS WHOHAS IBMFAC(IEAABD.)
IBMFAC = IEAABD. OWNER(SYSDEPT )
XAUTH = IEAABD.DMPAUTH ACID(XYZ4321 )
ACCESS = UPDATE
ACTION = AUDIT
XAUTH = IEAABD.DMPAUTH ACID(ABC1234 )
ACCESS = READ
XAUTH = IEAABD.DMPAKEY ACID(XYZ4321 )
ACCESS = READ
ACTION = AUDIT
TSS LIST(RDT) RESCLASS(IBMFAC)
The product produces output showing the resource definitions.
Example output:
ACCESSORID = *RDT* NAME = RESOURCE DEFINITIONS
RESOURCE CLASS = IBMFAC
RESOURCE CODE = X'086' POSIT = 8
ATTRIBUTE = NOMASK,MAXOWN(08),MAXPERMIT(039),ACCESS,PRIVPGM,DEFPROT
ACCESS = NONE(0000),CONTROL(6400),UPDATE(6000),READ(4000)
ACCESS = WRITE(2000),ALL(FFFF)
DEFACC = READ
.7. If IEAABD.DMPAKEY. resource and/or generic equivalent specifies that all access is restricted to systems personneland that all access is logged, your organization does not have an audit finding.
Remediate Audit Finding
Limit all access to change control options to time frames of approved changes and reduce to view only outside of approved change windows.
Follow these steps:
TSS ADDTO(deptacid) IBMFAC(IEAABD.)
The product confirms your change.
While setting DEFPROT for IBMFAC is a best practice, other undefined IBMFAC resources may not be protected or granted. After you turn on DEFPROT, all resources are protected whether ownership is defined or not. Ensure that review, planning, and non-production test groups are informed prior to setting DEFPROT in production systems.
TSS REPLACE(RDT) RESCLASS(IBMFAC) ATTR(DEFPROT)
TSS PERMIT(authorized_users) IBMFAC(IEAABD.DMPAUTH) ACCESS(READ)
TSS PERMIT(authorized_system_programmers) IBMFAC(IEAABD.DMPAUTH) ACCESS(UPDATE) ACTION(AUDIT)
TSS PERMIT(authorized_system_programmers) IBMFAC(IEAABD.DMPAKEY) ACCESS(READ) ACTION(AUDIT)