USERA has the following JESSPOOL permissions:
TSS PERMIT(USERA) JESSPOOL(xxxx.USERA) ACCESS(NONE)
which should deny access, but it is still granted access to the resource.
With the JESSPOOL resource class, if the second high level qualifier is the acid getting the security check, it will always be granted access regardless of what permissions are set.
This is not a bug, but how the code was written.
Users should always be able to get at their own JESSPOOL resources. Otherwise, abends could occur in JES.
This is not just done by CA Top Secret but other z/OS security products.