{"stig":{"title":"z/OS CL/SuperSession for ACF2 Security Technical Implementation Guide","version":"7","release":"2"},"checks":[{"vulnId":"V-224282","ruleId":"SV-224282r1141407_rule","severity":"medium","ruleTitle":"CL/SuperSession profile options are set improperly.","description":"Product configuration/parameters control the security and operational characteristics of products. If these parameter values are improperly specified, security and operational controls may be weakened. This exposure may threaten the availability of the product applications, and compromise the confidentiality of customer data.","checkContent":"The following steps are necessary for reviewing the CL/SuperSession options:\n\nRequest online access from the site administrator to view CL/SuperSession parameter settings.\nOnce access to the CL/SuperSession Main Menu has been obtained, select the option for the ADMINISTRATOR menu.\nFrom the ADMINISTRATOR menu, select the option for the PROFILE SELECTION menu.\nFrom the PROFILE SELECTION menu, select the View GLOBAL Profile option.\nAfter selection of the View GLOBAL Profile option, the Update GLOBAL Profile menu appears. From this menu, select the profile to be reviewed:\n\n- To view the Common profile, select: _Common\n- To view the SUPERSESSION profile, select: _SupSess\n\nAutomated Analysis\nRefer to the following report produced by the z/OS Data Collection:\n\n- PDI(ZCLS0040).\n\nCompare the security parameters as specified in the Required CL/SuperSession Common Profile Options and Required CL/SuperSession Profile Options Tables in the z/OS STIG Addendum against the settings in CL/SuperSession.\n\nIf all options as specified in the Required CL/SuperSession Common Profile Options and Required CL/SuperSession Profile Options Tables in the z/OS STIG Addendum are in effect, this is not a finding.","fixText":"The systems programmer and ISSO will review all session manager security parameters and control options for compliance with the requirements of the z/OS STIG Addendum Required CL/SuperSession Common Profile Options and Required CL/SuperSession Profile Options Tables. Verify that the options are set properly.","ccis":["CCI-000057","CCI-000381"]},{"vulnId":"V-224283","ruleId":"SV-224283r1141410_rule","severity":"medium","ruleTitle":"CL/SuperSession must be properly configured to generate SMF records for audit trail and accounting reports.","description":"Product configuration/parameters control the security and operational characteristics of products. If these parameter values are improperly specified, security and operational controls may be weakened. This exposure may threaten the availability of the product applications and compromise the confidentiality of customer data.","checkContent":"Version 3 of CL/SuperSession\nReview the member KLKINNAF in the TLVPARM DD statement concatenation of the CL/SuperSession STC procedure to determine SMF number. (This member is located in SYS3.OMEGAMON.qualifier.RLSPARM.)\n\nVersion 2 of CL/SuperSession\nReview the member KLVINNAF in the TLVPARM DD statement concatenation of the CL/SuperSession STC procedure to determine SMF number. (This member is located in SYS3.OMEGAMON.qualifier.RLSPARM.)\n\nRefer to the following report produced by the z/OS Data Collection:\n\n- EXAM.RPT(SMFOPTS).\n\nRefer to the following report produced by the z/OS Data Collection:\n\n- PDI(ZCLS0041).\n\nIf the following guidance is true, this is not a finding.\n\nIf the SMF= field specifies an SMF record number, review the SMFOPTS report to verify SMF is writing that record type.\n\nIf SMF is writing the record number specified by SMF=, this is not a finding.","fixText":"Ensure the Session Manager generates SMF records for audit trail and accounting reports.\n\nTo provide an audit trail of user activity in CL/SuperSession, configure the Network Accounting Facility (NAF) to require SMF recording of accounting and audit data. Accounting to the journal dataset is optional at the discretion of the site. Ensure that the NAF parameter options for member KLKINNAF for Version 3 of CL/SuperSession or KLVINNAF for Version 2 of CL/SuperSession RLSPARM initialization parameter library are coded to the below specifications.\n\nDSNAME= dsname - Name of the NAF journal dataset. Required only if the site is collecting accounting and audit data in the journal dataset in addition to the SMF data.\n\nMOD - If the journal dataset is used, this parameter should be set to ensure that logging data in the dataset is not overwritten.\n\nSMF=nnn - SMF record number. This field is mandatory to ensure that CL/SuperSession data is always written to the SMF files.","ccis":["CCI-000172","CCI-000381","CCI-003938"]},{"vulnId":"V-224284","ruleId":"SV-224284r1141413_rule","severity":"medium","ruleTitle":"CL/SuperSession Install datasets must be properly protected.","description":"CL/SuperSession Install datasets provide the capability to use privileged functions and/or have access to sensitive data. Failure to properly restrict access to their datasets could result in violating the integrity of the base product which could result in compromising the operating system or sensitive data.","checkContent":"Refer to the following report produced by the dataset and Resource Data Collection:\n\n- SENSITVE.RPT(KLSRPT).\n\nAutomated Analysis\nRefer to the following report produced by the dataset and Resource Data Collection:\n\n- PDI(ZCLS0000).\n\nVerify that access to the CL/SuperSession Install datasets are properly restricted. If the following guidance is true, this is not a finding.\n\nThe ACF2 dataset rules for the datasets restrict WRITE and/or greater access to systems programming personnel.\n\nThe ACF2 dataset rules for the datasets do not specify that all (i.e., failures and successes) WRITE and/or greater access will be logged.","fixText":"Ensure that WRITE and/or greater access to CL/SuperSession install datasets is limited to systems programmers only, and all WRITE and/or greater access is logged. Auditors should have READ access.\n\nThe installing systems programmer will identify and document the product datasets, categorize them according to who will have WRITE and/or greater access, and if required, ensure that all WRITE and/or greater access is logged. The installing systems programmer will identify if any additional groups have UPDATE access for specific datasets, and once documented will work with the ISSO to ensure that they are properly  restricted to the ACP (Access Control Program ) active on the system.\n\nThe following datasets are an example of datasets to be protected: \n\nSYS2.OMEGAMON\nSYS2.OMEGAMON.V-.TLSLOAD\nSYS2.OMEGAMON.V-.TLVLOAD\nSYS3.OMEGAMON\nSYS3.OMEGAMON.RLSLOAD\n\nThe following commands are provided as an example for implementing dataset controls: \n\n$KEY(SYS2)\nOMEGAMON.- UID(syspaudt) R(A) W(L) A(L) E(A)\nOMEGAMON.V-.TLSLOAD UID(syspaudt) R(A) W(L) A(L) E(A) \nOMEGAMON.V-.TLVLOAD UID(syspaudt) R(A) W(L) A(L) E(A) \nOMEGAMON.- UID(audtaudt) R(A) E(A)\n\n$KEY(SYS3)\nOMEGAMON.- UID(syspaudt) R(A) W(L) A(L) E(A)\nOMEGAMON.RLSLOAD UID(syspaudt) R(A) W(L) A(L) E(A) \nOMEGAMON.- UID(audtaudt) R(A) E(A)","ccis":["CCI-001499","CCI-002234"]},{"vulnId":"V-224285","ruleId":"SV-224285r1141416_rule","severity":"medium","ruleTitle":"CL/SuperSession STC datasets must be properly protected.","description":"CL/SuperSession STC datasets provide the capability to use privileged functions and/or have access to sensitive data. Failure to properly restrict access to their datasets could result in violating the integrity of the base product which could result in compromising the operating system or sensitive data.","checkContent":"Refer to the following report produced by the dataset and Resource Data Collection:\n\n- SENSITVE.RPT(KLSSTC).\n\nAutomated Analysis\nRefer to the following report produced by the dataset and Resource Data Collection:\n\n- PDI(ZCLS0001).\n\nVerify that the accesses to the CL/SuperSession STC datasets are properly restricted. If the following guidance is true, this is not a finding.\n\nThe ACF2 dataset access authorizations restrict READ access to auditors and authorized users.\n\nThe ACF2 dataset access authorizations restrict WRITE and/or greater access to systems programming personnel.\n\nThe ACF2 dataset rules for the datasets restrict WRITE and/or greater access to the product STC(s) and/or batch job(s).","fixText":"Ensure that WRITE and/or greater access to CL/SuperSession STC datasets are limited to systems programmers and CL/SuperSession STC only. READ access can be given to auditors and authorized users.\n\nThe installing systems programmer will identify and document the product datasets, categorize them according to who will have WRITE and/or greater access, and if required, ensure that all WRITE and/or greater access is logged. The installing systems programmer will identify if any additional groups have WRITE and/or greater access for specific datasets, and once documented will work with the ISSO to ensure they are properly restricted to the ACP (Access Control Program) active on the system.\n\nNote: The datasets and/or dataset prefixes identified below are examples of a possible installation. The actual datasets and/or prefixes are determined when the product is installed on a system through the product's installation guide and can be site specific. \n\nThe following datasets are an example of datasets to be protected:\n\nSYS3.OMEGAMON.RLSNAF\nSYS3.OMEGAMON.RLSNAM\nSYS3.OMEGAMON.RLSTDB\nSYS3.OMEGAMON.RLSVLOG\n\nThe following commands are provided as an example for implementing dataset controls: \n\n$KEY(SYS3)\nOMEGAMON.RLSNAF UID(*) R(A) E(A)\nOMEGAMON.RLSNAF UID(audtaudt) R(A) E(A)\nOMEGAMON.RLSNAF UID(syspaudt) R(A) W(A) A(A) E(A)\nOMEGAMON.RLSNAF UID(stc KLS) R(A) W(A) A(A) E(A)\nOMEGAMON.RLSNAM UID(*) R(A) E(A)\nOMEGAMON.RLSNAM UID(audtaudt) R(A) E(A)\nOMEGAMON.RLSNAM UID(syspaudt) R(A) W(A) A(A) E(A)\nOMEGAMON.RLSNAM UID(stc KLS) R(A) W(A) A(A) E(A)\nOMEGAMON.RLSTDB UID(*) R(A) E(A)\nOMEGAMON.RLSTDB UID(audtaudt) R(A) E(A)\nOMEGAMON.RLSTDB UID(syspaudt) R(A) W(A) A(A) E(A)\nOMEGAMON.RLSTDB UID(stc KLS) R(A) W(A) A(A) E(A)\nOMEGAMON.RLSVLOG UID(*) R(A) E(A)\nOMEGAMON.RLSVLOG UID(audtaudt) R(A) E(A)\nOMEGAMON.RLSVLOG UID(syspaudt) R(A) W(A) A(A) E(A)\nOMEGAMON.RLSVLOG UID(stc KLS) R(A) W(A) A(A) E(A)","ccis":["CCI-001499"]},{"vulnId":"V-224286","ruleId":"SV-224286r1144190_rule","severity":"medium","ruleTitle":"CL/SuperSession Started Task name is not properly identified / defined to the system ACP.","description":"CL/SuperSession requires a started task that will be restricted to certain resources, datasets, and other system functions. Defining the started task as a userid to the system ACP allows the ACP to control the access and authorized users that require these capabilities. Failure to properly control these capabilities could compromise the operating system environment, ACP, and customer data.","checkContent":"Refer to the following report produced by the ACF2 Data Collection:\n\n- ACF2CMDS.RPT(ATTSTC).\n\nVerify that the logonid(s) for the CL/SUPERSESSION started task(s) is (are) properly defined. If the following attributes are defined, this is not a finding.\n\nSTC\nMUSASS\nNO-SMC","fixText":"The systems programmer and ISSO will ensure that the started task for CL/SuperSession is properly defined.\n\nReview all session manager security parameters and control options for compliance. Develop a plan of action and implement the changes as specified.\n\nDefine the started task userid KLS for CL/SuperSession.\n\nExample:\n\nINSERT KLS NAME(STC, CL/SuperSession) MUSASS NO-SMC STC","ccis":["CCI-000764"]},{"vulnId":"V-224287","ruleId":"SV-224287r1141422_rule","severity":"medium","ruleTitle":"CL/SuperSession KLVINNAM member must be configured in accordance with security requirements.","description":"CL/SuperSession configuration/parameters control the security and operational characteristics of products. If these parameter values are improperly specified, security and operational controls may be weakened. This exposure may threaten the availability of the product applications, and compromise the confidentiality of customer data.","checkContent":"Version 3 of CL/SuperSession\nReview the member KLKINNAM in the TLVPARM DD statement concatenation of the CL/SuperSession STC procedure. (This member is located in SYS3.OMEGAMON.qualifier.RLSPARM.)\n\nVersion 2 of CL/SuperSession\nReview the member KLVINNAM in the TLVPARM DD statement concatenation of the CL/SuperSession STC procedure. (This member is located in SYS3.OMEGAMON.qualifier.RLSPARM.)\n\nAutomated Analysis\nRefer to the following report produced by the z/OS Data Collection:\n\n- PDI(ZCLS0042).\n\nIf one of the following configuration settings is specified for each control point defined in the KLKINNAM member for version 3 of CL/SuperSession or KLVINNAM member for version 2 of CL/SuperSession, this is not a finding.\n\nDEFAULT DSNAME(SYS3.OMEGAMON.qualifier.RLSNAM) -\nNORACF -\nCLASSES=APPCLASS -\nNODB -\nEXIT=KLSA2NEV\n\n(The following is for z/OS CAC logon processing)\nDEFAULT DSNAME(SYS3.OMEGAMON.qualifier.RLSNAM) -\nSAF -\nCLASSES=APPCLASS -\nNODB -\nEXIT=KLSSFPTX","fixText":"Ensure that the parameter options for member KLKINNAM for Version 3 of CL/SuperSession or KLVINNAM for Version 2 of CL/SuperSession are coded to the below specifications.\n\n(Note: The dataset identified below is an example of a possible installation. The actual dataset is determined when the product is installed on a system through the product's installation guide and can be site specific.)\n\nReview the member KLKINNAM or KLVINNAM in the TLVPARM DD statement concatenation of the CL/SuperSession STC procedure. (This member is located in SYS3.OMEGAMON.qualifier.RLSPARM.) Ensure all session manager security parameters and control options are in compliance according to the following: \n\nDEFAULT DSNAME(SYS3.OMEGAMON.qualifier.RLSNAM) -\n      NORACF -\n      CLASSES=APPCLASS -\n      NODB -\n      EXIT=KLSA2NEV\n\n(The following is for z/OS CAC logon processing)\nDEFAULT DSNAME(SYS3.OMEGAMON.qualifier.RLSNAM) -\n      SAF -\n      CLASSES=APPCLASS -\n      NODB -\n      EXIT=KLSSFPTX","ccis":["CCI-000381"]},{"vulnId":"V-224288","ruleId":"SV-224288r1141424_rule","severity":"medium","ruleTitle":"CL/SuperSession APPCLASS member is not configured in accordance with the proper security requirements.","description":"CL/SuperSession configuration/parameters control the security and operational characteristics of products. If these parameter values are improperly specified, security and operational controls may be weakened. This exposure may threaten the availability of the product applications, and compromise the confidentiality of customer data.","checkContent":"Review the member APPCLASS in the TLVPARM DD statement concatenation of the CL/SuperSession STC procedure. (This member is located in SYS3.OMEGAMON.qualifier.RLSPARM.)\n\nAutomated Analysis\nRefer to the following report produced by the z/OS Data Collection:\n\n- PDI(ZCLS0043).\n\nIf the parameters for the member APPCLASS are configured as follows, this is not a finding.\n\n\tVGWAPLST EXTERNAL=APL","fixText":"The systems programmer and ISSO will ensure that the parameter options for member APPCLASS are coded to the below specifications.\n\nReview the member APPCLASS in the TLVPARM DD statement concatenation of the CL/SuperSession STC procedure. (This member is located in SYS3.OMEGAMON.qualifier.RLSPARM.) Ensure all session manager security parameters and control options are in compliance according to the following: \n\nVGWAPLST EXTERNAL=APL","ccis":["CCI-000381"]}]}