STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 2 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to IBM z/OS ACF2 Security Technical Implementation Guide

V-223510

CAT II (Medium)

ACF2 TSOCRT GSO record values must be set to obliterate the logon to ASCII CRT devices.

Rule ID

SV-223510r958470_rule

STIG

IBM z/OS ACF2 Security Technical Implementation Guide

Version

V9R8

CCIs

CCI-000206

Discussion

To prevent the compromise of authentication information, such as passwords during the authentication process, the feedback from the operating system must not provide any information allowing an unauthorized user to compromise the authentication mechanism. Obfuscation of user-provided information that is typed into the system is a method used when addressing this risk. Displaying asterisks when a user types in a password is an example of obscuring feedback of authentication information.

Check Content

From the ISPF Command Shell enter:
ACF
SET CONTROL(GSO) <enter>
LIST TSOCRT

If the GSO TSOCRT record values conform to the following requirements, this is not a finding.

STRING(A12FA11C1A270C0D)

Fix Text

Define a clear string used to obliterate the logon to ASCII CRT devices.

STRING(A12FA11C1A270C0D)

Example:
SET C(GSO)
INSERT TSOCRT STRING(A12FA11C1A270C0D)

F ACF2,REFRESH(TSOCRT)