Free DISA STIG and SRG Library | Vaulted

IBM z/VM Security Technical Implementation Guide

Version 1 Release 0.1
2017-08-23
U_IBM_zVM_STIG_V1R0-1_Manual-xccdf.xml
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.

Vulnerabilities (128)

The IBM z/VM TCP/IP must Include an SSLSERVERID statement in the TCP/IP server configuration file.

Finding ID
IBMZ-VM-001100
Rule ID
IBMZ-VM-001100_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000426-GPOS-00190
CCI
CCI-002422
Target Key
(None)
Documentable
No
Discussion

The Secure Socket Layer (SSL) server, provides processing support for secure (encrypted) communication between remote clients and z/VM TCP/IP application servers that are configured for secure communications The TCP/IP (stack) server routes requests for secure connections to an SSL server, which interacts with a client on behalf of an application server to perform handshake operations and the exchange of cryptographic parameters for a secure session. The SSL server then manages the encryption and decryption of data for an established, secure session. Remote access is access to DoD nonpublic information systems by an authorized user (or an information system) communicating through an external, non-organization-controlled network. Remote access methods include, for example, dial-up, broadband, and wireless. Encryption provides a means to secure the remote connection to prevent unauthorized access to the data traversing the remote access connection (e.g., RDP), thereby providing a degree of confidentiality. The encryption strength of a mechanism is selected based on the security categorization of the information. Without confidentiality protection mechanisms, unauthorized individuals may gain access to sensitive information via a remote access session.

Fix Text

Configure the “SSLSERVERID” statement to force auto logging of an SSL server before all other servers in the “AUTOLOG” list.

Check Content

Examine the “SSLSERVERID” statement in the TCP/IP server configuration file. If the “SSLSERVERID” statement identifies at least one User ID for an SSL server, this is not a finding.

The IBM z/VM TCP/IP SECURETELNETCLIENT option for telnet must be set to YES.

Finding ID
IBMZ-VM-001090
Rule ID
IBMZ-VM-001090_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000426-GPOS-00190
CCI
CCI-002422
Target Key
(None)
Documentable
No
Discussion

Information can be either unintentionally or maliciously disclosed or modified during preparation for transmission, for example, during aggregation, at protocol transformation points, and during packing/unpacking. These unauthorized disclosures or modifications compromise the confidentiality or integrity of the information. Ensuring the confidentiality of transmitted information requires the operating system to take measures in preparing information for transmission. This can be accomplished via access control and encryption. Use of this requirement will be limited to situations where the data owner has a strict requirement for ensuring data integrity and confidentiality is maintained at every step of the data transfer and handling process. When transmitting data, operating systems need to support transmission protection mechanisms such as TLS, SSL VPNs, or IPsec. The SECUREDATA statement specifies the FTP server-wide minimum security level for data connections.

Fix Text

Configure the TCP/IP DATA file “SECURETELNETCLIENT” option to “YES”.

Check Content

Examine the TCP/IP DATA file. If “SECURETELNETCLIENT” option is set to “YES”, this is not a finding.

The IBM z/VM TCP/IP SECUREDATA option for FTP must be set to REQUIRED.

Finding ID
IBMZ-VM-001080
Rule ID
IBMZ-VM-001080_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000426-GPOS-00190
CCI
CCI-002422
Target Key
(None)
Documentable
No
Discussion

Information can be either unintentionally or maliciously disclosed or modified during preparation for transmission, for example, during aggregation, at protocol transformation points, and during packing/unpacking. These unauthorized disclosures or modifications compromise the confidentiality or integrity of the information. Ensuring the confidentiality of transmitted information requires the operating system to take measures in preparing information for transmission. This can be accomplished via access control and encryption. Use of this requirement will be limited to situations where the data owner has a strict requirement for ensuring data integrity and confidentiality is maintained at every step of the data transfer and handling process. When transmitting data, operating systems need to support transmission protection mechanisms such as TLS, SSL VPNs, or IPsec. The SECUREDATA statement specifies the FTP server-wide minimum security level for data connections.

Fix Text

Configure the “SECUREDATA” statement in the FTP server configuration file to specify “REQUIRED”.

Check Content

Examine the FTP server configuration file. If there is no “SECUREDATA” statement, this is a finding. If the “SECUREDATA” statement specifies “REQUIRED”, this is not a finding.

All IBM z/VM TCP/IP servers must be configured for SSL/TLS connection.

Finding ID
IBMZ-VM-001070
Rule ID
IBMZ-VM-001070_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000425-GPOS-00189
CCI
CCI-002420
Target Key
(None)
Documentable
No
Discussion

Information can be either unintentionally or maliciously disclosed or modified during preparation for transmission, for example, during aggregation, at protocol transformation points, and during packing/unpacking. These unauthorized disclosures or modifications compromise the confidentiality or integrity of the information. Ensuring the confidentiality of transmitted information requires the operating system to take measures in preparing information for transmission. This can be accomplished via access control and encryption. Use of this requirement will be limited to situations where the data owner has a strict requirement for ensuring data integrity and confidentiality is maintained at every step of the data transfer and handling process. When transmitting data, operating systems need to support transmission protection mechanisms such as TLS, SSL VPNs, or IPsec.

Fix Text

Configure the “SSLSERVERID” statement to force auto logging of an SSL server before all other servers in the “AUTOLOG” list.

Check Content

Determine SSL/TLS capability. Examine the TCP/IP config file. If the “SSLSEVERID” statement identifies at least one “User Do for SDL” server, this is not a finding.

IBM z/VM TCP/IP config file INTERNALCLIENTPARMS statement must be properly configured.

Finding ID
IBMZ-VM-001060
Rule ID
IBMZ-VM-001060_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000297-GPOS-00115
CCI
CCI-002314
Target Key
(None)
Documentable
No
Discussion

Remote access services, such as those providing remote access to network devices and information systems, which lack automated control capabilities, increase risk and make remote user access management difficult at best. Remote access is access to DoD nonpublic information systems by an authorized user (or an information system) communicating through an external, non-organization-controlled network. Remote access methods include, for example, dial-up, broadband, and wireless. Operating system functionality (e.g., RDP) must be capable of taking enforcement action if the audit reveals unauthorized activity. Automated control of remote access sessions allows organizations to ensure ongoing compliance with remote access policies by enforcing connection rules of remote access applications on a variety of information system components (e.g., servers, workstations, notebook computers, smartphones, and tablets). The INTERNALCLIENTPARMS statement is used to configure the Telnet server, an internal client of the TCPIP virtual machine.

Fix Text

Configure the TCP/IP config “INTERNALCLIENTPARM” statement to include the following: PORTNUM <secure FTP PORT Number> SECURECONNECTION REQUIRED CLIENTCERTCHECK FULL

Check Content

Examine the TCP/IP config file “INTERNALCLIENTPARMS” statement. If the following “INTERNALCLIENTPARMS”sub statement are included, this is not a finding. PORT Num not 20 or 21 SECURECONNECTION REQUIRED CLIENTCERTCHECK FULL

IBM z/VM TCP/IP must be configured to use encryption.

Finding ID
IBMZ-VM-001050
Rule ID
IBMZ-VM-001050_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000424-GPOS-00188
CCI
CCI-002421
Target Key
(None)
Documentable
No
Discussion

The Secure Socket Layer (SSL) server, provides processing support for secure (encrypted) communication between remote clients and z/VM TCP/IP application servers that are configured for secure communications The TCP/IP (stack) server routes requests for secure connections to an SSL server, which interacts with a client on behalf of an application server to perform handshake operations and the exchange of cryptographic parameters for a secure session. The SSL server then manages the encryption and decryption of data for an established, secure session. Remote access is access to DoD nonpublic information systems by an authorized user (or an information system) communicating through an external, non-organization-controlled network. Remote access methods include, for example, dial-up, broadband, and wireless. Encryption provides a means to secure the remote connection to prevent unauthorized access to the data traversing the remote access connection (e.g., RDP), thereby providing a degree of confidentiality. The encryption strength of a mechanism is selected based on the security categorization of the information. Without confidentiality protection mechanisms, unauthorized individuals may gain access to sensitive information via a remote access session.

Fix Text

Configure the “SSLSERVERID” statement to force auto logging of an SSL server before all other servers in the “AUTOLOG” list.

Check Content

Examine the “SSLSERVERID” statement in the TCP/IP server configuration file. If the “SSLSERVERID” statement identifies at least one User ID for an SSL server, this is not a finding.

The IBM z/VM TCP/IP SECUREDATA option for FTP must be set to REQUIRED.

Finding ID
IBMZ-VM-001040
Rule ID
IBMZ-VM-001040_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000425-GPOS-00189
CCI
CCI-002420
Target Key
(None)
Documentable
No
Discussion

Information can be either unintentionally or maliciously disclosed or modified during preparation for transmission, for example, during aggregation, at protocol transformation points, and during packing/unpacking. These unauthorized disclosures or modifications compromise the confidentiality or integrity of the information. Ensuring the confidentiality of transmitted information requires the operating system to take measures in preparing information for transmission. This can be accomplished via access control and encryption. Use of this requirement will be limited to situations where the data owner has a strict requirement for ensuring data integrity and confidentiality is maintained at every step of the data transfer and handling process. When transmitting data, operating systems need to support transmission protection mechanisms such as TLS, SSL VPNs, or IPsec. The SECUREDATA statement specifies the FTP server-wide minimum security level for data connections.

Fix Text

Configure the “SECUREDATA” statement in the FTP server configuration file to specify “REQUIRED”.

Check Content

Examine the FTP Server configuration file. If there is no “SECUREDATA” statement, this is a finding. If the “SECUREDATA” statement specifies “REQUIRED”, this is not a finding.

The IBM z/VM TCP/IP must Include an SSLSERVERID statement in the TCP/IP server configuration file.

Finding ID
IBMZ-VM-001030
Rule ID
IBMZ-VM-001030_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000423-GPOS-00187
CCI
CCI-002418
Target Key
(None)
Documentable
No
Discussion

The Secure Socket Layer (SSL) server, provides processing support for secure (encrypted) communication between remote clients and z/VM TCP/IP application servers that are configured for secure communications The TCP/IP (stack) server routes requests for secure connections to an SSL server, which interacts with a client on behalf of an application server to perform handshake operations and the exchange of cryptographic parameters for a secure session. The SSL server then manages the encryption and decryption of data for an established, secure session. Remote access is access to DoD nonpublic information systems by an authorized user (or an information system) communicating through an external, non-organization-controlled network. Remote access methods include, for example, dial-up, broadband, and wireless. Encryption provides a means to secure the remote connection to prevent unauthorized access to the data traversing the remote access connection (e.g., RDP), thereby providing a degree of confidentiality. The encryption strength of a mechanism is selected based on the security categorization of the information. Without confidentiality protection mechanisms, unauthorized individuals may gain access to sensitive information via a remote access session.

Fix Text

Configure the “SSLSERVERID” statement to force auto logging of an SSL server before all other servers in the “AUTOLOG” list.

Check Content

Examine the “SSLSERVERID” statement in the TCP/IP server configuration file. If the statement identifies at least one User ID for an SSL server, this is not a finding.

The IBM z/VM JOURNALING statement must be properly configured.

Finding ID
IBMZ-VM-001020
Rule ID
IBMZ-VM-001020_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000329-GPOS-00128
CCI
CCI-002238
Target Key
(None)
Documentable
No
Discussion

By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-forcing, is reduced. Limits are imposed by locking the account.

Fix Text

Configure the system config “JOURNALING” statement to include the following: Logon, Account after 3 attempts, Lockout after 3 attempts for 0 Link, Account after 3 attempts, Disable after 3 attempts

Check Content

View system config “JOURNALING” statement. If the “JOURNALING” statement “LOGON” operand is configured as below, this is not a finding. Logon, Account after 3 attempts, Lockout after 3 attempts for 0 Link, Account after 3 attempts, Disable after 3 attempts

The IBM z/VM CP Privilege Class A, B, and D must be restricted to appropriate system operators.

Finding ID
IBMZ-VM-001010
Rule ID
IBMZ-VM-001010_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000324-GPOS-00125
CCI
CCI-002235
Target Key
(None)
Documentable
No
Discussion

Preventing non-privileged users from executing privileged functions mitigates the risk that unauthorized individuals or processes may gain unnecessary access to information or privileges. Privileged functions include, for example, establishing accounts, performing system integrity checks, or administering cryptographic key management activities. Non-privileged users are individuals that do not possess appropriate authorizations. Circumventing intrusion detection and prevention mechanisms or malicious code protection mechanisms are examples of privileged functions that require protection from non-privileged users.

Fix Text

Ensure that non-privilege users are not assigned CP Privilege Class A, B, or D.

Check Content

Examine user directory definitions to determine CP Privilege class. If CP Privilege Cass A, B, or D is assigned to non-privilege users, this is a finding.

The IBM z/VM CA VM:Secure product must be installed and operating.

Finding ID
IBMZ-VM-001000
Rule ID
IBMZ-VM-001000_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000327-GPOS-00127
CCI
CCI-002234
Target Key
(None)
Documentable
No
Discussion

Misuse of privileged functions, either intentionally or unintentionally by authorized users, or by unauthorized external entities that have compromised information system accounts, is a serious and ongoing concern and can have significant adverse impacts on organizations. Auditing the use of privileged functions is one way to detect such misuse and identify the risk from insider threats and the advanced persistent threat.

Fix Text

CA VM:Secure product audits all commands. Ensure that CA VM:Secure product is installed and operational.

Check Content

Verify that CA VM:Secure product is operational on the system by entering the following command: From CMS Command line enter “VMSECURE VERSION”. If there is no response “VMSECURE” is not logged in, this is a finding.

The IBM z/VM LOGONBY must be restricted to system administrators.

Finding ID
IBMZ-VM-000990
Rule ID
IBMZ-VM-000990_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000326-GPOS-00126
CCI
CCI-002233
Target Key
(None)
Documentable
No
Discussion

In certain situations, software applications/programs need to execute with elevated privileges to perform required functions. However, if the privileges required for execution are at a higher level than the privileges assigned to organizational users invoking such applications/programs, those users are indirectly provided with greater privileges than assigned by the organizations. The LOGONBY statement designates up to eight user IDs that can use their own passwords to log on to and use the virtual machine.

Fix Text

Assure that any “LOGONBY” statement only includes users who are system administrators.

Check Content

Examine each of the directory statements. If the “LOGONBY” statement specifies users that are not system administrators, this is a finding.

The IBM z/VM CA VM:Secure product MANAGE command must be restricted to system administrators.

Finding ID
IBMZ-VM-000980
Rule ID
IBMZ-VM-000980_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000312-GPOS-00124
CCI
CCI-002165
Target Key
(None)
Documentable
No
Discussion

Discretionary Access Control (DAC) is based on the notion that individual users are "owners" of objects and therefore have discretion over who should be authorized to access the object and in which mode (e.g., read or write). Ownership is usually acquired as a consequence of creating the object or via specified ownership assignment. DAC allows the owner to determine who will have access to objects they control. An example of DAC includes user-controlled file permissions. When discretionary access control policies are implemented, subjects are not constrained with regard to what actions they can take with information for which they have already been granted access. Thus, subjects that have been granted access to information are not prevented from passing (i.e., the subjects have the discretion to pass) the information to other subjects or objects. A subject that is constrained in its operation by Mandatory Access Control policies is still able to operate under the less rigorous constraints of this requirement. Thus, while Mandatory Access Control imposes constraints preventing a subject from passing information to another subject operating at a different sensitivity level, this requirement permits the subject to pass the information to any subject at the same sensitivity level. The policy is bounded by the information system boundary. Once the information is passed outside the control of the information system, additional means may be required to ensure the constraints remain in effect. While the older, more traditional definitions of discretionary access control require identity-based access control, that limitation is not required for this use of discretionary access control.

Fix Text

Include the “GRANT” statement for the “MANAGE” command to restrict to system administrators only.

Check Content

Examine “AUTHORIZ CONFIG” file. If the “MANAGE” command is only granted to systems Administrators, this is not a finding.

IBM z/VM CA VM:Secure product must be installed and operating.

Finding ID
IBMZ-VM-000970
Rule ID
IBMZ-VM-000970_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000303-GPOS-00120
CCI
CCI-002130
Target Key
(None)
Documentable
No
Discussion

Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of reestablishing access. One way to accomplish this is for the attacker to enable a new or disabled account. Auditing account modification actions provides logging that can be used for forensic purposes. To address access requirements, many operating systems can be integrated with enterprise-level authentication/access/auditing mechanisms that meet or exceed access control policy requirements.

Fix Text

CA VM:Secure product audits all commands. Ensure that CA VM:Secure product is installed and operational.

Check Content

From CMS Command line enter “VMSECURE VERSION”. If there is no response “VMSECURE” is not logged in, this is a finding.

The IBM z/VM Portmapper server virtual machine user ID must be included in the AUTOLOG statement of the TCP/IP server configuration file.

Finding ID
IBMZ-VM-000960
Rule ID
IBMZ-VM-000960_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000379-GPOS-00164
CCI
CCI-001967
Target Key
(None)
Documentable
No
Discussion

Without authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. Bidirectional authentication provides stronger safeguards to validate the identity of other devices for connections that are of greater risk. Bidirectional authentication solutions include, but are not limited to, IEEE 802.1x and Extensible Authentication Protocol [EAP], RADIUS server with EAP-Transport Layer Security [TLS] authentication, Kerberos, and SSL mutual authentication. A local connection is any connection with a device communicating without the use of a network. A network connection is any connection with a device that communicates through a network (e.g., local area network, wide area network, or the Internet). A remote connection is any connection with a device communicating through an external network (e.g., the Internet). Because of the challenges of applying this requirement on a large scale, organizations are encouraged to only apply this requirement to those limited number (and type) of devices that truly need to support this capability.

Fix Text

Include the Portmapper server virtual machine user ID in the “AUTOLOG” statement of the TCP/IP server configuration file. The Portmapper server is then automatically started when TCP/IP is initialized. The IBM default user ID for this server is PORTMAP, but review installation to assure proper ID is included.

Check Content

Examine the TCP/IP configuration for “AUTOLOG”. If the user ID for auto logger is not in the “AUTOLOG” statement of the TCP/IP server configuration file, this is a finding.

The IBM z/VM CA VM:Secure product audit records must be offloaded on a weekly basis.

Finding ID
IBMZ-VM-000950
Rule ID
IBMZ-VM-000950_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000479-GPOS-00224
CCI
CCI-001851
Target Key
(None)
Documentable
No
Discussion

Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common process in information systems with limited audit storage capacity.

Fix Text

Develop procedures that offload Audit minidisk on a weekly basis.

Check Content

Check audit offload procedure. If it can be determined that the audit records are being offloaded on a weekly basis, this is not a finding.

The IBM z/VM CA VM:Secure product audit records must offload audit records to a different system or media.

Finding ID
IBMZ-VM-000940
Rule ID
IBMZ-VM-000940_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000342-GPOS-00133
CCI
CCI-001851
Target Key
(None)
Documentable
No
Discussion

Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common process in information systems with limited audit storage capacity.

Fix Text

Develop a user written procedure to offload audit records to a different system or media.

Check Content

If there is no documented process for audit offload, this is a finding. Examine the documented user process for audit record offload. If the procedure does not offload to a different system or media, this is a finding.

The IBM z/VM journal minidisk space allocation must be large enough for one weeks worth of audit records.

Finding ID
IBMZ-VM-000930
Rule ID
IBMZ-VM-000930_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000341-GPOS-00132
CCI
CCI-001849
Target Key
(None)
Documentable
No
Discussion

In order to ensure operating systems have a sufficient storage capacity in which to write the audit logs, operating systems need to be able to allocate audit record storage capacity. The task of allocating audit record storage capacity is usually performed during initial installation of the operating system.

Fix Text

Monitor journal minidisks for required space allocation for one week's worth of data. The system administrator will determine the required space allocation. Assure space allocation is large enough for one week of audit records.

Check Content

Examine the “MDISK” statement for journaling. If the space allocations are not large enough for one weeks’ worth of audit records, this is a finding.

The IBM z/VM CA VM:Secure product must be installed and operating.

Finding ID
IBMZ-VM-000920
Rule ID
IBMZ-VM-000920_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000365-GPOS-00152
CCI
CCI-001814
Target Key
(None)
Documentable
No
Discussion

Without auditing the enforcement of access restrictions against changes to the application configuration, it will be difficult to identify attempted attacks and an audit trail will not be available for forensic investigation for after-the-fact actions. Enforcement actions are the methods or mechanisms used to prevent unauthorized changes to configuration settings. Enforcement action methods may be as simple as denying access to a file based on the application of file permissions (access restriction). Audit items may consist of lists of actions blocked by access restrictions or changes identified after the fact.

Fix Text

CA VM:Secure product audits all commands. Ensure that CA VM:Secure product is installed and operational.

Check Content

Verify that CA VM:Secure product is operational on the system by entering the following command: From CMS Command line enter “VMSECURE VERSION”. If there is no response “VMSECURE” is not logged in, this is a finding.

The IBM z/VM CA VM:Secure AUTHORIZ CONFIG file must be properly configured.

Finding ID
IBMZ-VM-000910
Rule ID
IBMZ-VM-000910_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000364-GPOS-00151
CCI
CCI-001813
Target Key
(None)
Documentable
No
Discussion

Failure to provide logical access restrictions associated with changes to system configuration may have significant effects on the overall security of the system. When dealing with access restrictions pertaining to change control, it should be noted that any changes to the hardware, software, and/or firmware components of the operating system can have significant effects on the overall security of the system. Accordingly, only qualified and authorized individuals should be allowed to obtain access to operating system components for the purposes of initiating changes, including upgrades and modifications. Logical access restrictions include, for example, controls that restrict access to workflow automation, media libraries, abstract layers (e.g., changes implemented into third-party interfaces rather than directly into information systems), and change windows (e.g., changes occur only during specified times, making unauthorized changes easy to discover).

Fix Text

Assure that the following authorizations are configured: Grant the CA VM:Secure system administrator authorization to use all commands and menu selections. Grant directory managers authorization to use a particular command, group of commands, or menu selection. By carefully planning these authorizations, you can delegate many of the daily directory and disk space management tasks to the directory managers. Plan these authorizations carefully to cover all aspects of your site’s VM installation. Grant general users authorization to use those commands and menu selections that enable them to manage their own virtual machine. Users can then perform tasks such as maintaining their own system password and controlling access to their minidisks by others. For example, for users in the Technical Support group, you may want to authorize them to use all selections on the “User Selection” Menu.

Check Content

Examine “AUTHORIZ CONFIG” file. If Authorizations are granted as follows, this is not a finding. Grant the CA VM:Secure system administrator authorization to use all commands and menu selections. Grant directory managers authorization to use a particular command, group of commands, or menu selection. By carefully planning these authorizations, you can delegate many of the daily directory and disk space management tasks to the directory managers. Plan these authorizations carefully to cover all aspects of your site’s VM installation. Grant general users authorization to use those commands and menu selections that enable them to manage their own virtual machine. Users can then perform tasks such as maintaining their own system password and controlling access to their minidisks by others.

The IBM z/VM Privilege command classes must be properly assigned.

Finding ID
IBMZ-VM-000900
Rule ID
IBMZ-VM-000900_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000362-GPOS-00149
CCI
CCI-001812
Target Key
(None)
Documentable
No
Discussion

Allowing regular users to install software, without explicit privileges, creates the risk that untested or potentially malicious software will be installed on the system. Explicit privileges (escalated or administrative privileges) provide the regular user with explicit capabilities and control that exceeds the rights of a regular user. Operating system functionality will vary, and while users are not permitted to install unapproved software, there may be instances where the organization allows the user to install approved software packages, such as from an approved software repository. The operating system or software configuration management utility must enforce control of software installation by users based upon what types of software installations are permitted (e.g., updates and security patches to existing software) and what types of installations are prohibited (e.g., software whose pedigree with regard to being potentially malicious is unknown or suspect) by the organization.

Fix Text

Configure the CA VM:Secure “AUTHORIZ” Config file to grant CP Privilege Class A or B to system administrators or system operators only.

Check Content

Examine the CA VM:Secure “AUTHORIZ” Config file: If Privilege CLASS A or B is granted to anyone other than systems administrators or systems operators, this is a finding. Note: Restrict link to disk where system software resides.

The IBM z/VM CA VM:Secure product NORULE record in the SECURITY CONFIG file must be configured to REJECT.

Finding ID
IBMZ-VM-000890
Rule ID
IBMZ-VM-000890_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000370-GPOS-00155
CCI
CCI-001774
Target Key
(None)
Documentable
No
Discussion

Utilizing a whitelist provides a configuration management method for allowing the execution of only authorized software. Using only authorized software decreases risk by limiting the number of potential vulnerabilities. The organization must identify authorized software programs and permit execution of authorized software. The process used to identify software programs that are authorized to execute on organizational information systems is commonly referred to as whitelisting. Verification of white-listed software occurs prior to execution or at system startup. This requirement applies to operating system programs, functions, and services designed to manage system processes and configurations (e.g., group policies).

Fix Text

Include a “NORULE” record in the “SECURITY CONFIG” file set to “REJECT”.

Check Content

Examine the “SECURITY CONFIG” file. If the nodule is configured as below, this is not a finding. NORULE REJECT

The IBM z/VM must restrict link access to the disk on which system software resides.

Finding ID
IBMZ-VM-000880
Rule ID
IBMZ-VM-000880_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000259-GPOS-00100
CCI
CCI-001499
Target Key
(None)
Documentable
No
Discussion

If the operating system were to allow any user to make changes to software libraries, then those changes might be implemented without undergoing the appropriate testing and approvals that are part of a robust change management process. This requirement applies to operating systems with software libraries that are accessible and configurable, as in the case of interpreted languages. Software libraries also include privileged programs which execute with escalated privileges. Only qualified and authorized individuals must be allowed to obtain access to information system components for purposes of initiating changes, including upgrades and modifications.

Fix Text

Create a CA VM:Secure rule that grants access for system software disks to system administrators only.

Check Content

Examine the CA VM:Secure rules. If there are Link rules for system software disks granted to anyone other than system administrators, this is a finding.

The IBM z/VM Journal mini disk must be restricted to system administrators.

Finding ID
IBMZ-VM-000870
Rule ID
IBMZ-VM-000870_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000258-GPOS-00099
CCI
CCI-001495
Target Key
(None)
Documentable
No
Discussion

Protecting audit information also includes identifying and protecting the tools used to view and manipulate log data. Therefore, protecting audit tools is necessary to prevent unauthorized operation on audit information. Operating systems providing tools to interface with audit information will leverage user permissions and roles identifying the user accessing the tools and the corresponding rights the user has in order to make access decisions regarding the deletion of audit tools. Audit tools include, but are not limited to, vendor-provided and open source audit tools needed to successfully view and manipulate audit information system activity and records. Audit tools include custom queries and report generators.

Fix Text

Create a CA VM:Secure rule that grants access to system administrators, security administrators, or system auditors only.

Check Content

Examine the CA VM:Secure rules. If there are Link rules for audit disk granted to anyone other than system administrators, security administrators, or system auditors, this is a finding.

IBM z/VM must remove or disable emergency accounts after the crisis is resolved or 72 hours.

Finding ID
IBMZ-VM-000860
Rule ID
IBMZ-VM-000860_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000123-GPOS-00064
CCI
CCI-001682
Target Key
(None)
Documentable
No
Discussion

Emergency accounts are privileged accounts that are established in response to crisis situations where the need for rapid account activation is required. Therefore, emergency account activation may bypass normal account authorization processes. If these accounts are automatically disabled, system maintenance during emergencies may not be possible, thus adversely affecting system availability. Emergency accounts are different from infrequently used accounts (i.e., local logon accounts used by the organization's system administrators when network or normal logon/access is not available). Infrequently used accounts are not subject to automatic termination dates. Emergency accounts are accounts created in response to crisis situations, usually for use by maintenance personnel. The automatic expiration or disabling time period may be extended as needed until the crisis is resolved; however, it must not be extended indefinitely. A permanent account should be established for privileged users who need long-term maintenance accounts. To address access requirements, many operating systems can be integrated with enterprise-level authentication/access mechanisms that meet or exceed access control policy requirements.

Fix Text

Develop a policy and process to remove or disable emergency accounts after a crisis has been resolved or 72 hours.

Check Content

Ask the system administrator (SA) for a documented process to remove or disable emergency accounts after a crisis has been resolved or 72 hours. If there is no documented process, this is a finding.

Mitigation Control

IBM z/VM must enforce password complexity by requiring that at least one special character be used.

Finding ID
IBMZ-VM-000850
Rule ID
IBMZ-VM-000850_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000266-GPOS-00101
CCI
CCI-001619
Target Key
(None)
Documentable
No
Discussion

Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity or strength is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. Password complexity is one factor in determining how long it takes to crack a password. The more complex the password, the greater the number of possible combinations that need to be tested before the password is compromised. Special characters are those characters that are not alphanumeric. Examples include: ~ ! @ # $ % ^ *.

Fix Text

Configure a VM:Secure Password exit that requires at least one special character be used in the new password. Ensure that the following macros are updated with proper Password user exit: FORCEPWC VMXCHGPW MAINT USE00080

Check Content

If there is no VM:Secure Password exit in use, this is a finding. Review the VM:Secure Password exit. If there is no code requiring that at least one special character be used in the new password, this is a finding.

The IBM z/VM AUDT Mini Disk must be restricted to the appropriate system administrators.

Finding ID
IBMZ-VM-000840
Rule ID
IBMZ-VM-000840_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000257-GPOS-00098
CCI
CCI-001494
Target Key
(None)
Documentable
No
Discussion

Protecting audit information also includes identifying and protecting the tools used to view and manipulate log data. Therefore, protecting audit tools is necessary to prevent unauthorized operation on audit information. Operating systems providing tools to interface with audit information will leverage user permissions and roles identifying the user accessing the tools and the corresponding rights the user has in order to make access decisions regarding the modification of audit tools. Audit tools include, but are not limited to, vendor-provided and open source audit tools needed to successfully view and manipulate audit information system activity and records. Audit tools include custom queries and report generators.

Fix Text

Create a CA VM:Secure rule that grants access to system administrators, security administrators, or system auditors only.

Check Content

Examine the CA VM:Secure rules. If there are Link rules for audit disk granted to anyone other than system administrators, security administrators, or system auditors, this is a finding.

The IBM z/VM CA VM:Secure product SECURITY CONFIG file must be restricted to appropriate personnel.

Finding ID
IBMZ-VM-000830
Rule ID
IBMZ-VM-000830_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000256-GPOS-00097
CCI
CCI-001493
Target Key
(None)
Documentable
No
Discussion

Protecting audit information also includes identifying and protecting the tools used to view and manipulate log data. Therefore, protecting audit tools is necessary to prevent unauthorized operation on audit information. Operating systems providing tools to interface with audit information will leverage user permissions and roles identifying the user accessing the tools and the corresponding rights the user enjoys in order to make access decisions regarding the access to audit tools. Audit tools include, but are not limited to, vendor-provided and open source audit tools needed to successfully view and manipulate audit information system activity and records. Audit tools include custom queries and report generators.

Fix Text

Create a CA VM:Secure product rule that grants access to system administrators, security administrators, or system auditors only.

Check Content

Examine the CA VM:Secure product rules. If there are Link rules for audit disk granted to anyone other than system administrators, security administrators, or system auditors, this is a finding.

The IBM z/VM CA VM:Secure product must be installed and operating.

Finding ID
IBMZ-VM-000820
Rule ID
IBMZ-VM-000820_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000255-GPOS-00096
CCI
CCI-001487
Target Key
(None)
Documentable
No
Discussion

Without information that establishes the identity of the subjects (i.e., users or processes acting on behalf of users) associated with the events, security personnel cannot determine responsibility for the potentially harmful event.

Fix Text

CA VM:Secure product audits all commands. Ensure that CA VM:Secure product is installed and operational. Using CA VM:Secure product audit of all commands with z/VM standard journal record assures that all pertinent information is stored.

Check Content

Verify that CA VM:Secure product is operational on the system by entering the following command: From CMS Command line enter “VMSECURE VERSION”. If there is no response “VMSECURE” is not logged in, this is a finding.

The IBM z/VM JOURNALING statement must be coded on the configuration file.

Finding ID
IBMZ-VM-000810
Rule ID
IBMZ-VM-000810_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000254-GPOS-00095
CCI
CCI-001464
Target Key
(None)
Documentable
No
Discussion

If auditing is enabled late in the start-up process, the actions of some start-up processes may not be audited. Some audit systems also maintain state information only available if auditing is enabled before a given process is created.

Fix Text

Configure the System Configuration “JOURNALING” statement to “JOURNALING ON”.

Check Content

Examine the Product Configuration file. If the “JOURNALING” Statement does not specify “ON”, this is a finding.

The IBM z/VM TCP/IP must Include an SSLSERVERID statement in the TCP/IP server configuration file.

Finding ID
IBMZ-VM-000800
Rule ID
IBMZ-VM-000800_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000250-GPOS-00093
CCI
CCI-001453
Target Key
(None)
Documentable
No
Discussion

The Secure Socket Layer (SSL) server, provides processing support for secure (encrypted) communication between remote clients and z/VM TCP/IP application servers that are configured for secure communications The TCP/IP (stack) server routes requests for secure connections to an SSL server, which interacts with a client on behalf of an application server to perform handshake operations and the exchange of cryptographic parameters for a secure session. The SSL server then manages the encryption and decryption of data for an established, secure session. Remote access is access to DoD nonpublic information systems by an authorized user (or an information system) communicating through an external, non-organization-controlled network. Remote access methods include, for example, dial-up, broadband, and wireless. Encryption provides a means to secure the remote connection to prevent unauthorized access to the data traversing the remote access connection (e.g., RDP), thereby providing a degree of confidentiality. The encryption strength of a mechanism is selected based on the security categorization of the information. Without confidentiality protection mechanisms, unauthorized individuals may gain access to sensitive information via a remote access session.

Fix Text

Configure the “SSLSERVERID” statement to force auto logging of an SSL server before all other servers in the “AUTOLOG” list.

Check Content

Examine the “SSLSERVERID” statement in the TCP/IP server configuration file. If the statement identifies at least one User ID for an SSL server, this is not a finding.

The IBM z/VM CA VM:Secure product must be installed and operating.

Finding ID
IBMZ-VM-000790
Rule ID
IBMZ-VM-000790_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000241-GPOS-00091
CCI
CCI-001405
Target Key
(None)
Documentable
No
Discussion

When operating system accounts are removed, user accessibility is affected. Accounts are utilized for identifying individual users or for identifying the operating system processes themselves. In order to detect and respond to events affecting user accessibility and system processing, operating systems must audit account removal actions and, as required, notify the appropriate individuals so they can investigate the event. Such a capability greatly reduces the risk that operating system accessibility will be negatively affected for extended periods of time and provides logging that can be used for forensic purposes. To address access requirements, many operating systems can be integrated with enterprise-level authentication/access/auditing mechanisms that meet or exceed access control policy requirements.

Fix Text

CA VM:Secure product audits all commands. Ensure that CA VM:Secure product is installed and operational.

Check Content

Verify that CA VM:Secure product is operational on the system by entering the following command: From the CMS Command line enter “VMSECURE VERSION”. If there is no response “VMSECURE” is not logged in, this is a finding.

The IBM z/VM CA VM:Secure product must be installed and operating.

Finding ID
IBMZ-VM-000780
Rule ID
IBMZ-VM-000780_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000240-GPOS-00090
CCI
CCI-001404
Target Key
(None)
Documentable
No
Discussion

When operating system accounts are disabled, user accessibility is affected. Accounts are utilized for identifying individual users or for identifying the operating system processes themselves. In order to detect and respond to events affecting user accessibility and system processing, operating systems must audit account disabling actions and, as required, notify the appropriate individuals so they can investigate the event. Such a capability greatly reduces the risk that operating system accessibility will be negatively affected for extended periods of time and provides logging that can be used for forensic purposes. To address access requirements, many operating systems can be integrated with enterprise-level authentication/access/auditing mechanisms that meet or exceed access control policy requirements.

Fix Text

CA VM:Secure product audits all commands. Ensure that CA VM:Secure product is installed and operational.

Check Content

Verify that CA VM:Secure product is operational on the system by entering the following command: From the CMS Command line enter “VMSECURE VERSION”. If there is no response “VMSECURE” is not logged in, this is a finding.

The IBM z/VM CA VM:Secure product must be installed and operating.

Finding ID
IBMZ-VM-000770
Rule ID
IBMZ-VM-000770_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000239-GPOS-00089
CCI
CCI-001403
Target Key
(None)
Documentable
No
Discussion

Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of reestablishing access. One way to accomplish this is for the attacker to modify an existing account. Auditing account modification actions provides logging that can be used for forensic purposes. To address access requirements, many operating systems can be integrated with enterprise-level authentication/access/auditing mechanisms that meet or exceed access control policy requirements.

Fix Text

CA VM:Secure product audits all commands. Ensure that CA VM:Secure product is installed and operational.

Check Content

Verify that CA VM:Secure product is operational on the system by entering the following command: From CMS Command line enter “VMSECURE VERSION”. If there is no response “VMSECURE” is not logged in, this is a finding.

The IBM z/VM TCP/IP must be configured to display the mandatory DoD Notice and Consent banner before granting access to the system.

Finding ID
IBMZ-VM-000760
Rule ID
IBMZ-VM-000760_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000228-GPOS-00088
CCI
CCI-001388
Target Key
(None)
Documentable
No
Discussion

Display of a standardized and approved use notification before granting access to the publicly accessible operating system ensures privacy and security notification verbiage used is consistent with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance. System use notifications are required only for access via logon interfaces with human users and are not required when such human interfaces do not exist. The banner must be formatted in accordance with applicable DoD policy. Use the following verbiage for operating systems that can accommodate banners of 1300 characters: "You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions: -The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. -At any time, the USG may inspect and seize data stored on this IS. -Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose. -This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy. -Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details." Use the following verbiage for operating systems that have severe limitations on the number of characters that can be displayed in the banner: "I've read & consent to terms in IS user agreem't."

Fix Text

Configure the TELNET Connection exit to display a Notice and Consent banner message before access is granted to TELNET.

Check Content

Check the TELNET Connection Exit. If there is no TELNET connection exit, this is a finding. If the TELNET Connection exit does not send a Notice and Consent message before access is granted, this is a finding.

z/VM tapes must use Tape Encryption.

Finding ID
IBMZ-VM-000750
Rule ID
IBMZ-VM-000750_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000185-GPOS-00079
CCI
CCI-001199
Target Key
(None)
Documentable
No
Discussion

Information at rest refers to the state of information when it is located on a secondary storage device (e.g., disk drive and tape drive, when used for backups) within an operating system. Guest operating systems, such as CMS, that are not capable of enabling the hardware encryption available with the 3592 Model E05 tape drive are able to use z/VM facilities that enable the encryption on behalf of the guest. Guest operating systems that do support tape encryption, such as z/OS with proper service, will be able to do so without interference from z/VM.

Fix Text

Consult CP Administration manual for procedures to set up Device Encryption.

Check Content

Verify Tape Encryption is in use. Issue the following command: Class B: QUERY TAPES DETAIL or Class G: QUERY VIRTUAL TAPES If resulting text includes “ACTIVE KEY LABELS”, this is not a finding.

The IBM z/VM TCP/IP PENDINGCONNECTIONLIMIT statement must be properly configured.

Finding ID
IBMZ-VM-000740
Rule ID
IBMZ-VM-000740_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000142-GPOS-00071
CCI
CCI-001095
Target Key
(None)
Documentable
No
Discussion

DoS is a condition when a resource is not available for legitimate users. When this occurs, the organization either cannot accomplish its mission or must operate at degraded capacity. Managing excess capacity ensures that sufficient capacity is available to counter flooding attacks. Employing increased capacity and service redundancy may reduce the susceptibility to some DoS attacks. Managing excess capacity may include, for example, establishing selected usage priorities, quotas, or partitioning. The PENDINGCONNECTIONLIMIT statement defines the maximum number of half-open connections that are allowed at any given time. When a new half-open connection causes this limit to be exceeded, a random current half-open connection is dropped and a SynFlood denial-of-service attack is declared.

Fix Text

Configure the “PENDINGCONNECTIONLIMIT” statement with a value that is less than the “TCBPOOLSIZE”.

Check Content

Examine the “TCP/IP” Configuration file. If there is no “PENDINGCONNECTIONLIMIT” statement, this is a finding.

The IBM z/VM TCP/IP PERSISTCONNECTIONLIMIT statement must be properly configured.

Finding ID
IBMZ-VM-000730
Rule ID
IBMZ-VM-000730_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000142-GPOS-00071
CCI
CCI-001095
Target Key
(None)
Documentable
No
Discussion

DoS is a condition when a resource is not available for legitimate users. When this occurs, the organization either cannot accomplish its mission or must operate at degraded capacity. Managing excess capacity ensures that sufficient capacity is available to counter flooding attacks. Employing increased capacity and service redundancy may reduce the susceptibility to some DoS attacks. Managing excess capacity may include, for example, establishing selected usage priorities, quotas, or partitioning. The PERSISTCONNECTIONLIMIT statement defines the maximum number of connections in TCP persist state at any given time. When a new connection in persist state causes this limit to be exceeded, the oldest current connection in persist state is dropped and a ZeroWin denial-of-service attack is declared.

Fix Text

Configure the “PERSISTCONNECTIONLIMIT” statement with a value that is less than the “TCBPOOLSIZE”.

Check Content

Examine the “TCP/IP” Configuration file. If there is no “PERSISTCONNECTIONLIMIT” statement, this is a finding.

The IBM z/VM TCP/IP FOREIGNIPCONLIMIT statement must be properly configured.

Finding ID
IBMZ-VM-000720
Rule ID
IBMZ-VM-000720_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000142-GPOS-00071
CCI
CCI-001095
Target Key
(None)
Documentable
No
Discussion

DoS is a condition when a resource is not available for legitimate users. When this occurs, the organization either cannot accomplish its mission or must operate at degraded capacity. Managing excess capacity ensures that sufficient capacity is available to counter flooding attacks. Employing increased capacity and service redundancy may reduce the susceptibility to some DoS attacks. Managing excess capacity may include, for example, establishing selected usage priorities, quotas, or partitioning. Use the FOREIGNIPCONLIMIT statement to define the maximum number of connections that a foreign IP address is allowed to have open at the same time. If this value would be exceeded, an SSTRESS denial-of-service attack is declared.

Fix Text

Configure the “FOREIGNIPCONLIMIT” statement with a value specifying the maximum number of connections that a foreign IP address is allowed to have open at the same time. The System administrator should determine the proper value.

Check Content

Examine “TCP/IP” configuration file. If there is no “FOREIGNIPCONLIMIT” statement, this is a finding. If the “FOREIGNIPCONLIMIT” has a value of “0”, this is a finding.

The IBM z/VM System Config File must be configured to clear TDISK on IPL.

Finding ID
IBMZ-VM-000710
Rule ID
IBMZ-VM-000710_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000138-GPOS-00069
CCI
CCI-001090
Target Key
(None)
Documentable
No
Discussion

Preventing unauthorized information transfers mitigates the risk of information, including encrypted representations of information, produced by the actions of prior users/roles (or the actions of processes acting on behalf of prior users/roles) from being available to any current users/roles (or current processes) that obtain access to shared system resources (e.g., registers, main memory, hard disks) after those resources have been released back to information systems. The control of information in shared resources is also commonly referred to as object reuse and residual information protection. This requirement generally applies to the design of an information technology product, but it can also apply to the configuration of particular information system components that are, or use, such products. This can be verified by acceptance/validation processes in DoD or other government agencies. There may be shared resources with configurable protections (e.g., files in storage) that may be assessed on specific information system components.

Fix Text

Ensure that the following statement is in the SYSTEM CONFIG file: FEATURES ENABLE CLEAR_TDISK Further, before a minidisk is assigned to a user, the minidisk must be formatted to clear it of any residual data. CMS FORMAT, ICKDSF, or any other low-level formatting program that erases all of the data on the minidisk may be used.

Check Content

Examine the System Config File. If the “Feature” statement specifies ENABLE CLEAR_TDISK, this is not a finding.

The IBM z/VM must define a security Privilege Class for Security Administrators only.

Finding ID
IBMZ-VM-000700
Rule ID
IBMZ-VM-000700_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000134-GPOS-00068
CCI
CCI-001084
Target Key
(None)
Documentable
No
Discussion

An isolation boundary provides access control and protects the integrity of the hardware, software, and firmware that perform security functions. Security functions are the hardware, software, and/or firmware of the information system responsible for enforcing the system security policy and supporting the isolation of code and data on which the protection is based. Operating systems implement code separation (i.e., separation of security functions from non-security functions) in a number of ways, including through the provision of security kernels via processor rings or processor modes. For non-kernel code, security function isolation is often achieved through file system protections that serve to protect the code on disk and address space protections that protect executing code. Developers and implementers can increase the assurance in security functions by employing well-defined security policy models; structured, disciplined, and rigorous hardware and software development techniques; and sound system/security engineering principles. Implementation may include isolation of memory space and libraries. Operating systems restrict access to security functions through the use of access control mechanisms and by implementing least privilege capabilities.

Fix Text

Define a Privilege Class in the System “CONFIG” File that is dedicated to security administrators only.

Check Content

Examine identified security administrator profiles. If the user IDs have Privilege Classes A - E assigned to the users, this is a finding.

The IBM z/VM CA VM:Secure product ADMIN GLOBALS command must be restricted to systems programming personnel.

Finding ID
IBMZ-VM-000690
Rule ID
IBMZ-VM-000690_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000132-GPOS-00067
CCI
CCI-001082
Target Key
(None)
Documentable
No
Discussion

Operating system management functionality includes functions necessary for administration and requires privileged user access. Allowing non-privileged users to access operating system management functionality capabilities increases the risk that non-privileged users may obtain elevated privileges. Operating system management functionality includes functions necessary to administer console, network components, workstations, or servers and typically requires privileged user access. The separation of user functionality from information system management functionality is either physical or logical and is accomplished by using different computers, different central processing units, different instances of the operating system, different network addresses, different TCP/UDP ports, virtualization techniques, combinations of these methods, or other methods, as appropriate. An example of this type of separation is observed in web administrative interfaces that use separate authentication methods for users of any other information system resources. This may include isolating the administrative interface on a different security domain and with additional access controls.

Fix Text

Configure grant statements in the “AUTHORIZ” file using the “ADMIN GLOBALS” command that list Sys Admins only.

Check Content

Examine the “AUTHORIZ” Config file. If authorization to “ADMIN GLOBALS” is granted to “SYS Admin”, this is not a finding.

The IBM z/VM TCP/IP ANONYMOU statement must not be coded in FTP configuration.

Finding ID
IBMZ-VM-000680
Rule ID
IBMZ-VM-000680_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000121-GPOS-00062
CCI
CCI-000804
Target Key
(None)
Documentable
No
Discussion

Operating systems utilizing encryption are required to use FIPS-compliant mechanisms for authenticating to cryptographic modules.

Fix Text

Ensure the :ANONYMOUS or :ANONYMOU statement is not coded in the “DTCPARMS” or “FTPDERV” command.

Check Content

If there is no FTP Server active, this is not applicable. Examine the “DTCPARM” file for each active FTP server. If there is: Anonymous or: Anonymous statement, this is a finding. Examine the “FTPSERV” Command if “ANONYMOU” is coded, this is a finding.

The IBM z/VM CA VM:Secure product NORULE record in the SECURITY CONFIG file must be configured to REJECT.

Finding ID
IBMZ-VM-000670
Rule ID
IBMZ-VM-000670_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000121-GPOS-00062
CCI
CCI-000804
Target Key
(None)
Documentable
No
Discussion

Lack of authentication and identification enables non-organizational users to gain access to the application or possibly other information systems and provides an opportunity for intruders to compromise resources within the application or information system. Non-organizational users include all information system users other than organizational users, which include organizational employees or individuals the organization deems to have equivalent status of an employee (e.g., contractors and guest researchers). Non-organizational users must be uniquely identified and authenticated for all accesses other than those accesses explicitly identified and documented by the organization when related to the use of anonymous access.

Fix Text

Include a “NORULE” Record in the “SECURITY CONFIG” file set to “REJECT”.

Check Content

Examine the “SECURITY CONFIG” file. If the nodule is configured as below, this is not a finding. NORULE REJECT

The IBM z/VM TCP/IP VMSSL command operands must be configured properly.

Finding ID
IBMZ-VM-000660
Rule ID
IBMZ-VM-000660_rule
Severity
Cat I
CCE
(None)
Group Title
SRG-OS-000120-GPOS-00061
CCI
CCI-000803
Target Key
(None)
Documentable
No
Discussion

VMSSL services are initiated using the VMSSL command defined in the DTCPARMS file. Unapproved mechanisms that are used for authentication to the cryptographic module are not verified and therefore cannot be relied upon to provide confidentiality or integrity, and DoD data may be compromised.

Fix Text

Configure the “VMSSL” command to MODE FIPS-140-2, either by including the FIPS operand or by setting the MODE operand to FIPS-140-2. Include MODE operand for NIST-800-131a. Include the PROTOcol operands for TLSV_2 and SSLV2. The “EXEMPT cipher_suite” operand is set to a FIPS 140-2 compliant. The EXEMPT strength_set is set to “MEDIUM”.

Check Content

Examine the “DTCPARMS” File for each SSL server pool. If the “VMSSL” command is configured as follows, this is not a finding. FIPS (Operand FIPS is equivalent to setting MODE FIPS-140-2.) MODE FIPS-140-2 (Operand MODE FIPS-140-2 is equivalent to setting operand FIPS.) MODE NIST-800-131a PROTOcol TLSV_2 SSLV2 The EXEMPT cipher_suite operand is set to a FIPS 140-2 compliant value. The EXEMPT strength_set operand is set to “MEDIUM”.

The IBM z/VM Security Manager must provide a procedure to disable userids after 35 days of inactivity.

Finding ID
IBMZ-VM-000650
Rule ID
IBMZ-VM-000650_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000118-GPOS-00060
CCI
CCI-000795
Target Key
(None)
Documentable
No
Discussion

Inactive identifiers pose a risk to systems and applications because attackers may exploit an inactive identifier and potentially obtain undetected access to the system. Owners of inactive accounts will not notice if unauthorized access to their user account has been obtained. Operating systems need to track periods of inactivity and disable application identifiers after 35 days of inactivity.

Fix Text

Develop a procedure that includes the following steps: - Monitors the time since last logon. - Checks all userids for inactivity more than 35 days. - If found, the ISSO must suspend an account, but not delete it until it is verified by the local ISSO that the user no longer requires access. - If verification is not received within 60 days, the account may be deleted.

Check Content

Examine the procedure for disabling user accounts. If the procedure performs the following steps, this is not a finding. - Monitors the time since last logon. - Checks all userids for inactivity more than 35 days. - If found, the ISSO must suspend an account, but not delete it until it is verified by the local ISSO that the user no longer requires access. - If verification is not received within 60 days, the account may be deleted.

The IBM z/VM CA VM:Secure product NORULE record in the SECURITY CONFIG file must be configured to REJECT.

Finding ID
IBMZ-VM-000640
Rule ID
IBMZ-VM-000640_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000104-GPOS-00051
CCI
CCI-000764
Target Key
(None)
Documentable
No
Discussion

To assure accountability and prevent unauthenticated access, organizational users must be identified and authenticated to prevent potential misuse and compromise of the system. Organizational users include organizational employees or individuals the organization deems to have equivalent status of employees (e.g., contractors). Organizational users (and processes acting on behalf of users) must be uniquely identified and authenticated to all accesses, except for the following: 1) Accesses explicitly identified and documented by the organization. Organizations document specific user actions that can be performed on the information system without identification or authentication; and 2) Accesses that occur through authorized use of group authenticators without individual authentication. Organizations may require unique identification of individuals in group accounts (e.g., shared privilege accounts) or for detailed accountability of individual activity.

Fix Text

Include a “NORULE” Record in the “SECURITY CONFIG” file set to “REJECT”.

Check Content

Examine the “SECURITY CONFIG” file. If the nodule is configured as below, this is not a finding. NORULE REJECT

All IBM z/VM TCP/IP Ports must be restricted to ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments.

Finding ID
IBMZ-VM-000630
Rule ID
IBMZ-VM-000630_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000096-GPOS-00050
CCI
CCI-000382
Target Key
(None)
Documentable
No
Discussion

In order to prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e., embedding of data types within data types), organizations must disable or restrict unused or unnecessary physical and logical ports/protocols on information systems. Operating systems are capable of providing a wide variety of functions and services. Some of the functions and services provided by default may not be necessary to support essential organizational operations. Additionally, it is sometimes convenient to provide multiple services from a single component (e.g., VPN and IPS); however, doing so increases risk over limiting the services provided by any one component. To support the requirements and principles of least functionality, the operating system must support the organizational requirements, providing only essential capabilities and limiting the use of ports, protocols, and/or services to only those required, authorized, and approved to conduct official business or to address authorized quality of life issues.

Fix Text

Configure the application server definition in TCP/IP Configuration file to disable any ports or protocols that are prohibited by the PPSM CAL and vulnerability assessments.

Check Content

For each TCP/IP server defined examine the TCP/IP Configuration Port Statements. Consult DISA Ports, Protocols, and Services Management (PPSM) Category Assurance Levels (CAL). Verify that the ports and protocols being used are not prohibited and are necessary for the operation of the application server and the hosted applications. If any of the ports or protocols is prohibited or not necessary for the application server operation, this is a finding.

The IBM z/VM CA VM:Secure product NORULE record in the SECURITY CONFIG file must be configured to REJECT.

Finding ID
IBMZ-VM-000620
Rule ID
IBMZ-VM-000620_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000480-GPOS-00229
CCI
CCI-000366
Target Key
(None)
Documentable
No
Discussion

Failure to restrict system access to authenticated users negatively impacts operating system security.

Fix Text

Include a “NORULE” Record in the “SECURITY CONFIG” file set to “REJECT”.

Check Content

Examine the “SECURITY CONFIG” file. If the Nodule is configured as below, this is not a finding. NORULE REJECT

The IBM z/VM CA VM:Secure product NORULE record in the SECURITY CONFIG file must be configured to REJECT.

Finding ID
IBMZ-VM-000610
Rule ID
IBMZ-VM-000610_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000480-GPOS-00228
CCI
CCI-000366
Target Key
(None)
Documentable
No
Discussion

Setting the most restrictive default permissions ensures that when new accounts are created they do not have unnecessary access.

Fix Text

Configure the “SECURITY CONFIG” file to include a “NORULE” record with “REJECT”.

Check Content

Examine the “SECURITY CONFIG” file. If the “NORULE” record is configured with “REJECT”, this is not a finding.

The IBM z/VM CA VM:Secure product NORULE record in the SECURITY CONFIG file must be configured to REJECT.

Finding ID
IBMZ-VM-000600
Rule ID
IBMZ-VM-000600_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000080-GPOS-00048
CCI
CCI-000213
Target Key
(None)
Documentable
No
Discussion

To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DoD-approved PKIs, all DoD systems (e.g., web servers and web portals) must be properly configured to incorporate access control methods that do not rely solely on the possession of a certificate for access. Successful authentication must not automatically give an entity access to an asset or security boundary. Authorization procedures and controls must be implemented to ensure each authenticated entity also has a validated and current authorization. Authorization is the process of determining whether an entity, once authenticated, is permitted to access a specific asset. Information systems use access control policies and enforcement mechanisms to implement this requirement. Access control policies include: identity-based policies, role-based policies, and attribute-based policies. Access enforcement mechanisms include: access control lists, access control matrices, and cryptography. These policies and mechanisms must be employed by the application to control access between users (or processes acting on behalf of users) and objects (e.g., devices, files, records, processes, programs, and domains) in the information system.

Fix Text

Configure the “SECURITY CONFIG” file to include a “NORULE” record with “REJECT”.

Check Content

Examine the “SECURITY” CONFIG file. If the “NORULE” record is configured with “REJECT”, this is not a finding.

The IBM z/VM CA VM:Secure product Config Delay LOG option must be set to 0.

Finding ID
IBMZ-VM-000590
Rule ID
IBMZ-VM-000590_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000480-GPOS-00226
CCI
CCI-000366
Target Key
(None)
Documentable
No
Discussion

IBM z/VM 6.4.0 made changes to obscure whether a logon is invalid due to the user ID or due to the password. Both the logon prompting sequence and the message HCPLGA050E were changed. However, DELAYLOG causes a delay for a logon with an invalid password that it does not cause when the user ID is invalid. Thus, if you are using DELAYLOG with z/VM 6.4.0, you can inadvertently let someone trying to break into your system know that it is the password that is invalid.

Fix Text

Configure DELAYLOG = 0 or delete the DELAYLOG configuration file record.

Check Content

Display the Product Config file. If the DELAYLOG record does not exist, this is not a finding. If the DELAYLOG record is set to "0", this is not a finding.

The IBM z/VM CA VM:Secure product Rules Facility must be installed and operating.

Finding ID
IBMZ-VM-000580
Rule ID
IBMZ-VM-000580_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000080-GPOS-00048
CCI
CCI-000213
Target Key
(None)
Documentable
No
Discussion

To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DoD-approved PKIs, all DoD systems (e.g., web servers and web portals) must be properly configured to incorporate access control methods that do not rely solely on the possession of a certificate for access. Successful authentication must not automatically give an entity access to an asset or security boundary. Authorization procedures and controls must be implemented to ensure each authenticated entity also has a validated and current authorization. Authorization is the process of determining whether an entity, once authenticated, is permitted to access a specific asset. Information systems use access control policies and enforcement mechanisms to implement this requirement. Access control policies include: identity-based policies, role-based policies, and attribute-based policies. Access enforcement mechanisms include: access control lists, access control matrices, and cryptography. These policies and mechanisms must be employed by the application to control access between users (or processes acting on behalf of users) and objects (e.g., devices, files, records, processes, programs, and domains) in the information system.

Fix Text

Ensure the Rules Facility is installed and the “CONFIG PRODUCT” file contains an “ACCESS RULES” statement.

Check Content

Issue Command: CONFIG PRODUCT If there is no “ACCESS RULE” record, this is a finding. Issue command: VMSECURE RULES USER If no rules appear, this is a finding.

The IBM z/VM CA VM:Secure product User Exit must not allow 2 consecutive repeated characters.

Finding ID
IBMZ-VM-000570
Rule ID
IBMZ-VM-000570_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000480-GPOS-00227
CCI
CCI-000366
Target Key
(None)
Documentable
No
Discussion

Password complexity, or strength, is a measure of the effectiveness of a password in resisting guessing and brute-force attacks. Password complexity is one factor of several that determine how long it takes to crack a password. The more complex the password is, the greater the number of possible combinations that need to be tested before the password is compromised. Use of a complex password helps to increase the time and resources required to compromise the password. Consecutive repeated characters reduce the complexity of the password.

Fix Text

Configure a VM:Secure PASSWORD user exit that prohibits the use of consecutive repeated characters in the Password. Ensure that the following macros are updated with proper PASSWORD user exit: FORCEPWC VMXCHGPW MAINT USE00080

Check Content

If there is no VM:Secure PASSWORD user exit in use, this is a finding. Review the VM:Secure PASSWORD user exit. If there is no code that prohibits the use of consecutive repeated characters, this is a finding.

IBM z/VM must be configured to disable non-essential capabilities.

Finding ID
IBMZ-VM-000560
Rule ID
IBMZ-VM-000560_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000095-GPOS-00049
CCI
CCI-000381
Target Key
(None)
Documentable
No
Discussion

It is detrimental for operating systems to provide, or install by default, functionality exceeding requirements or mission objectives. These unnecessary capabilities or services are often overlooked and therefore may remain unsecured. They increase the risk to the platform by providing additional attack vectors. Operating systems are capable of providing a wide variety of functions and services. Some of the functions and services, provided by default, may not be necessary to support essential organizational operations (e.g., key missions, functions). Examples of non-essential capabilities include, but are not limited to, games, software packages, tools, and demonstration software, not related to requirements or providing a wide array of functionality not required for every mission, but which cannot be disabled.

Fix Text

Develop a policy for a procedure to review and disable non-essential capabilities for z/VM.

Check Content

Determine if the System administrator has a documented manual process to review and disable non-essential capabilities for z/VM. If there is no policy and process to review and disable non-essential capabilities, this is a finding.

Mitigation Control

This has to be a manual process supported by policy. The SA must determine non-essential components.

The IBM z/VM CA VM:Secure product User Exit must not allow passwords that are all numbers.

Finding ID
IBMZ-VM-000550
Rule ID
IBMZ-VM-000550_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000480-GPOS-00227
CCI
CCI-000366
Target Key
(None)
Documentable
No
Discussion

Password complexity, or strength, is a measure of the effectiveness of a password in resisting guessing and brute-force attacks. Password complexity is one factor of several that determine how long it takes to crack a password. The more complex the password is, the greater the number of possible combinations that need to be tested before the password is compromised. Use of a complex password helps to increase the time and resources required to compromise the password. Passwords that are all numbers reduce the complexity of the password.

Fix Text

Configure a VM:Secure Password user exit that prohibits the use of all numbers in the new Password. Ensure that the following macros are updated with proper PASSWORD user exit: FORCEPWC VMXCHGPW MAINT USE00080

Check Content

If there is no VM:Secure PASSWORD user exit in use, this is a finding. Review the VM:Secure PASSWORD user exit. If there is no code that prohibits the use of all numbers in the new password, this is a finding.

The IBM z/VM CA VM:Secure product User Exit must not allow passwords that match the user name.

Finding ID
IBMZ-VM-000540
Rule ID
IBMZ-VM-000540_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000480-GPOS-00227
CCI
CCI-000366
Target Key
(None)
Documentable
No
Discussion

Password complexity, or strength, is a measure of the effectiveness of a password in resisting guessing and brute-force attacks. Password complexity is one factor of several that determine how long it takes to crack a password. The more complex the password is, the greater the number of possible combinations that need to be tested before the password is compromised. Use of a complex password helps to increase the time and resources required to compromise the password. Passwords that match the user name reduce the complexity of the password.

Fix Text

Configure a VM:Secure PASSWORD user exit that prohibits the user of the user name in the new Password. Ensure that the following macros are updated with proper PASSWORD user exit: FORCEPWC VMXCHGPW MAINT USE00080

Check Content

If there is no VM:Secure PASSWORD user exit in use, this is a finding. Review the VM:Secure PASSWORD user exit. If there is no code that prohibits the use of user name in the new password, this is a finding.

The IBM z/VM CA VM:Secure product User Exit must not allow passwords that match the userid.

Finding ID
IBMZ-VM-000530
Rule ID
IBMZ-VM-000530_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000480-GPOS-00227
CCI
CCI-000366
Target Key
(None)
Documentable
No
Discussion

Password complexity, or strength, is a measure of the effectiveness of a password in resisting guessing and brute-force attacks. Password complexity is one factor of several that determine how long it takes to crack a password. The more complex the password is, the greater the number of possible combinations that need to be tested before the password is compromised. Use of a complex password helps to increase the time and resources required to compromise the password. Passwords that match the userid reduce the complexity of the password.

Fix Text

Configure a VM:Secure PASSWORD user exit that prohibits the use of userid in the new password. Ensure that the following macros are updated with proper PASSWORD user exit: FORCEPWC VMXCHGPW MAINT USE00080

Check Content

If there is no VM:Secure Password exit in use this is a finding. Review the VM:Secure PASSWORD user exit. If there is no code that prohibits the use of userid in the new password, this is a finding.

The IBM z/VM CA VM:Secure password User Exit must enforce a minimum 8-character password length.

Finding ID
IBMZ-VM-000520
Rule ID
IBMZ-VM-000520_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000078-GPOS-00046
CCI
CCI-000205
Target Key
(None)
Documentable
No
Discussion

The shorter the password, the lower the number of possible combinations that need to be tested before the password is compromised. Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. Password length is one factor of several that helps to determine strength and how long it takes to crack a password. Use of more characters in a password helps to exponentially increase the time and/or resources required to compromise the password.

Fix Text

Configure a VM:Secure Password exit that enforces a minimum 8-character password length. Ensure that the following macros are updated with proper PASSWORD user exit: FORCEPWC VMXCHGPW MAINT USE00080

Check Content

If there is no VM:Secure Password exit in use, this is a finding. Review the VM:Secure Password exit. If there is no code that enforces a minimum 8-character password, this is a finding.

The IBM z/VM CA VM:Secure product Password user exit must be coded with the PWLIST option properly set.

Finding ID
IBMZ-VM-000510
Rule ID
IBMZ-VM-000510_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000077-GPOS-00045
CCI
CCI-000200
Target Key
(None)
Documentable
No
Discussion

Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. If the information system or application allows the user to consecutively reuse their password when that password has exceeded its defined lifetime, the end result is a password that is not changed as per policy requirements.

Fix Text

Engineer code in the CA VM:Secure Product Password exit that uses a “PWLIST” that prohibits password reuse for five generations.

Check Content

If there is no CA VM:Secure Product Password exit in use, this is a finding. Examine the CA VM:Secure product Password user exit user exit for requirement that uses a “PWLIST” option that prohibits password reuse for five generations. If this code is missing, this is a finding.

The IBM z/VM CA VM:Secure product AUTOEXP record in the Security Config File must be properly set.

Finding ID
IBMZ-VM-000500
Rule ID
IBMZ-VM-000500_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000076-GPOS-00044
CCI
CCI-000199
Target Key
(None)
Documentable
No
Discussion

Any password, no matter how complex, can eventually be cracked. Therefore, passwords need to be changed periodically. If the operating system does not limit the lifetime of passwords and force users to change their passwords, there is the risk that the operating system passwords could be compromised.

Fix Text

Include an “AUTOEXP” record in the “SECURITY CONFIG” file that is configured as follows: AUTOEXP 10 60

Check Content

Examine the “SECURITY” CONFIG file. If there is no “AUTOEXP” record, this is a finding. If the “AUTOEXP” record is configured as below, this is not finding. AUTOEXP 10 60

The IBM z/VM CA VM:Secure product must implement the Password Encryption Facility (PEF).

Finding ID
IBMZ-VM-000490
Rule ID
IBMZ-VM-000490_rule
Severity
Cat I
CCE
(None)
Group Title
SRG-OS-000074-GPOS-00042
CCI
CCI-000197
Target Key
(None)
Documentable
No
Discussion

Passwords need to be protected at all times, and encryption is the standard method for protecting passwords. If passwords are not encrypted, they can be plainly read (i.e., clear text) and easily compromised.

Fix Text

Configure the “VMXRPI” Config file to include the following statement: ENCRYPT DES3

Check Content

Examine the “VMXRPI” Config file. If the following records are defined as below, this is not a finding. ENCRYPT DES3 record

The IBM z/VM CA VM:Secure product Password Encryption (PEF) option must be properly configured.

Finding ID
IBMZ-VM-000480
Rule ID
IBMZ-VM-000480_rule
Severity
Cat I
CCE
(None)
Group Title
SRG-OS-000073-GPOS-00041
CCI
CCI-000196
Target Key
(None)
Documentable
No
Discussion

Passwords need to be protected at all times, and encryption is the standard method for protecting passwords. If passwords are not encrypted, they can be plainly read (i.e., clear text) and easily compromised.

Fix Text

Configure the “VMXRPI” Config file to include the following statement: ENCRYPT DES3

Check Content

Examine the “VMXRPI” Config file used for building the current nucleus. If the “ENCRYP” statement is missing, this is a finding. If the “ENCRYPT” statement does not specify “DES3”, this is a finding.

The IBM z/VM TCP/IP Key database for LDAP or SSL server must be created with the proper permissions.

Finding ID
IBMZ-VM-000470
Rule ID
IBMZ-VM-000470_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000067-GPOS-00035
CCI
CCI-000186
Target Key
(None)
Documentable
No
Discussion

If the private key is discovered, an attacker can use the key to authenticate as an authorized user and gain access to the network infrastructure. The cornerstone of the PKI is the private key used to encrypt or digitally sign information. If the private key is stolen, this will lead to the compromise of the authentication and non-repudiation gained through PKI because the attacker can use the private key to digitally sign documents and pretend to be the authorized user. Both the holders of a digital certificate and the issuing authority must protect the computers, storage devices, or whatever they use to keep the private keys.

Fix Text

Ensure proper permissions are assigned to Key databases. Issue the “OPENVM PERMIT” commands to assign proper permissions.

Check Content

Issue command openvm list /etc/gskadm/ (own) If the file permissions are as displayed below, this is not a finding. User ID Group Name Permissions Type Path name component gskadmin security rw- r-- --- F ’Database.kdb’ gskadmin security rw- --- --- F ’Database.rdb’ gskadmin security rw- r-- --- F ’Database.sth’

All digital certificates in use must have a valid path to a trusted Certification authority.

Finding ID
IBMZ-VM-000460
Rule ID
IBMZ-VM-000460_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000066-GPOS-00034
CCI
CCI-000185
Target Key
(None)
Documentable
No
Discussion

Without path validation, an informed trust decision by the relying party cannot be made when presented with any certificate not already explicitly trusted. A trust anchor is an authoritative entity represented via a public key and associated data. It is used in the context of public key infrastructures, X.509 digital certificates, and DNSSEC. When there is a chain of trust, usually the top entity to be trusted becomes the trust anchor; it can be, for example, a Certification Authority (CA). A certification path starts with the subject certificate and proceeds through a number of intermediate certificates up to a trusted root certificate, typically issued by a trusted CA. This requirement verifies that a certification path to an accepted trust anchor is used for certificate validation and that the path includes status information. Path validation is necessary for a relying party to make an informed trust decision when presented with any certificate not already explicitly trusted. Status information for certification paths includes certificate revocation lists or online certificate status protocol responses. Validation of the certificate status information is out of scope for this requirement.

Fix Text

Remove or and replace certificates whose issuer's distinguished name does not lead to a DoD PKI Root Certification Authority, External Root Certification Authority (ECA), or an approved External Partner PKI’s Root Certification Authority.

Check Content

Invoke the “gskkyman” utility. From the “Key Management” Menu display Certificate Information. If no certificate information is found, this is not a finding. Note: Certificates are only valid when their Status is “TRUST”. Therefore, you may ignore certificates with the “NOTRUST” status during the following checks. If the digital certificate information indicates that the issuer's distinguished name leads to a DoD PKI Root Certificate Authority or External Certification Authority (ECA), this is not a finding. Reference the IASE website for complete information as to which certificates are acceptable (http://iase.disa.mil/pki-pke/interoperability/).

The IBM z/VM CA VM:Secure product must be installed and operating.

Finding ID
IBMZ-VM-000450
Rule ID
IBMZ-VM-000450_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000477-GPOS-00222
CCI
CCI-000172
Target Key
(None)
Documentable
No
Discussion

Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. Audit records can be generated from various components within the information system (e.g., module or policy filter).

Fix Text

CA VM:Secure product audits all commands. Ensure that CA VM:Secure product is installed and operational.

Check Content

Verify that CA VM:Secure product is operational on the system by entering the following command: From CMS Command line enter “VMSECURE VERSION”. If there is no response “VMSECURE” is not logged in, this is a finding.

IBM z/VM must enforce 24 hours/1 day as the minimum password lifetime.

Finding ID
IBMZ-VM-000440
Rule ID
IBMZ-VM-000440_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000075-GPOS-00043
CCI
CCI-000198
Target Key
(None)
Documentable
No
Discussion

Enforcing a minimum password lifetime helps to prevent repeated password changes to defeat the password reuse or history enforcement requirement. If users are allowed to immediately and continually change their password, then the password could be repeatedly changed in a short period of time to defeat the organization's policy regarding password reuse.

Fix Text

Configure a VM:Secure PASSWORD user exit that enforces 24 hours/1 day as the minimum password lifetime. Ensure that the following Macros are updated with proper PASSWORD user exit: FORCEPWC VMXCHGPW MAINT USE00080

Check Content

If there is no VM:Secure PASSWORD user exit in use, this is a finding. Review the VM:Secure PASSWORD user exit. If there is no code that enforces 24 hours/1 day as the minimum password lifetime, this is a finding.

Mitigation Control

The IBM z/VM CA VM:Secure product must be installed and operating.

Finding ID
IBMZ-VM-000430
Rule ID
IBMZ-VM-000430_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000476-GPOS-00221
CCI
CCI-000172
Target Key
(None)
Documentable
No
Discussion

Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. Audit records can be generated from various components within the information system (e.g., module or policy filter).

Fix Text

CA VM:Secure product audits all commands. Ensure that CA VM:Secure product is installed and operational.

Check Content

Verify that CA VM:Secure product is operational on the system by entering the following command: From CMS Command line enter “VMSECURE VERSION”. If there is no response “VMSECURE” is not logged in, this is a finding.

The IBM z/VM CA VM:Secure product Rules Facility must be restricted to appropriate personnel.

Finding ID
IBMZ-VM-001280
Rule ID
IBMZ-VM-001280_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000480-GPOS-00227
CCI
CCI-000366
Target Key
(None)
Documentable
No
Discussion

Configuring the operating system to implement organization-wide security implementation guides and security checklists ensures compliance with federal standards and establishes a common security baseline across DoD that reflects the most restrictive security posture consistent with operational requirements. Configuration settings are the set of parameters that can be changed in hardware, software, or firmware components of the system that affect the security posture and/or functionality of the system. Security-related parameters are those parameters impacting the security state of the system, including the parameters required to satisfy other security control requirements. Security-related parameters include, for example: registry settings; account, file, directory permission settings; and settings for functions, ports, protocols, services, and remote connections.

Fix Text

Ensure the product Rules Facility is installed and the Product configuration file contains an “ACCESS RULES” statement.

Check Content

Issue Command: VMSECURE CONFIG PRODUCT If there is no “ACCESS RULE” record, this is a finding. Issue command: VMSECURE RULES USER If no rules appear, this is a finding.

The IBM z/VM CA VM:Secure Product SFS configuration file must be restricted to appropriate personnel.

Finding ID
IBMZ-VM-001270
Rule ID
IBMZ-VM-001270_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000480-GPOS-00227
CCI
CCI-000366
Target Key
(None)
Documentable
No
Discussion

Configuring the operating system to implement organization-wide security implementation guides and security checklists ensures compliance with federal standards and establishes a common security baseline across DoD that reflects the most restrictive security posture consistent with operational requirements. Configuration settings are the set of parameters that can be changed in hardware, software, or firmware components of the system that affect the security posture and/or functionality of the system. Security-related parameters are those parameters impacting the security state of the system, including the parameters required to satisfy other security control requirements. Security-related parameters include, for example: registry settings; account, file, directory permission settings; and settings for functions, ports, protocols, services, and remote connections. The SFS Configuration file is used to control the addition/deletion of file pools and user storage groups.

Fix Text

Create rules in the VM:Secure product Rules Facility that restricts access to the disk where the “SFS” configuration file resides to system administrators or DASD administrators only.

Check Content

Query the CA VM:Secure product rules. If there are product rules granting access to the disk on which the “SFS” configuration file resides for system administrators or DASD administrators only, this is not a finding.

The IBM z/VM CA VM:Secure product SECURITY CONFIG file must be restricted to appropriate personnel.

Finding ID
IBMZ-VM-001260
Rule ID
IBMZ-VM-001260_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000480-GPOS-00227
CCI
CCI-000366
Target Key
(None)
Documentable
No
Discussion

Configuring the operating system to implement organization-wide security implementation guides and security checklists ensures compliance with federal standards and establishes a common security baseline across DoD that reflects the most restrictive security posture consistent with operational requirements. Configuration settings are the set of parameters that can be changed in hardware, software, or firmware components of the system that affect the security posture and/or functionality of the system. Security-related parameters are those parameters impacting the security state of the system, including the parameters required to satisfy other security control requirements. Security-related parameters include, for example: registry settings; account, file, directory permission settings; and settings for functions, ports, protocols, services, and remote connections. The PRODUCT CONFIG file is used to configure and control the normal processing of VM:Secure product.

Fix Text

Create rules in the VM:Secure product Rules Facility that restricts access to the disk where the “SECURITY CONFIG” file resides to system administrators or security administrators only.

Check Content

Query the CA VM:Secure product rules. If there are product rules granting access to the disk on which the “SECURITY CONFIG” file resides for system administrators or security administrators only, this is not a finding.

The IBM z/VM CA VM:Secure product CONFIG file must be restricted to appropriate personnel.

Finding ID
IBMZ-VM-001250
Rule ID
IBMZ-VM-001250_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000480-GPOS-00227
CCI
CCI-000366
Target Key
(None)
Documentable
No
Discussion

Configuration settings are the set of parameters that can be changed in hardware, software, or firmware components of the system that affect the security posture and/or functionality of the system. Security-related parameters are those parameters impacting the security state of the system, including the parameters required to satisfy other security control requirements. Security-related parameters include, for example: registry settings; account, file, directory permission settings; and settings for functions, ports, protocols, services, and remote connections.

Fix Text

Create rules in the VM:Secure product Rules Facility that restricts access to the disk where the product “CONFIG” file resides to system administrators only.

Check Content

Query the CA VM:Secure Product rules. If there are product rules granting access to the disk on which the product “CONFIG” file resides for system administrators only, this is not a finding.

The IBM z/VM CA VM:Secure product AUTHORIZ CONFIG file must be restricted to appropriate personnel.

Finding ID
IBMZ-VM-001240
Rule ID
IBMZ-VM-001240_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000480-GPOS-00227
CCI
CCI-000366
Target Key
(None)
Documentable
No
Discussion

Configuring the operating system to implement organization-wide security implementation guides and security checklists ensures compliance with federal standards and establishes a common security baseline across DoD that reflects the most restrictive security posture consistent with operational requirements. Configuration settings are the set of parameters that can be changed in hardware, software, or firmware components of the system that affect the security posture and/or functionality of the system. Security-related parameters are those parameters impacting the security state of the system, including the parameters required to satisfy other security control requirements. Security-related parameters include, for example: registry settings; account, file, directory permission settings; and settings for functions, ports, protocols, services, and remote connections. The AUTHORIZ CONFIG file is used to tailor user authorizations for CA VM:Secure commands.

Fix Text

Create rules in the VM:Secure Product Rules Facility that restricts access to the disk where the “AUTHORIZ CONFIG” file resides to system administrators or security administrators only.

Check Content

Query the CA VM:Secure product rules. If there are product rules granting access to the disk on which the “AUTHORIZ CONFIG” file resides for system administrators or security administrators only, this is not a finding.

The IBM z/VM CA VM:Secure product DASD CONFIG file must be restricted to appropriate personnel.

Finding ID
IBMZ-VM-001230
Rule ID
IBMZ-VM-001230_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000480-GPOS-00227
CCI
CCI-000366
Target Key
(None)
Documentable
No
Discussion

Configuring the operating system to implement organization-wide security implementation guides and security checklists ensures compliance with federal standards and establishes a common security baseline across DoD that reflects the most restrictive security posture consistent with operational requirements.

Fix Text

Create rules in the VM:Secure product Rules Facility that restricts access to the disk where the “DASD CONFIG” file resides to system administrators or DASD administrators only.

Check Content

Query the CA VM:Secure product rules. If there are product rules granting access to the disk on which the “DASD CONFIG” file resides for system administrators or DASD administrators only, this is not a finding.

The IBM z/VM CA VM:Secure product VMXRPI configuration file must be restricted to authorized personnel.

Finding ID
IBMZ-VM-001220
Rule ID
IBMZ-VM-001220_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000480-GPOS-00227
CCI
CCI-000366
Target Key
(None)
Documentable
No
Discussion

Configuring the operating system to implement organization-wide security implementation guides and security checklists ensures compliance with federal standards and establishes a common security baseline across DoD that reflects the most restrictive security posture consistent with operational requirements. Configuration settings are the set of parameters that can be changed in hardware, software, or firmware components of the system that affect the security posture and/or functionality of the system. Security-related parameters are those parameters impacting the security state of the system, including the parameters required to satisfy other security control requirements. Security-related parameters include, for example: registry settings; account, file, directory permission settings; and settings for functions, ports, protocols, services, and remote connections. The VMXRPI CONFIG file contains records that determine the activity that can occur when the Rules Facility is not available, and provides the configuration information for the Rules Facility.

Fix Text

Create rules in the VM:Secure product Rules Facility that restricts access to the Disk where the “VMXRPI” configuration file resides to system administrators only.

Check Content

Query the CA VM:Secure rules. If there are product rules granting access to the disk on which the “VMXRPI” configuration file resides for system administrators only, this is not a finding.

The IBM z/VM ANY Privilege Class must not be listed for privilege commands.

Finding ID
IBMZ-VM-001210
Rule ID
IBMZ-VM-001210_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000324-GPOS-00125
CCI
CCI-002235
Target Key
(None)
Documentable
No
Discussion

Preventing non-privileged users from executing privileged functions mitigates the risk that unauthorized individuals or processes may gain unnecessary access to information or privileges. Privileged functions include, for example, establishing accounts, performing system integrity checks, or administering cryptographic key management activities. Non-privileged users are individuals that do not possess appropriate authorizations. Circumventing intrusion detection and prevention mechanisms or malicious code protection mechanisms are examples of privileged functions that require protection from non-privileged users.

Fix Text

Review the defined-privileged commands. Assure that CP privileged commands are not defined with a Privilege Class of “ANY”.

Check Content

Examine defined-privileged commands. If any of the defined-privileged commands are defined with Privilege Class “ANY”, this is a finding.

The IBM z/VM Privilege Class F must be restricted to service representatives only.

Finding ID
IBMZ-VM-001200
Rule ID
IBMZ-VM-001200_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000324-GPOS-00125
CCI
CCI-002235
Target Key
(None)
Documentable
No
Discussion

Preventing non-privileged users from executing privileged functions mitigates the risk that unauthorized individuals or processes may gain unnecessary access to information or privileges. Privileged functions include, for example, establishing accounts, performing system integrity checks, or administering cryptographic key management activities. Non-privileged users are individuals that do not possess appropriate authorizations. Circumventing intrusion detection and prevention mechanisms or malicious code protection mechanisms are examples of privileged functions that require protection from non-privileged users. Privilege Class F can obtain, and examine in detail, data about input and output devices connected to the z/VM system. This privilege class is reserved for IBM use only.

Fix Text

Configure CP Privilege Class F to service representatives only.

Check Content

Examine user directory definitions to determine Privilege Class. If CP Privilege Class F is assigned to anyone other than a service representative, this is a finding.

The IBM z/VM Privilege Classes C and E must be restricted to appropriate system administrators.

Finding ID
IBMZ-VM-001190
Rule ID
IBMZ-VM-001190_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000324-GPOS-00125
CCI
CCI-002235
Target Key
(None)
Documentable
No
Discussion

Preventing non-privileged users from executing privileged functions mitigates the risk that unauthorized individuals or processes may gain unnecessary access to information or privileges. Privileged functions include, for example, establishing accounts, performing system integrity checks, or administering cryptographic key management activities. Non-privileged users are individuals that do not possess appropriate authorizations. Circumventing intrusion detection and prevention mechanisms or malicious code protection mechanisms are examples of privileged functions that require protection from non-privileged users.

Fix Text

Configure the CP Privilege Class. Assign CP Privilege Classes, C and E, to system programmers and/or system analysts only.

Check Content

Examine user directory definitions to determine privilege class. If the CP privilege class C is assigned to system programmers only, this is not a finding. If the CP privilege class E is assigned to system analyst only, this is not a finding.

The IBM z/VM TCP/IP must Include an SSLSERVERID statement in the TCP/IP server configuration file.

Finding ID
IBMZ-VM-001180
Rule ID
IBMZ-VM-001180_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000394-GPOS-00174
CCI
CCI-003123
Target Key
(None)
Documentable
No
Discussion

The Secure Socket Layer (SSL) server, provides processing support for secure (encrypted) communication between remote clients and z/VM TCP/IP application servers that are configured for secure communications The TCP/IP (stack) server routes requests for secure connections to an SSL server, which interacts with a client on behalf of an application server to perform handshake operations and the exchange of cryptographic parameters for a secure session. The SSL server then manages the encryption and decryption of data for an established, secure session. Remote access is access to DoD nonpublic information systems by an authorized user (or an information system) communicating through an external, non-organization-controlled network. Remote access methods include, for example, dial-up, broadband, and wireless. Encryption provides a means to secure the remote connection to prevent unauthorized access to the data traversing the remote access connection (e.g., RDP), thereby providing a degree of confidentiality. The encryption strength of a mechanism is selected based on the security categorization of the information. Without confidentiality protection mechanisms, unauthorized individuals may gain access to sensitive information via a remote access session.

Fix Text

Configure the “SSLSERVERID” statement to force auto logging of an SSL server before all other servers in the “AUTOLOG” list.

Check Content

Examine the “SSLSERVERID” statement in the TCP/IP server configuration file. If the “SSLSERVERID” statement identifies at least one User ID for an SSL server, this is not a finding.

The IBM z/VM TCP/IP must Include an SSLSERVERID statement in the TCP/IP server configuration file.

Finding ID
IBMZ-VM-001170
Rule ID
IBMZ-VM-001170_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000393-GPOS-00173
CCI
CCI-002890
Target Key
(None)
Documentable
No
Discussion

The Secure Socket Layer (SSL) server, provides processing support for secure (encrypted) communication between remote clients and z/VM TCP/IP application servers that are configured for secure communications The TCP/IP (stack) server routes requests for secure connections to an SSL server, which interacts with a client on behalf of an application server to perform handshake operations and the exchange of cryptographic parameters for a secure session. The SSL server then manages the encryption and decryption of data for an established, secure session. Remote access is access to DoD nonpublic information systems by an authorized user (or an information system) communicating through an external, non-organization-controlled network. Remote access methods include, for example, dial-up, broadband, and wireless. Encryption provides a means to secure the remote connection to prevent unauthorized access to the data traversing the remote access connection (e.g., RDP), thereby providing a degree of confidentiality. The encryption strength of a mechanism is selected based on the security categorization of the information. Without confidentiality protection mechanisms, unauthorized individuals may gain access to sensitive information via a remote access session.

Fix Text

Configure the “SSLSERVERID” statement to force auto logging of an SSL server before all other servers in the “AUTOLOG” list.

Check Content

Examine the “SSLSERVERID” statement in the TCP/IP server configuration file. If the “SSLSERVERID” statement identifies at least one User ID for an SSL server, this is not a finding.

The IBM z/VM CA VM:Secure product must be installed and operating.

Finding ID
IBMZ-VM-001160
Rule ID
IBMZ-VM-001160_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000392-GPOS-00172
CCI
CCI-002884
Target Key
(None)
Documentable
No
Discussion

If events associated with nonlocal administrative access or diagnostic sessions are not logged, a major tool for assessing and investigating attacks would not be available. This requirement addresses auditing-related issues associated with maintenance tools used specifically for diagnostic and repair actions on organizational information systems. Nonlocal maintenance and diagnostic activities are those activities conducted by individuals communicating through a network, either an external network (e.g., the Internet) or an internal network. Local maintenance and diagnostic activities are those activities carried out by individuals physically present at the information system or information system component and not communicating across a network connection. This requirement applies to hardware/software diagnostic test equipment or tools. This requirement does not cover hardware/software components that may support information system maintenance, yet are a part of the system, for example, the software implementing "ping," "ls," "ipconfig," or the hardware and software implementing the monitoring port of an Ethernet switch.

Fix Text

CA VM:Secure product audits all commands. Ensure that CA VM:Secure product is installed and operational.

Check Content

Verify that CA VM:Secure product is operational on the system by entering the following command: From the CMS Command line enter “VMSECURE VERSION”. If there is no response “VMSECURE” is not logged in, this is a finding.

The IBM z/VM DOMAINSEARCH statement in the TCP/IP DATA file must be configured with proper domain names for name resolution.

Finding ID
IBMZ-VM-001150
Rule ID
IBMZ-VM-001150_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000402-GPOS-00181
CCI
CCI-002468
Target Key
(None)
Documentable
No
Discussion

If data origin authentication and data integrity verification are not performed, the resultant response could be forged, it may have come from a poisoned cache, the packets could have been intercepted without the resolver's knowledge, or resource records could have been removed which would result in query failure or denial of service. Data origin authentication verification must be performed to thwart these types of attacks. Each client of name resolution services either performs this validation on its own or has authenticated channels to trusted validation providers. Information systems that provide name and address resolution services for local clients include, for example, recursive resolving or caching Domain Name System (DNS) servers. DNS client resolvers either perform validation of DNSSEC signatures, or clients use authenticated channels to recursive resolvers that perform such validations. This is not applicable if DNSSEC is not implemented on the local network.

Fix Text

Configure a “DOMAINSEARCH” statement in the TCP/IP configuration file with a proper domain name.

Check Content

Examine the TCP/IP configuration File. If there is no “DOMAINSEARCH” statement, this is a finding. If the “DOMAINSEARCH” statement does not specify a proper domain, this is a finding.

The IBM z/VM CHECKSUM statement must be included in the TCP/IP configuration file.

Finding ID
IBMZ-VM-001140
Rule ID
IBMZ-VM-001140_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000400-GPOS-00179
CCI
CCI-002466
Target Key
(None)
Documentable
No
Discussion

If data origin authentication and data integrity verification are not performed, the resultant response could be forged, it may have come from a poisoned cache, the packets could have been intercepted without the resolver's knowledge, or resource records could have been removed which would result in query failure or denial of service. Data integrity verification must be performed to thwart these types of attacks. Each client of name resolution services either performs this validation on its own or has authenticated channels to trusted validation providers. Information systems that provide name and address resolution services for local clients include, for example, recursive resolving or caching Domain Name System (DNS) servers. DNS client resolvers either perform validation of DNSSEC signatures, or clients use authenticated channels to recursive resolvers that perform such validations. The CHECKSUM statement is a TCP/IP configuration file statement that instructs the TCPIP virtual machine to reenable TCP checksum testing on incoming messages.

Fix Text

Configure the TCP/IP configuration file to include a “CHECKSUM” statement.

Check Content

Examine the TCP/IP configuration file. If there is no “CHECKSUM” statement in the TCP/IP configuration file, this is a finding.

The IBM z/VM TCP/IP NSINTERADDR statement must be present in the TCP/IP DATA configuration.

Finding ID
IBMZ-VM-001130
Rule ID
IBMZ-VM-001130_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000399-GPOS-00178
CCI
CCI-002465
Target Key
(None)
Documentable
No
Discussion

If data origin authentication and data integrity verification are not performed, the resultant response could be forged, it may have come from a poisoned cache, the packets could have been intercepted without the resolver's knowledge, or resource records could have been removed, which would result in query failure or DoS. Data origin authentication must be performed to thwart these types of attacks. Each client of name resolution services either performs this validation on its own or has authenticated channels to trusted validation providers. Information systems that provide name and address resolution services for local clients include, for example, recursive resolving or caching Domain Name System (DNS) servers. DNS client resolvers either perform validation of DNSSEC signatures, or clients use authenticated channels to recursive resolvers that perform such validations. Information systems that use technologies other than the DNS to map between host/service names and network addresses provide other means to enable clients to verify the authenticity of response data. This is not applicable if DNSSEC is not implemented on the local network.

Fix Text

Configure the “NSINTERADDR” statement in the TCP/IP DATA configuration file to an appropriate address.

Check Content

Examine the TCP/IP DATA configuration file. If there is no “NSINTERADDR” statement in the TCP/IP DATA configuration file, this is a finding.

The IBM z/VM TCP/IP DOMAINLOOKUP statement for must be properly configured.

Finding ID
IBMZ-VM-001120
Rule ID
IBMZ-VM-001120_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000399-GPOS-00178
CCI
CCI-002465
Target Key
(None)
Documentable
No
Discussion

If data origin authentication and data integrity verification are not performed, the resultant response could be forged, it may have come from a poisoned cache, the packets could have been intercepted without the resolver's knowledge, or resource records could have been removed, which would result in query failure or DoS. Data origin authentication must be performed to thwart these types of attacks. Each client of name resolution services either performs this validation on its own or has authenticated channels to trusted validation providers. Information systems that provide name and address resolution services for local clients include, for example, recursive resolving or caching Domain Name System (DNS) servers. DNS client resolvers either perform validation of DNSSEC signatures, or clients use authenticated channels to recursive resolvers that perform such validations. Information systems that use technologies other than the DNS to map between host/service names and network addresses provide other means to enable clients to verify the authenticity of response data. This is not applicable if DNSSEC is not implemented on the local network.

Fix Text

Configure the “DOMAINLOOKUP” statement to “DNS”.

Check Content

Examine the TCP/IP Configuration file. If “DOMAINLOOKUP” statement is configured to “DNS”, this is not a finding.

The IBM z/VM TCP/IP NSLOOKUP statement for UTF servers must be properly configured.

Finding ID
IBMZ-VM-001110
Rule ID
IBMZ-VM-001110_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000399-GPOS-00178
CCI
CCI-002465
Target Key
(None)
Documentable
No
Discussion

If data origin authentication and data integrity verification are not performed, the resultant response could be forged, it may have come from a poisoned cache, the packets could have been intercepted without the resolver's knowledge, or resource records could have been removed, which would result in query failure or DoS. Data origin authentication must be performed to thwart these types of attacks. Each client of name resolution services either performs this validation on its own or has authenticated channels to trusted validation providers. Information systems that provide name and address resolution services for local clients include, for example, recursive resolving or caching Domain Name System (DNS) servers. DNS client resolvers either perform validation of DNSSEC signatures, or clients use authenticated channels to recursive resolvers that perform such validations. Information systems that use technologies other than the DNS to map between host/service names and network addresses provide other means to enable clients to verify the authenticity of response data. This is not applicable if DNSSEC is not implemented on the local network.

Fix Text

Configure the “NSLOOKUP” statement to “YES”.

Check Content

Examine the TCP/IP Configuration file. If “NSLOOKUP” statement is “YES”, this is not a finding.

The IBM z/VM CA VM:Secure product must be installed and operating.

Finding ID
IBMZ-VM-000420
Rule ID
IBMZ-VM-000420_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000475-GPOS-00220
CCI
CCI-000172
Target Key
(None)
Documentable
No
Discussion

Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. Audit records can be generated from various components within the information system (e.g., module or policy filter).

Fix Text

CA VM:Secure product audits all commands. Ensure that CA VM:Secure product is installed and operational.

Check Content

Verify that CA VM:Secure product is operational on the system by entering the following command: From CMS Command line enter “VMSECURE VERSION”. If there is no response “VMSECURE” is not logged in, this is a finding.

The IBM z/VM CA VM:Secure product must be installed and operating.

Finding ID
IBMZ-VM-000410
Rule ID
IBMZ-VM-000410_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000474-GPOS-00219
CCI
CCI-000172
Target Key
(None)
Documentable
No
Discussion

Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. Audit records can be generated from various components within the information system (e.g., module or policy filter).

Fix Text

CA VM:Secure product audits all commands. Ensure that CA VM:Secure product is installed and operational.

Check Content

Verify that CA VM:Secure product is operational on the system by entering the following command: From CMS Command line enter “VMSECURE VERSION”. If there is no response “VMSECURE” is not logged in, this is a finding.

IBM z/VM must require the change of at least 50% of the total number of characters when passwords are changed.

Finding ID
IBMZ-VM-000400
Rule ID
IBMZ-VM-000400_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000072-GPOS-00040
CCI
CCI-000195
Target Key
(None)
Documentable
No
Discussion

If the operating system allows the user to consecutively reuse extensive portions of passwords, this increases the chances of password compromise by increasing the window of opportunity for attempts at guessing and brute-force attacks. The number of changed characters refers to the number of changes required with respect to the total number of positions in the current password. In other words, characters may be the same within the two passwords; however, the positions of the like characters must be different. If the password length is an odd number then number of changed characters must be rounded up. For example, a password length of 15 characters must require the change of at least 8 characters.

Fix Text

Configure a VM:Secure PASSWORD user exit that enforces change of at least 50% of the total number of characters when passwords are changed. Ensure that the following Macros are updated with proper PASSWORD user exit: FORCEPWC VMXCHGPW MAINT USE00080

Check Content

If there is no VM:Secure PASSWORD user exit in use, this is a finding. Review the VM:Secure PASSWORD user exit. If there is no code that enforces change of at least 50% of the total number of characters when passwords are changed, this is a finding.

Mitigation Control

IBM z/VM must enforce password complexity by requiring that at least one numeric character be used.

Finding ID
IBMZ-VM-000390
Rule ID
IBMZ-VM-000390_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000071-GPOS-00039
CCI
CCI-000194
Target Key
(None)
Documentable
No
Discussion

Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. Password complexity is one factor of several that determines how long it takes to crack a password. The more complex the password, the greater the number of possible combinations that need to be tested before the password is compromised.

Fix Text

Configure a VM:Secure PASSWORD user exit that enforces at least one numeric in the new Password. Ensure that the following Macros are updated with proper PASSWORD user exit: FORCEPWC VMXCHGPW MAINT USE00080

Check Content

If there is no VM:Secure PASSWORD user exit in use, this is a finding. Review the VM:Secure PASSWORD user exit. If there is no code that enforces a minimum that at least one numeric character is used in the new password, this is a finding.

Mitigation Control

IBM z/VM must enforce password complexity by requiring that at least one lower-case character be used.

Finding ID
IBMZ-VM-000380
Rule ID
IBMZ-VM-000380_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000070-GPOS-00038
CCI
CCI-000193
Target Key
(None)
Documentable
No
Discussion

Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. Password complexity is one factor of several that determines how long it takes to crack a password. The more complex the password, the greater the number of possible combinations that need to be tested before the password is compromised.

Fix Text

Configure a VM:Secure PASSWORD user exit that enforces at least one lower case in the new Password. Ensure that the following Macros are updated with proper PASSWORD user exit: FORCEPWC VMXCHGPW MAINT USE00080

Check Content

If there is no VM:Secure PASSWORD user exit in use, this is a finding. Review the VM:Secure PASSWORD user exit. If there is no code that enforces a minimum that at least one lowercase character is used in the new password, this is a finding.

Mitigation Control

IBM z/VM must enforce password complexity by requiring that at least one upper-case character be used.

Finding ID
IBMZ-VM-000370
Rule ID
IBMZ-VM-000370_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000069-GPOS-00037
CCI
CCI-000192
Target Key
(None)
Documentable
No
Discussion

Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. Password complexity is one factor of several that determines how long it takes to crack a password. The more complex the password, the greater the number of possible combinations that need to be tested before the password is compromised.

Fix Text

Configure a VM:Secure PASSWORD user exit that enforces at least one upper case in the new Password. Ensure that the following Macros are updated with proper PASSWORD user exit: FORCEPWC VMXCHGPW MAINT USE00080

Check Content

If there is no VM:Secure PASSWORD user exit in use, this is a finding. Review the VM:Secure PASSWORD user exit. If there is no code that enforces a minimum that at least one uppercase character is used in the new password, this is a finding.

The IBM z/VM CA VM:Secure product must be installed and operating.

Finding ID
IBMZ-VM-000360
Rule ID
IBMZ-VM-000360_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000473-GPOS-00218
CCI
CCI-000172
Target Key
(None)
Documentable
No
Discussion

Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. Audit records can be generated from various components within the information system (e.g., module or policy filter).

Fix Text

CA VM:Secure product audits all commands. Ensure that CA VM:Secure product is installed and operational.

Check Content

Verify that CA VM:Secure product is operational on the system by entering the following command: From CMS Command line enter “VMSECURE VERSION”. If there is no response “VMSECURE” is not logged in, this is a finding.

The IBM z/VM CA VM:Secure product must be installed and operating.

Finding ID
IBMZ-VM-000350
Rule ID
IBMZ-VM-000350_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000472-GPOS-00217
CCI
CCI-000172
Target Key
(None)
Documentable
No
Discussion

Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. Audit records can be generated from various components within the information system (e.g., module or policy filter).

Fix Text

CA VM:Secure product audits all commands. Ensure that CA VM:Secure product is installed and operational. The CA VM:Secure product audit of all commands using a z/VM standard journal record assures that all pertinent information is stored.

Check Content

Verify that CA VM:Secure product is operational on the system by entering the following command: From CMS Command line enter “VMSECURE VERSION”. If there is no response “VMSECURE” is not logged in, this is a finding.

The IBM z/VM CA VM:Secure product must be installed and operating.

Finding ID
IBMZ-VM-000340
Rule ID
IBMZ-VM-000340_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000471-GPOS-00216
CCI
CCI-000172
Target Key
(None)
Documentable
No
Discussion

Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. Audit records can be generated from various components within the information system (e.g., module or policy filter).

Fix Text

CA VM:Secure product audits all commands. Ensure that CA VM:Secure product is installed and operational.

Check Content

Verify that CA VM:Secure product is operational on the system by entering the following command: From CMS Command line enter “VMSECURE VERSION”. If there is no response “VMSECURE” is not logged in, this is a finding.

The IBM z/VM CA VM:Secure product must be installed and operating.

Finding ID
IBMZ-VM-000330
Rule ID
IBMZ-VM-000330_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000471-GPOS-00215
CCI
CCI-000172
Target Key
(None)
Documentable
No
Discussion

Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. Audit records can be generated from various components within the information system (e.g., module or policy filter).

Fix Text

CA VM:Secure product audits all commands. Ensure that CA VM:Secure product is installed and operational.

Check Content

Verify that CA VM:Secure product is operational on the system by entering the following command: From CMS Command line enter “VMSECURE VERSION”. If there is no response “VMSECURE” is not logged in, this is a finding.

The IBM z/VM Journal option must be specified in the Product Configuration File.

Finding ID
IBMZ-VM-000320
Rule ID
IBMZ-VM-000320_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000470-GPOS-00214
CCI
CCI-000172
Target Key
(None)
Documentable
No
Discussion

Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. Audit records can be generated from various components within the information system (e.g., module or policy filter). The JOURNALING statement tells z/VM CP to include the journaling facility and to enable the system being initialized to set and query the journaling facility.

Fix Text

Configure the Product Configuration files’ JOURNALING statement to “JOURNALING ON”.

Check Content

Examine the “Product Configuration” file. If the JOURNALING Statement does not specify “ON”, this is a finding.

The IBM z/VM CA VM:Secure product must be installed and operating.

Finding ID
IBMZ-VM-000310
Rule ID
IBMZ-VM-000310_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000468-GPOS-00212
CCI
CCI-000172
Target Key
(None)
Documentable
No
Discussion

Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. Audit records can be generated from various components within the information system (e.g., module or policy filter).

Fix Text

CA VM:Secure product audits all commands. Ensure that CA VM:Secure product is installed and operational.

Check Content

Verify that CA VM:Secure product is operational on the system by entering the following command: From CMS Command line enter “VMSECURE VERSION”. If there is no response “VMSECURE” is not logged in, this is a finding.

The IBM z/VM CA VM:Secure product must be installed and operating.

Finding ID
IBMZ-VM-000300
Rule ID
IBMZ-VM-000300_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000467-GPOS-00211
CCI
CCI-000172
Target Key
(None)
Documentable
No
Discussion

Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. Audit records can be generated from various components within the information system (e.g., module or policy filter).

Fix Text

CA VM:Secure product audits all commands. Ensure that CA VM:Secure product is installed and operational.

Check Content

Verify that CA VM:Secure product is operational on the system by entering the following command: From CMS Command line enter “VMSECURE VERSION”. If there is no response “VMSECURE” is not logged in, this is a finding.

The IBM z/VM CA VM:Secure product must be installed and operating.

Finding ID
IBMZ-VM-000290
Rule ID
IBMZ-VM-000290_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000466-GPOS-00210
CCI
CCI-000172
Target Key
(None)
Documentable
No
Discussion

Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. Audit records can be generated from various components within the information system (e.g., module or policy filter).

Fix Text

CA VM:Secure product audits all commands. Ensure that CA VM:Secure product is installed and operational.

Check Content

Verify that CA VM:Secure product is operational on the system by entering the following command: From CMS Command line enter “VMSECURE VERSION”. If there is no response “VMSECURE” is not logged in, this is a finding.

The IBM z/VM CA VM:Secure product must be installed and operating.

Finding ID
IBMZ-VM-000280
Rule ID
IBMZ-VM-000280_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000465-GPOS-00209
CCI
CCI-000172
Target Key
(None)
Documentable
No
Discussion

Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. Audit records can be generated from various components within the information system (e.g., module or policy filter).

Fix Text

CA VM:Secure product audits all commands. Ensure that CA VM:Secure product is installed and operational.

Check Content

Verify that CA VM:Secure product is operational on the system by entering the following command: From CMS Command line enter “VMSECURE VERSION”. If there is no response “VMSECURE” is not logged in, this is a finding.

The IBM z/VM CA VM:Secure product must be installed and operating.

Finding ID
IBMZ-VM-000270
Rule ID
IBMZ-VM-000270_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000463-GPOS-00207
CCI
CCI-000172
Target Key
(None)
Documentable
No
Discussion

Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. Audit records can be generated from various components within the information system (e.g., module or policy filter).

Fix Text

CA VM:Secure product audits all commands. Ensure that CA VM:Secure product is installed and operational.

Check Content

From CMS Command line enter “VMSECURE VERSION”. If there is no response “VMSECURE” is not logged in, this is a finding.

The IBM z/VM CA VM:Secure product must be installed and operating.

Finding ID
IBMZ-VM-000260
Rule ID
IBMZ-VM-000260_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000462-GPOS-00206
CCI
CCI-000172
Target Key
(None)
Documentable
No
Discussion

Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. Audit records can be generated from various components within the information system (e.g., module or policy filter). Using CA VM:Secure audit of all commands with z/VM standard journal record assures that all pertinent information is stored.

Fix Text

CA VM:Secure product audits all commands. Ensure that CA VM:Secure product is installed and operational.

Check Content

Verify that CA VM:Secure product is operational on the system by entering the following command: From CMS Command line enter “VMSECURE VERSION”. If there is no response VMSECURE is not logged in, this is a finding.

The IBM z/VM CA VM:Secure product must be installed and operating.

Finding ID
IBMZ-VM-000250
Rule ID
IBMZ-VM-000250_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000461-GPOS-00205
CCI
CCI-000172
Target Key
(None)
Documentable
No
Discussion

Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. Audit records can be generated from various components within the information system (e.g., module or policy filter). Using CA VM:Secure audit of all commands with z/VM standard journal record assures that all pertinent information is stored.

Fix Text

Using CA VM:Secure product audit of all commands with z/VM standard journal record assures that all pertinent information is stored.

Check Content

Verify that CA VM:Secure product is operational on the system by entering the following command: From CMS Command line enter “VMSECURE VERSION”. If there is no response “VMSECURE” is not logged in, this is a finding.

The IBM z/VM CA VM:Secure product must be installed and operating.

Finding ID
IBMZ-VM-000240
Rule ID
IBMZ-VM-000240_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000458-GPOS-00203
CCI
CCI-000172
Target Key
(None)
Documentable
No
Discussion

Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. Audit records can be generated from various components within the information system (e.g., module or policy filter). Using CA VM:Secure audit of all commands with z/VM standard journal record assures that all pertinent information is stored.

Fix Text

CA VM:Secure product audits all commands. Ensure that CA VM:Secure product is installed and operational.

Check Content

Verify that CA VM:Secure product is operational on the system by entering the following command: From CMS Command line enter “VMSECURE VERSION”. If there is no response “VMSECURE” is not logged in, this is a finding.

The IBM z/VM CA VM:Secure product must be installed and operating.

Finding ID
IBMZ-VM-000230
Rule ID
IBMZ-VM-000230_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000064-GPOS-00033
CCI
CCI-000172
Target Key
(None)
Documentable
No
Discussion

Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. Audit records can be generated from various components within the information system (e.g., module or policy filter). Using CA VM:Secure audit of all commands with z/VM standard journal record assures that all pertinent information is stored.

Fix Text

CA VM:Secure product audits all commands. Ensure that CA VM:Secure product is installed and operational. Using CA VM:Secure product audit of all commands with z/VM standard journal record assures that all pertinent information is stored.

Check Content

Verify that CA VM:Secure product is operational on the system by entering the following command: From CMS Command line enter “VMSECURE VERSION”. If there is no response “VMSECURE” is not logged in, this is a finding.

The IBM z/VM CA VM:Secure product must be installed and operating.

Finding ID
IBMZ-VM-000220
Rule ID
IBMZ-VM-000220_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000062-GPOS-00031
CCI
CCI-000169
Target Key
(None)
Documentable
No
Discussion

Without the capability to generate audit records, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. Audit records can be generated from various components within the information system (e.g., module or policy filter). The list of audited events is the set of events for which audits are to be generated. This set of events is typically a subset of the list of all events for which the system is capable of generating audit records. Using CA VM:Secure audit of all commands with z/VM standard journal record assures that all pertinent information is stored.

Fix Text

CA VM:Secure product audits all commands. Ensure that CA VM:Secure product is installed and operational. Using CA VM:Secure product audit of all commands with z/VM standard journal record assures that all pertinent information is stored.

Check Content

Verify that CA VM:Secure product is operational on the system by entering the following command: From CMS Command line enter “VMSECURE VERSION”. If there is no response “VMSECURE” is not logged in, this is a finding.

The IBM z/VM CA VM:Secure product AUDIT file must be restricted to authorized personnel.

Finding ID
IBMZ-VM-000210
Rule ID
IBMZ-VM-000210_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000059-GPOS-00029
CCI
CCI-000164
Target Key
(None)
Documentable
No
Discussion

If audit information were to become compromised, then forensic analysis and discovery of the true source of potentially malicious system activity is impossible to achieve. To ensure the veracity of audit information, the operating system must protect audit information from unauthorized deletion. This requirement can be achieved through multiple methods, which will depend upon system architecture and design. Audit information includes all information (e.g., audit records, audit settings, audit reports) needed to successfully audit information system activity.

Fix Text

Ensure that access to “VMSECURE” 1D0 minidisk is restricted to system administrators or security administrators.

Check Content

Issue command “VMSECURE” Rules System (you must be a system administrator to use this parameter). If the rule grants access to the 1D0 minidisk to anyone other than system administrators or security administrators, this is a finding.

The IBM z/VM CA VM:Secure product AUDIT file must be restricted to authorized personnel.

Finding ID
IBMZ-VM-000200
Rule ID
IBMZ-VM-000200_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000058-GPOS-00028
CCI
CCI-000163
Target Key
(None)
Documentable
No
Discussion

If audit information were to become compromised, then forensic analysis and discovery of the true source of potentially malicious system activity is impossible to achieve. To ensure the veracity of audit information, the operating system must protect audit information from unauthorized modification. Audit information includes all information (e.g., audit records, audit settings, audit reports) needed to successfully audit information system activity.

Fix Text

Ensure that access to VMSECURE 1D0 minidisk is restricted to system administrators or security administrators.

Check Content

Issue command “VMSECURE” Rules System (you must be a system administrator to use this parameter). If there is no rule for access to the 1D0 minidisk, this is a finding. If the rule grants access to the 1D0 minidisk to anyone other than system administrators or security administrators this is a finding.

The IBM z/VM CA VM:Secure product AUDIT file must be restricted to authorized personnel.

Finding ID
IBMZ-VM-000190
Rule ID
IBMZ-VM-000190_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000057-GPOS-00027
CCI
CCI-000162
Target Key
(None)
Documentable
No
Discussion

Unauthorized disclosure of audit records can reveal system and configuration data to attackers, thus compromising its confidentiality. Audit information includes all information (e.g., audit records, audit settings, audit reports) needed to successfully audit operating system activity.

Fix Text

Ensure that access to VMSECURE 1D0 minidisk is restricted to system administrators or security administrators.

Check Content

Issue command “VMSECURE” Rules System (you must be a system administrator to use this parameter). If there is no rule for access to the 1D0 minidisk, this is a finding. If the rule grants access to the 1D0 minidisk to anyone other than system administrators or security administrators, this is a finding.

The IBM z/VM CA VM:Secure product must be installed and operating.

Finding ID
IBMZ-VM-000180
Rule ID
IBMZ-VM-000180_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000042-GPOS-00021
CCI
CCI-000135
Target Key
(None)
Documentable
No
Discussion

Reconstruction of harmful events or forensic analysis is not possible if audit records do not contain enough information. At a minimum, the organization must audit the individual identities of group users. The organization must maintain audit trails in sufficient detail to reconstruct events to determine the actual account involved in the activity. Using CA VM:Secure audit of all commands with z/VM standard journal record assures that all pertinent information is stored.

Fix Text

CA VM:Secure product audits all commands. Ensure that CA VM:Secure product is installed and operational. Using CA VM:Secure product audit of all commands with z/VM standard journal record assures that all pertinent information is stored.

Check Content

Verify that CA VM:Secure product is operational on the system by entering the following command: From CMS Command line enter “VMSECURE VERSION”. If there is no response “VMSECURE” is not logged in, this is a finding.

The IBM z/VM CA VM:Secure product must be installed and operating.

Finding ID
IBMZ-VM-000170
Rule ID
IBMZ-VM-000170_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000042-GPOS-00020
CCI
CCI-000135
Target Key
(None)
Documentable
No
Discussion

Reconstruction of harmful events or forensic analysis is not possible if audit records do not contain enough information. At a minimum, the organization must audit the full-text recording of privileged commands. The organization must maintain audit trails in sufficient detail to reconstruct events to determine the cause and impact of compromise.

Fix Text

CA VM:Secure product audits all commands. Ensure that CA VM:Secure product is installed and operational. Using CA VM:Secure product audit of all commands with z/VM standard journal record assures that all pertinent information is stored.

Check Content

Verify that CA VM:Secure product is operational on the system by entering the following command: From CMS Command line enter “VMSECURE VERSION”. If there is no response “VMSECURE” is not logged in, this is a finding.

The IBM z/VM CA VM:Secure product must be installed and operating.

Finding ID
IBMZ-VM-000160
Rule ID
IBMZ-VM-000160_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000041-GPOS-00019
CCI
CCI-000134
Target Key
(None)
Documentable
No
Discussion

Without information about the outcome of events, security personnel cannot make an accurate assessment as to whether an attack was successful or if changes were made to the security state of the system. Event outcomes can include indicators of event success or failure and event-specific results (e.g., the security state of the information system after the event occurred). As such, they also provide a means to measure the impact of an event and help authorized personnel to determine the appropriate response. Using CA VM:Secure audit of all commands with z/VM standard journal record assures that all pertinent information is stored.

Fix Text

CA VM:Secure product audits all commands. Ensure that CA VM:Secure product is installed and operational. Using CA VM:Secure product audit of all commands with z/VM standard journal record assures that all pertinent information is stored.

Check Content

Verify that CA VM:Secure product is operational on the system by entering the following command: From CMS Command line enter “VMSECURE VERSION”. If there is no response “VMSECURE” is not logged in, this is a finding.

The IBM z/VM CA VM:Secure product must be installed and operating.

Finding ID
IBMZ-VM-000150
Rule ID
IBMZ-VM-000150_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000040-GPOS-00018
CCI
CCI-000133
Target Key
(None)
Documentable
No
Discussion

Without establishing where events occurred, it is impossible to establish, correlate, and investigate the events leading up to an outage or attack. In order to compile an accurate risk assessment and provide forensic analysis, it is essential for security personnel to know where events occurred, such as operating system components, modules, device identifiers, node names, file names, and functionality. Associating information about where the event occurred within the operating system provides a means of investigating an attack; recognizing resource utilization or capacity thresholds; or identifying an improperly configured operating system.

Fix Text

CA VM:Secure product audits all commands. Ensure that CA VM:Secure product is installed and operational. Using CA VM:Secure product audit of all commands with z/VM standard journal record assures that all pertinent information is stored.

Check Content

Verify that CA VM:Secure product is operational on the system by entering the following command: From CMS Command line enter “VMSECURE VERSION”. If there is no response “VMSECURE” is not logged in, this is a finding.

The IBM z/VM CA VM:Secure product must be installed and operating.

Finding ID
IBMZ-VM-000140
Rule ID
IBMZ-VM-000140_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000039-GPOS-00017
CCI
CCI-000132
Target Key
(None)
Documentable
No
Discussion

Without establishing where events occurred, it is impossible to establish, correlate, and investigate the events leading up to an outage or attack. In order to compile an accurate risk assessment and provide forensic analysis, it is essential for security personnel to know where events occurred, such as operating system components, modules, device identifiers, node names, file names, and functionality. Associating information about where the event occurred within the operating system provides a means of investigating an attack; recognizing resource utilization or capacity thresholds; or identifying an improperly configured operating system.

Fix Text

CA VM:Secure product audits all commands. Ensure that CA VM:Secure product is installed and operational. Using CA VM:Secure product audit of all commands with z/VM standard journal record assures that all pertinent information is stored.

Check Content

Verify that CA VM:Secure product is operational on the system by entering the following command: From CMS Command line enter “VMSECURE VERSION”. If there is no response “VMSECURE” is not logged in, this is a finding.

The IBM z/VM CA VM:Secure product must be installed and operating.

Finding ID
IBMZ-VM-000130
Rule ID
IBMZ-VM-000130_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000038-GPOS-00016
CCI
CCI-000131
Target Key
(None)
Documentable
No
Discussion

Without establishing what type of events occurred, it would be difficult to establish, correlate, and investigate the events leading up to an outage or attack. Audit record content that may be necessary to satisfy this requirement includes, for example, time stamps, source and destination addresses, user/process identifiers, event descriptions, success/fail indications, filenames involved, and access control or flow control rules invoked. Associating event types with detected events in the operating system audit logs provides a means of investigating an attack; recognizing resource utilization or capacity thresholds; or identifying an improperly configured operating system. Using CA VM:Secure audit of all commands with z/VM standard journal record assures that all pertinent information is stored.

Fix Text

CA VM:Secure product audits all commands ensure that CA VM:Secure is installed and operational. Using CA VM:Secure product audit of all commands with z/VM standard journal record assures that all pertinent information is stored.

Check Content

Verify that CA VM:Secure product is operational on the system by entering the following command: From CMS Command line enter “VMSECURE VERSION”. If there is no response “VMSECURE” is not logged in, this is a finding.

The IBM Z/VM CA VM:Secure product must be installed and operating.

Finding ID
IBMZ-VM-000120
Rule ID
IBMZ-VM-000120_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000037-GPOS-00015
CCI
CCI-000130
Target Key
(None)
Documentable
No
Discussion

Without establishing what type of events occurred, it would be difficult to establish, correlate, and investigate the events leading up to an outage or attack. Audit record content that may be necessary to satisfy this requirement includes, for example, time stamps, source and destination addresses, user/process identifiers, event descriptions, success/fail indications, filenames involved, and access control or flow control rules invoked. Associating event types with detected events in the operating system audit logs provides a means of investigating an attack; recognizing resource utilization or capacity thresholds; or identifying an improperly configured operating system.

Fix Text

CA VM:Secure product audits all commands. Ensure that CA VM:Secure product is installed and operational. Using CA VM:Secure product audit of all commands with z/VM standard journal record assures that all pertinent information is stored.

Check Content

Verify that CA VM:Secure product is operational on the system by entering the following command: From CMS Command line enter “VMSECURE VERSION”. If there is no response “VMSECURE” is not logged in, this is a finding.

The IBM z/VM TCP/IP configuration must include an SSLSERVERID statement.

Finding ID
IBMZ-VM-000110
Rule ID
IBMZ-VM-000110_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000033-GPOS-00014
CCI
CCI-000068
Target Key
(None)
Documentable
No
Discussion

The Secure Socket Layer (SSL) server, provides processing support for secure (encrypted) communication between remote clients and z/VM TCP/IP application servers that are configured for secure communications The TCP/IP (stack) server routes requests for secure connections to an SSL server, which interacts with a client on behalf of an application server to perform handshake operations and the exchange of cryptographic parameters for a secure session. The SSL server then manages the encryption and decryption of data for an established, secure session. Remote access is access to DoD nonpublic information systems by an authorized user (or an information system) communicating through an external, non-organization-controlled network. Remote access methods include, for example, dial-up, broadband, and wireless. Encryption provides a means to secure the remote connection to prevent unauthorized access to the data traversing the remote access connection (e.g., RDP), thereby providing a degree of confidentiality. The encryption strength of a mechanism is selected based on the security categorization of the information. Without confidentiality protection mechanisms, unauthorized individuals may gain access to sensitive information via a remote access session.

Fix Text

Configure the SSLSERVERID statement to force auto logging of an SSL server before all other servers in the AUTOLOG list.

Check Content

Examine the SSLSERVERID statement in the TCP/IP server configuration file. If the statement identifies at least one User ID for an SSL server, this is not a finding.

The IBM z/VM CA VM:Secure product must be installed and operating.

Finding ID
IBMZ-VM-000100
Rule ID
IBMZ-VM-000100_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000032-GPOS-00013
CCI
CCI-000067
Target Key
(None)
Documentable
No
Discussion

Remote access services, such as those providing remote access to network devices and information systems, which lack automated monitoring capabilities, increase risk and make remote user access management difficult at best. Remote access is access to DoD nonpublic information systems by an authorized user (or an information system) communicating through an external, non-organization-controlled network. Remote access methods include, for example, dial-up, broadband, and wireless.

Fix Text

CA VM:Secure product audits all commands. Ensure that CA VM:Secure product is installed and operational.

Check Content

Verify that CA VM:Secure is operational on the system by entering the following command: From the “CMS” command line enter “VMSECURE VERSION”. If there is no response “VMSECURE” is not logged on, this is a finding.

For FTP processing Z/VM TCP/IP FTP server Exit must be enabled.

Finding ID
IBMZ-VM-000090
Rule ID
IBMZ-VM-000090_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000032-GPOS-00013
CCI
CCI-000067
Target Key
(None)
Documentable
No
Discussion

Remote access services, such as those providing remote access to network devices and information systems, which lack automated monitoring capabilities, increase risk and make remote user access management difficult at best. Remote access is access to DoD nonpublic information systems by an authorized user (or an information system) communicating through an external, non-organization-controlled network. Remote access methods include, for example, dial-up, broadband, and wireless.

Fix Text

Include the “FTPAUDIT” statement in the TCP/IP Configuration file.

Check Content

If there are no FTP servers’ active, this is not applicable. Issue “SMSG” command for each FTP Server. Query “FPTAUDIT”. If the “Exit” is not enabled, this is a finding.

The IBM z/VM TCP/IP FTP server must be configured to display the Standard Mandatory DoD Notice and Consent Banner until users acknowledge the usage conditions and take explicit actions to log on for further access.

Finding ID
IBMZ-VM-000080
Rule ID
IBMZ-VM-000080_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000024-GPOS-00007
CCI
CCI-000050
Target Key
(None)
Documentable
No
Discussion

The banner must be acknowledged by the user prior to allowing the user access to the operating system. This provides assurance that the user has seen the message and accepted the conditions for access. If the consent banner is not acknowledged by the user, DoD will not be in compliance with system use notifications required by law. To establish acceptance of the application usage policy, a click-through banner at system logon is required. The system must prevent further activity until the user executes a positive action to manifest agreement by clicking on a box indicating "OK".

Fix Text

Configure the “FTP Banner” file to contain the following: The banner below is mandatory and deviations are not permitted except as authorized in writing by the DoD Chief Information Officer. The thrust of this new policy is to make it clear that there is no expectation of privacy when using DoD information systems and all use of DoD information systems is subject to searching, auditing, inspecting, seizing, and monitoring, even if some personal use of a system is permitted: STANDARD MANDATORY DOD NOTICE AND CONSENT BANNER You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions: -The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. -At any time, the USG may inspect and seize data stored on this IS. -Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG authorized purpose. -This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy. -Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details.

Check Content

Search “TCPMAINT” disks for “FTP Banner” file, usually configured as 198, 591; or 592. If the “FTP Banner” file contains the following, this is not a finding. The banner below is mandatory and deviations are not permitted except as authorized in writing by the DoD Chief Information Officer. The thrust of this new policy is to make it clear that there is no expectation of privacy when using DoD information systems and all use of DoD information systems is subject to searching, auditing, inspecting, seizing, and monitoring, even if some personal use of a system is permitted: STANDARD MANDATORY DOD NOTICE AND CONSENT BANNER You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions: -The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. -At any time, the USG may inspect and seize data stored on this IS. -Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG authorized purpose. -This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy. -Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details.

The IBM z/VM LOGO configuration file must be configured to display the Standard Mandatory DoD Notice and Consent Banner until users acknowledge the usage conditions and take explicit actions to log on for further access.

Finding ID
IBMZ-VM-000070
Rule ID
IBMZ-VM-000070_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000024-GPOS-00007
CCI
CCI-000050
Target Key
(None)
Documentable
No
Discussion

The banner must be acknowledged by the user prior to allowing the user access to the operating system. This provides assurance that the user has seen the message and accepted the conditions for access. If the consent banner is not acknowledged by the user, DoD will not be in compliance with system use notifications required by law.

Fix Text

Configure the “LOGO_CONFIG” statement to indicate a file that contains the DoD Standard Banner. The banner below is mandatory and deviations are not permitted except as authorized in writing by the DoD Chief Information Officer. The thrust of this new policy is to make it clear that there is no expectation of privacy when using DoD information systems and all use of DoD information systems is subject to searching, auditing, inspecting, seizing, and monitoring, even if some personal use of a system is permitted: STANDARD MANDATORY DOD NOTICE AND CONSENT BANNER You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions: -The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. -At any time, the USG may inspect and seize data stored on this IS. -Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG authorized purpose. -This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy. -Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details.

Check Content

Issue command “QUERY PRODUCT PRODID STATE ALL”. Examine the “LOGO_CONFIG” settings. If the file name indicated in the statement does not contain the DoD official Logon Banner, this is a finding. The banner below is mandatory and deviations are not permitted except as authorized in writing by the DoD Chief Information Officer. The thrust of this new policy is to make it clear that there is no expectation of privacy when using DoD information systems and all use of DoD information systems is subject to searching, auditing, inspecting, seizing, and monitoring, even if some personal use of a system is permitted: STANDARD MANDATORY DOD NOTICE AND CONSENT BANNER You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions: -The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. -At any time, the USG may inspect and seize data stored on this IS. -Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG authorized purpose. -This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy. -Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details. If all the items above are true, this is not a finding. If any item above is untrue, this is a finding.

The IBM z/VM TCP/IP FTP Server must be configured to display the Standard Mandatory DoD Notice and Consent Banner before granting local or remote access to the system.

Finding ID
IBMZ-VM-000060
Rule ID
IBMZ-VM-000060_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000023-GPOS-00006
CCI
CCI-000048
Target Key
(None)
Documentable
No
Discussion

The banner must be acknowledged by the user prior to allowing the user access to the operating system. This provides assurance that the user has seen the message and accepted the conditions for access. If the consent banner is not acknowledged by the user, DoD will not be in compliance with system use notifications required by law. To establish acceptance of the application usage policy, a click-through banner at system logon is required. The system must prevent further activity until the user executes a positive action to manifest agreement by clicking on a box indicating "OK".

Fix Text

Configure the “FTP Banner” file to contain the following: The banner below is mandatory and deviations are not permitted except as authorized in writing by the DoD Chief Information Officer. The thrust of this new policy is to make it clear that there is no expectation of privacy when using DoD information systems and all use of DoD information systems is subject to searching, auditing, inspecting, seizing, and monitoring, even if some personal use of a system is permitted: STANDARD MANDATORY DOD NOTICE AND CONSENT BANNER You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions: -The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. -At any time, the USG may inspect and seize data stored on this IS. -Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG authorized purpose. -This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy. -Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details.

Check Content

Search “TCPMAINT” disks for “FTP Banner” file, usually configured as 198; 591; or 592. If the “FTP Banner” file contains the following, this is not a finding. The banner below is mandatory and deviations are not permitted except as authorized in writing by the DoD Chief Information Officer. The thrust of this new policy is to make it clear that there is no expectation of privacy when using DoD information systems and all use of DoD information systems is subject to searching, auditing, inspecting, seizing, and monitoring, even if some personal use of a system is permitted: STANDARD MANDATORY DOD NOTICE AND CONSENT BANNER You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions: -The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. -At any time, the USG may inspect and seize data stored on this IS. -Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG authorized purpose. -This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy. -Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details.

The IBM z/VM LOGO Configuration file must be configured to display the Standard Mandatory DoD Notice and Consent Banner before granting local or remote access to the system.

Finding ID
IBMZ-VM-000050
Rule ID
IBMZ-VM-000050_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000023-GPOS-00006
CCI
CCI-000048
Target Key
(None)
Documentable
No
Discussion

Display of a standardized and approved use notification before granting access to the operating system ensures privacy and security notification verbiage used is consistent with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance. System use notifications are required only for access via logon interfaces with human users and are not required when such human interfaces do not exist. The banner must be formatted in accordance with applicable DoD policy. Use the following verbiage for operating systems that can accommodate banners of 1300 characters: "You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions: -The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. -At any time, the USG may inspect and seize data stored on this IS. -Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose. -This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy. -Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details." Use the following verbiage for operating systems that have severe limitations on the number of characters that can be displayed in the banner: "I've read & consent to terms in IS user agreem't."

Fix Text

Configure the System Configuration file “LOGO_Config” statement to point to a file containing the following Banner. The banner below is mandatory and deviations are not permitted except as authorized in writing by the DoD Chief Information Officer. The thrust of this new policy is to make it clear that there is no expectation of privacy when using DoD information systems and all use of DoD information systems is subject to searching, auditing, inspecting, seizing, and monitoring, even if some personal use of a system is permitted: STANDARD MANDATORY DOD NOTICE AND CONSENT BANNER You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions: -The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. -At any time, the USG may inspect and seize data stored on this IS. -Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG authorized purpose. -This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy. -Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details.

Check Content

Display the System Configuration file “LOGO_Config” statement. Determine the file name and file type of a logo configuration file. If the file name identified contains the following logon banner, this is not a finding. The below banner is mandatory and deviations are not permitted except as authorized in writing by the DoD Chief Information Officer. The thrust of this new policy is to make it clear that there is no expectation of privacy when using DoD information systems and all use of DoD information systems is subject to searching, auditing, inspecting, seizing, and monitoring, even if some personal use of a system is permitted: STANDARD MANDATORY DOD NOTICE AND CONSENT BANNER You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions: -The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. -At any time, the USG may inspect and seize data stored on this IS. -Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG authorized purpose. -This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy. -Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details. If all the items above are true, this is not finding. If any item above is untrue, this is a finding.

The IBM z/VM JOURNALING LOGON parameter must be set for lockout after 3 attempts for 15 minutes.

Finding ID
IBMZ-VM-000040
Rule ID
IBMZ-VM-000040_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000021-GPOS-00005
CCI
CCI-000044
Target Key
(None)
Documentable
No
Discussion

By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-force attacks, is reduced. Limits are imposed by locking the account.

Fix Text

Configure the System Configuration “JOURNALING” statement to: Facility ON LOGON LOCKout after 3 attempts for 15 minutes.

Check Content

Display the System Configuration File. If the “JOURNALING” statement is set to: Facility ON LOGON LOCKout after 3 attempts for 15 minutes, this is not a finding.

The IBM z/VM CA VM:Secure product must be installed and operating.

Finding ID
IBMZ-VM-000030
Rule ID
IBMZ-VM-000030_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-OS-000004-GPOS-00004
CCI
CCI-000018
Target Key
(None)
Documentable
No
Discussion

A comprehensive account management process such as provided by an External Security Manager (ESM) which includes automation helps to ensure accounts designated as requiring attention are consistently and promptly addressed. Account management functions include: assigning group or role membership; identifying account type; specifying user access authorizations (i.e., privileges); account removal, update, or termination; and administrative alerts. Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of reestablishing access. One way to accomplish this is for the attacker to create an account. Auditing account creation actions provides logging that can be used for forensic purposes.

Fix Text

CA VM:Secure product audits all commands. Ensure that CA VM:Secure product is installed and operational.

Check Content

Verify that CA VM:Secure product is operational on the system by entering the following command: From the “CMS” Command line enter VMSECURE VERSION. If there is no response VMSECURE is not logged in, this is a finding.

The IBM z/VM TCP/IP DTCPARM files must be properly configured.

Finding ID
IBMZ-VM-000020
Rule ID
IBMZ-VM-000020_rule
Severity
Cat I
CCE
(None)
Group Title
SRG-OS-000001-GPOS-00001
CCI
CCI-000015
Target Key
(None)
Documentable
No
Discussion

A comprehensive account management process such as provided by External Security Managers (ESM) which includes automation helps to ensure accounts designated as requiring attention are consistently and promptly addressed. Examples include, but are not limited to, using automation to take action on multiple accounts designated as inactive, suspended or terminated, or by disabling accounts located in non-centralized account stores such as multiple servers. This requirement applies to all account types, including individual/user, shared, group, system, guest/anonymous, emergency, developer/manufacturer/vendor, temporary, and service. Account management functions include: assigning group or role membership; identifying account type; specifying user access authorizations (i.e., privileges); account removal, update, or termination; and administrative alerts.

Fix Text

For each TCP/IP Stack, configure the DTCPARM file in the TCP/IP configuration to include the following statements: :ESM_Enable.YES :ESM_Racroute.YES :ESM_Validate.YES

Check Content

Examine the “TCP/IP” configuration file for each TCP/IP Stack. Ensure that there is a “DTCPARM” File for each installed server. If each “DTCPARM” file include the following statements, this is not a finding. :ESM_Enable.YES :ESM_Racroute.YES :ESM_Validate.YES

The IBM z/VM CA VM:Secure product Rules Facility must be installed and operating.

Finding ID
IBMZ-VM-000010
Rule ID
IBMZ-VM-000010_rule
Severity
Cat I
CCE
(None)
Group Title
SRG-OS-000001-GPOS-00001
CCI
CCI-000015
Target Key
(None)
Documentable
No
Discussion

Enterprise environments make account management for operating systems challenging and complex. A manual process for account management functions adds the risk of a potential oversight or other errors.

Fix Text

Ensure the Rules Facility is installed and the Product Config file contains an “ACCESS RULES” statement.

Check Content

Verify that an “ACCESS RULE” record exists on the system using the following command: CONFIGURE PRODUCT If there is no “ACCESS RULE” record, this is a finding. Verify that VM:SECURE RULES have been added using the following command: VMSECURE RULES USER If no rules appear, this is a finding.