V-224733
z/OS IBM CICS Transaction Server for TSS Security Technical Implementation Guide
Title
CICS default logonid(s) must be defined and/or controlled in accordance with the security requirements.
Description
<VulnDiscussion>CICS is a transaction-processing product that provides programmers with the facilities to develop interactive applications. Improperly defined or controlled CICS userids (i.e., region, default, and terminal users) may provide an exposure and vulnerability within the CICS environment. This could result in the compromise of the confidentiality, integrity, and availability of the CICS region, applications, and customer data.</VulnDiscussion><FalsePositives></FalsePositives><FalseNeg...
Fix Text (Documentation Requirement)
Review all CICS region, default, and end-user userids to ensure they are defined and controlled as required. Ensure the following items are in effect for the CICS default ACID (i.e., DFLTUSER=default userid): Not granted the TSS BYPASS privilege. No access to interactive online facilities (e.g., TSO) other than CICS. OPTIME parameter is set to 15 minutes. Can be increased up to 30 if justified by the ISSM. Restricted from accessing all data sets and resources with the following exceptions: (a) Non-restricted CICS transactions (e.g., CESF, CESN, 'good morning' transaction, etc.). (b) If applicable, resources necessary to operate in an intersystem communication (ISC) environment (i.e., LU6.1, LU6.2, and MRO).