Skip to main content
CUI

STIG Rule - V-223488

V-223488

SV-223488r991589_rule

CAT III

ACF2 APPLDEF GSO record if used must have supporting documentation indicating the reason it was used.

From: IBM z/OS ACF2 Security Technical Implementation Guide (V9R8)

Description

<VulnDiscussion>Failure to restrict network connectivity only to authorized systems permits inbound connections from malicious systems. It also permits outbound connections that may facilitate exfiltration of DoD data.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>

Check Procedure

From the ACF Command screen enter: SET CONTROL(GSO) LIST LIKE(APPLDEF-) If the GSO APPLDEF record does not exist, this is not a finding. If the GSO APPLDEF record does exist and no supporting documentation is available, this is a finding.

Fix Text

For any APPLDEF GSO record used, it must have supporting documentation indicating the reason it was used. The APPLDEF record is optional.

CCI Reference

CCI-000366,CCI-000368
Created
2026-04-07 20:08:19
Last Updated
2026-04-07 20:08:19
CUI