STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to zOS Front End Processor for TSS Security Technical Implementation Guide

V-224724

CAT II (Medium)

NCP (Net Work Control Program) Data set access authorization does not restricts UPDATE and/or ALLOCATE access to appropriate personnel.

Rule ID

SV-224724r1146378_rule

STIG

zOS Front End Processor for TSS Security Technical Implementation Guide

Version

V7R2

CCIs

CCI-001499

Discussion

If components of the FEPs are not properly protected they can be stolen, damaged, or disturbed. Without adequate physical security, unauthorized users can access the control panel, the operator console, and the diskette drive of the service subsystem. Therefore, they can interfere with the normal operations of the FEPs. Improper control of FEP components could compromise network operations.

Check Content

Refer to the following report produced by the Data Set and Resource Data Collection:

- SENSITVE.RPT(NCPRPT).

The ACP data set rules for NCP data sets restrict WRITE and/or greater access to authorized personnel (e.g., systems programming personnel), this is not a finding.

Fix Text

Identify Names of the following data sets used for installation and in development/production environments:

- NCP system data sets
- NCP source definition data sets
- NCP load modules
- NCP host dump data sets
- NCP utility programs

Have the ISSO validate that they are properly protected by the ACP. And that only authorized personnel are permitted UPDATE and/or ALLOCATE access (e.g., z/OS systems programming personnel).