STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to z/OS CA MIM for TSS Security Technical Implementation Guide

V-224631

CAT II (Medium)

CA MIM Resource Sharing Started task will be properly defined to the Started Task Table for Top Secret.

Rule ID

SV-224631r1146068_rule

STIG

z/OS CA MIM for TSS Security Technical Implementation Guide

Version

V7R2

CCIs

CCI-000764

Discussion

Access to product resources should be restricted to only those individuals responsible for the application connectivity and who have a requirement to access these resources. Improper control of product resources could potentially compromise the operating system, ACP, and customer data.

Check Content

Refer to the following report produced by the TSS Data Collection:

- TSSCMDS.RPT(#STC).

Automated Analysis
Refer to the following report produced by the TSS Data Collection:

- PDI(ZMIM0032).

If the CA MIM Resource Sharing started task(s) is (are) defined in the TSS STC record, this is not a finding.

Fix Text

The ISSO working with the systems programmer will ensure the CA MIM Resource Sharing Started Task(s) is properly identified and/or defined to the system ACP. 

A unique ACID must be assigned for the CA MIM Resource Sharing started task(s) through a corresponding STC table entry.

The following commands are provided as a sample for defining Started Task(s):

TSS ADD(STC) PROCNAME(MIMGR) ACID(MIMGR)