STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to IBM z/OS TSS Security Technical Implementation Guide

V-223890

CAT II (Medium)

The CA-TSS PWHIST Control Option must be set to 10 or greater.

Rule ID

SV-223890r998491_rule

STIG

IBM z/OS TSS Security Technical Implementation Guide

Version

V9R8

CCIs

CCI-004061

Discussion

Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. If the information system or application allows the user to consecutively reuse their password when that password has exceeded its defined lifetime, the end result is a password that is not changed as per policy requirements.

Check Content

From the ISPF Command Shell enter:
TSS MODIFY STATUS

If the PWHIST Control Option value is not set to PWHIST(10) or greater, this is a finding.

Fix Text

Evaluate the impact associated with implementation of the control option. Develop a plan of action to implement the following control option setting as specified and proceed with the change.

PWHIST(10) or greater