STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to z/OS CL/SuperSession for RACF Security Technical Implementation Guide

V-224466

CAT II (Medium)

CL/SuperSession Started task(s) must be properly defined to the STARTED resource class for RACF.

Rule ID

SV-224466r1144734_rule

STIG

z/OS CL/SuperSession for RACF Security Technical Implementation Guide

Version

V7R2

CCIs

CCI-000764

Discussion

Access to product resources must be restricted to only individuals responsible for the application connectivity and who have a requirement to access these resources. Improper control of product resources could compromise the operating system, ACP, and customer data.

Check Content

Refer to the following report produced by the RACF Data Collection:

- DSMON.RPT(RACSPT).

Automated Analysis
Refer to the following report produced by the RACF Data Collection:

- PDI(ZCLS0032).

Verify that the CL/SUPERSESSION started task(s) is (are) defined to the STARTED resource class profile and/or ICHRIN03 table entry, this is not a finding.

Fix Text

The CL/SUPERSESSION system programmer and the ISSO will ensure that a product's started sask(s) is (are) properly identified and/or defined to the System ACP. 

A unique userid must be assigned for the CL/SUPERSESSION started task(s) thru a corresponding STARTED class entry.

The following sample set of commands is shown here as a guideline:

rdef started KLS.** uacc(none) owner(admin) audit(all(read)) stdata(user(KLS) group(stc))

setr racl(started) ref