Rule ID
SV-224576r1145939_rule
Version
V7R2
CCIs
Improperly defined security controls for the BMC CONTROL-M could result in the compromise of the network, operating system, and customer data.
Refer to the following reports produced by the TSS Data Collection: - TSSCMDS.RPT(FACLIST) - Preferred report containing all control option values in effect including default values. - TSSCMDS.RPT(TSSPRMFL) - Alternate report containing only control option values explicitly coded at TSS startup. If the BMC CONTROL-M Facility Matrix table is defined as follows, this is not a finding. FAC(USERxx=NAME=CONTROLM,PGM=CTM,ID=nn,ACTIVE,SHRPRF) FAC(CONTROLM=ASUBM,NOABEND,MULTIUSER,NOXDEF,SIGN(S)) FAC(CONTROLM=RES,LUMSG,STMSG,WARNPW,NORNDPW) FAC(CONTROLM=NOAUDIT,NOTSOC,MODE=FAIL) FAC(CONTROLM=LOG(SMF,INIT,MSG,SEC9),UIDACID=8,LOCKTIME=000)
The BMC CONTROL-M systems programmer and the ISSO will ensure that the TOP SECRET Facility Matrix Table is properly defined using the following example: CONTROLM: FAC(USERxx=NAME=CONTROLM,PGM=CTM,ID=nn,ACTIVE,SHRPRF) FAC(CONTROLM=ASUBM,NOABEND,MULTIUSER,NOXDEF) FAC(CONTROLM=LUMSG,STMSG,SIGN(S),WARNPW,NORNDPW) FAC(CONTROLM=NOAUDIT,NOTSOC,MODE=FAIL) FAC(CONTROLM=LOG(SMF,INIT,MSG,SEC9),UIDACID=8,LOCKTIME=000)