STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to z/OS IBM CICS Transaction Server for TSS Security Technical Implementation Guide

V-224736

CAT II (Medium)

CICS userids are not defined and/or controlled in accordance with proper security requirements.

Rule ID

SV-224736r1145859_rule

STIG

z/OS IBM CICS Transaction Server for TSS Security Technical Implementation Guide

Version

V7R2

CCIs

CCI-000213

Discussion

CICS is a transaction-processing product that provides programmers with the facilities to develop interactive applications. Improperly defined or controlled CICS userids (i.e., region, default, and terminal users) may provide an exposure and vulnerability within the CICS environment. This could result in the compromise of the confidentiality, integrity, and availability of the CICS region, applications, and customer data.

Check Content

Refer to the following report produced by the TSS Data Collection:

- TSSCMDS.RPT(WHOOPROP).

Refer to the CICS Systems Programmer Worksheets filled out from previous vulnerability ZCIC0010.

If the CICS region is defined to the PROPCNTL resource class, this is not a finding.

Fix Text

Ensure the CICS region is defined to the PROPCNTL resource class.

Example:

TSS ADDTO(owning acid) PROPCNTL(CICS region acid)