Back
🔒
z/OS RACF STIG SRR Checklist (Y26M01)
Hard
19 items
·
3 hours
testuser
Published 1 month ago
This checklist guides IT and security professionals through a Security Readiness Review (SRR) for IBM z/OS RACF using the Y26M01 STIG. It helps verify installation, configuration, auditing, and compliance items required by DISA, and is intended for system administrators and security reviewers.
Progress
0 / 19
- Review STIG version and supporting resources — Confirm checklist version Y26M01 and download required XCCDF/SRR files.
- Confirm target system is IBM z/OS — Verify CPE/host inventory lists z/OS as the target OS.
- Verify RACF is installed and running — Check RACF service status and base datasets are present.
- Validate RACF configuration against STIG settings — Compare system settings with STIG requirements and note deviations.
- Review user and group account controls — Assess account lifecycle, privileges, and administration policies.
- Audit privileged accounts — List and verify justification for all privileged/userids.
- Secure system and service accounts — Ensure non-interactive accounts have strong controls and no default passwords.
- Remove or disable unused accounts — Disable accounts with no business need and document actions.
- Verify access control lists and permissions — Confirm dataset and resource permissions follow least privilege.
- Check logging and audit configuration — Validate audit scope, collectors, and log integrity controls.
- Ensure auditing is enabled — Confirm RACF and system auditing are active for required events.
- Confirm log retention and protection meet policy — Verify retention periods, offsite copies, and access controls.
- Run SRR scripts and capture output — Execute provided SRR/XCCDF scripts and save reports for review.
- Validate patch levels and software versions — Compare installed releases to vendor and DISA requirements.
- Confirm backups and recovery procedures — Ensure RACF critical datasets are backed up and restore tested.
- Document exceptions and mitigations — Record deviations from STIG with justification and compensating controls.
- Report findings to designated point of contact — Send SRR results and remediation steps to the listed POC.
- Update checklist and resource links — Refresh local checklist copy and link to latest DISA resources and SHA values.
- Schedule periodic reviews and re-assessments — Set a cadence for future SRRs and STIG updates.
Your Stats
🏆
0
Completed
📅
—
Last Done
⏱️
—
Last Time
Completion Rate
Items checked per run
⚡
—
Fastest Run
🔥
0
Streak
🚫
—
Most Skipped Step
🔄
0
Resets
📝 My Notes