Access Control Facility evaluation criteria:

A) Identification/Authentication Function:

Objective: Verify the user's claimed identify is verifiable, and user identification is a unique, auditable representation that can be identified for accountability.

1. Verify that the ACF supports the following attributes for identification/authentication:2.

2. If passwords are used to authenticate the user then the following attributes or support functions should exist:

B) Resource Access Control Function:

Objective: Verify that mechanisms exist to restrict access of computer resources (i.e. programs, data files transaction and commands) to authorized users.

1. Verify the ACF has the following attributes:

- the date, time, and location of the users last successful access

- number of unsuccessful logon attempts since last logon

- number of days until password expires

1. read, write and update/execute

2. default access right

C) Accountability and Auditability

Objective: Ensure that sufficient security information about user actions or processing acting on their behalf is logged and provides a management trail to support the ability to audit.

1. Verify that the ACF has the following attributes or support functions:

- valid and invalid user authentication attempts

- logons and logoffs

- activities of privileged users (e.g., System Administrators, Operators)

- unsuccessful data or transaction access attempts

- successful access to security-critical system resources

- changes to users' security profiles, privileges, or attributes

- changes to access rights of resources

- changes to the system security configuration

- modification of system-supplied software

- creation and deletion of resources

- disk file access

- tape volume or tape file access

- program execution

- on-line command execution

- customer-defined events

- date and time of the event

- user identification and associated point of physical access, e.g., terminal, port, network address, or communication device

- type of event

- name of resources accessed

- success or failure of the event

D) Administration (applies to all categories above)

Objective: Verify administration controls ensure the continued protection of data as defined by the owner and that security deviations are detected and corrected.


Top Secret Security Application Level review of dataset protection, monitoring, and administration

Objectives: Verify access security components exist to sufficiently protect computing resources (i.e. data files, programs). To identify over controlled or under controlled security activities and ensure weak security controls are compensated for by business or other system controls.

1. Determine the last time the Top Secret installation was reviewed for the processing environment.

a) If the review was conducted within the last year, evaluate the impact of any open issues that effect your applications. For example, the TSS facilities settings (facilities include CICS, batch, TSO etc..) that your application use impact the security access controls.

b) If the review has not been conducted within the last year see I/T Audit team for future coverage plans.

2. Evaluate the application level administrative procedures in place for Top Secret access security protection including:

- Establishing user ids

- Protecting resources (files, programs, CICS trans) to Top Secret as required by the owner

- Granting user access to Top Secret protected resources

- Removal of employee access upon termination or change in job function

- User requests are authorized by the owner

- Owners periodically (i.e. 180 days) review and adjust users access to the system and access authorizations to their resources.

- Documented procedures

- Documented access standards based on job function.

- Security Coordinator job responsbilities are formally defined as part of their PDR.

Note: Administrative procedures performed by the Top Secret Master Administration area will be covered by the I/T Team.

3. Evaluate procedures in place to monitor Top Secret security related activity:

a) Verify owners (or data custodians) periodically review unsuccessful and audited dataset/resource access attempts and unsuccessful login attempts. (e.g. daily, weekly) This also includes the review of TSS access violations.

b) Verify escalation procedures are documented and exercised for those incidents or recurring trends that indicate:

- Repeated or unusual attempts by a user to gain unauthorized access to protected resources.

- System hacking activities in the form of excessive numbers of repeated, unsuccessful login/access.

c) Verify access to critical files is audited where a business need exist.

4. Obtain Top Secret Security reports from I/T Team necessary to evaluate the access protection for identified datasets. (i.e. TSS whoowns, TSS whohas, TSS list, ACCESS TSS tools)

This requires:

5. Verify that critical and sensitive data files and programs are adequately protected by TSS using the reports from step 4.

- Identify datasets (high level qualifiers), libraries or transactions not defined to Top Secret.

- Identify users who have not recently used their Top Secret ids. (i.e. in the last 6 months)

- Identify users who are suspended in TSS.

- Identify users who are not required to have a password

- Identify users who are not required to change their password.

- Identify users who can bypass TSS Security or are privileged users (e.g. no data set check, administrative authority.)

- Evaluate the level of access for users based on user job function . User job titles can be obtained through profs callup.

- Identify jobs which have update/all access to the critical datasets.( From reports gained in step #4) Followup with the application area to verify any jobs which have update/all access which do not belong to the application being reviewed.

- Verify with business owner exceptions or questionable access privileges.

6. Ensure each top secret id has a 1 to 1 correspondence with either a user or job. Evaluate the need for use of a group id.