CICS_RESOURCE_CONFIGURATION
CICS_RESOURCE_CONFIGURATION checks that configuration of the CICS® resources aligns to best practice recommendations for production regions.
- Description
- This check reviews a set of CICS resource configuration settings to ensure alignment to best practice.
- Reason for check:
- Validate that access to key resources aligns to best practice recommendations for production
regions.
See Table 1 for details.
- z/OS® releases the check applies to:
- Any z/OS release that supports CICS TS 6.1 or later.
- Minimum CICS TS release required:
- CICS TS 6.1 or later.
- Type of check (local, remote, or Rexx):
- Local.
- User override of IBM® values:
- No.
- Debug support:
- 6.2 and later Yes.
- 6.1 No.
- Verbose support:
- No.
- Parameters accepted:
- None.
- Reference:
- For more information about applicable guidance, see Table 1.
- Messages:
- Table 1 displays the list of messages for this check. See also Reference: IBM Health Checker for z/OS messages related to CICS.
The rule checks for these conditions:
| Condition checked | Related risk or concern and applicable guidance | Message displayed |
|---|---|---|
| CEDF, CECI, or CEMT transactions are installed and the default user can access. | It is a potential security risk if the default user can run any of the checked transactions
in a production region. You are advised to remove access for the default user. |
DFHH0501 (Exception) |
| Review TCPIPSERVICE definitions for use of the IPIC protocol with a user replaceable module (URM) of DHISAPI. | Using this URM allows any client to connect and automatically install a connection. Learn more about Defining IPIC connections |
DFHH0502 (Exception) |
Validate if clones of sensitive transactions exist. The list of transactions that are checked
for clones is:
|
Unauthorized users might run the cloned transaction, which represents a security risk to the
region. You are advised to review access to the cloned transactions or remove them. |
DFHH0503 (Exception) |
| Evaluate if any TCPIPSERVICES exist that do not use SSL and defined with AUTHENTICATE=NONE or AUTHENTICATE=BASIC. | Any TCPIPSERVICE not configured with TLS and set up with either AUTHENTICATION(NO) or
AUTHENTICATE(BASIC) is not secure. Learn more about TCPIPSERVICE resource |
DFHH0504 (Exception) |
| 6.3 beta If XCMD=YES, a check is made for transactions that specify CMDSEC(NO). | XCMD=YES and a transaction is defined with CMDSEC(NO), security checking is unavailable for those transactions. You are advised to review access and secure transactions. | DFHH0505 (Warning) |