Operating system privileged account control

The use of administrator-level operating system accounts must be restricted to the maximum extent possible, unless needed to install, configure, maintain, operate and support emergency activities. The use of the administrator-level account must be limited to the duration of those activities. Log-in with built-in administrator-level accounts is not permitted, except to perform activities where such accounts are specifically needed or in emergency situations. Individual accounts with administrator-level privileges or accounts with the ability to escalate to administrative access (for example, sudo) should be used instead. Those administration accesses and usage is to be logged so that it is possible to trace back the cause of an incident. For all other situations, a user account with minimum privilege is required. To comply with this regulations, ensure:
  • Utility program invocation has to be encapsulated in scripts that can be executed only within a controlled scope.
  • Usage of the command-line interface (CLI) is allowed only for:
    • Installation tasks
    • Resolution of emergency situations
    • Use in scripts that can be executed only within a controlled scope
  • No other operating system accounts should have access to file system resources, database resources, IBM® MQ and IBM Integration Bus resources of FTM SWIFT.
  • Regular administrative and operational tasks have to be performed using the Administration & Operation Browser UI (see AO Facility). However, the AO console can be used to issue CLI commands.