Beyond Best Practices: The DISA STIGs
|
|
|
- Buddy Norton
- 10 years ago
- Views:
Transcription
1 Beyond Best Practices: The DISA STIGs Jim McNeill Vanguard Integrity Professionals 2013 Vanguard Integrity Professionals, Inc. 1 Outline Terms and Terminology History of the STIGS Categories of STIG Checks Individual STIGS Anatomy of a STIG 2 Page 1
2 Terms and Terminology 2010 Vanguard Integrity Professionals, Inc. 3 Terms and Terminology Defense Information Systems Agency (DISA) A United States Department of Defense combat support agency with the goal of providing real-time information technology (IT) and communications support to the President, Vice President, Secretary of Defense, the military Services, and the Combatant Commands. National Institute of Standards and Technology (NIST) Publishes configuration controls that must be used by each Federal Agency and by all contractors processing data for a federal agency. Security Technical Implementation Guide (STIG) A configuration document used to standardized security controls for software and hardware systems. Each STIG check in the SRR checklist is mapped to IA Controls defined in DoD Directive Page 2
3 Terms and Terminology Information Assurance (IA) Measures that protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality, and nonrepudiation. This includes providing for restoration of information systems by incorporating protection, detection, and reaction capabilities. Department of Defense (DoD) The U.S. federal department charged with coordinating and supervising all agencies and functions of the government relating directly to national security and the United States armed forces. DoD Directive Requires that all IA and IA-enabled IT products incorporated into DoD information systems shall be configured in accordance with DoD-approved security configuration guidelines and tasks DISA to develop and provide security configuration guidance for IA and IA-enabled IT products in coordination with Director, NSA. 5 Terms and Terminology DoD IA Controls The Department of Defense Information Assurance (IA) program establishes a baseline set of controls to be applied to all DoD information systems. Each control is uniquely named and can be referenced, measured, and reported against throughout the life cycle of a DoD information system. Security Readiness Review (SRR) The audit performed at designated sites to review compliance with the DISA STIGs. SRRAUDIT The name assigned to the SSR audit process to validate compliance with the DISA STIGs. DHS Department of Homeland Security 6 Page 3
4 Terms and Terminology Checks A specific vulnerability test or configuration control. Each Check gets its first few characters from the category of checks it is in. For example, ACP00282 Access Control Program (ACP) Checklist Refers to the list of checks that are to be performed as part of the SRR Checklist Result Outcome of a check - Open, Not A Finding, Not Reviewed, Not Applicable Finding Severities Category I - Vulnerabilities that allow an attacker immediate access into a machine, allow superuser access, or bypass a firewall. Category II - Vulnerabilities that provide information that have a high potential of giving access to an intruder. Category III - Vulnerabilities that provide information that potentially could lead to compromise. 7 Terms and Terminology NCP National Checklist Program (Part of the NVD) NVD National Vulnerability Database (hosted by NIST and DHS) Vulid XCCDF Vulnerability Identification extensible Configuration Checklist Description Format SCAP Security Content Automation Protocol OMB Office of Management and Budget 8 Page 4
5 History of the STIGS 2010 Vanguard Integrity Professionals, Inc. 9 History of the STIGS DOD issues Directive (OCT 2002) Its purpose is to establish policy and assign responsibilities in order to achieve Department of Defense (DoD) information assurance (IA). DISA created the STIGS in response to DoD The term STIGS was coined by DISA who creates configuration documents in support of the United States Department of Defense (DoD). The implementation guidelines include recommended administrative processes and span over the lifecycle of the device. 10 Page 5
6 History of the STIGS NIST Publishes Security Configuration Controls. They do not include mainframe configuration controls. NIST controls lead to the SCAP standard. NIST Co-hosts with DHS a security configuration checklist at the NVD. NIST rev 3 included security controls in its catalog for both national security and non-national security systems. 11 History of the STIGS DISA converts STIGS to SCAP format DISA converts the STIGS to XCCDF format, the first step toward SCAP. SP NIST adopts STIGS The NVD now contains checklist for the mainframe in the NCP. OMB mandate If NIST has a standard, all Federal agencies and all contractors processing data for a federal agency must conform to those standards. 12 Page 6
7 History of the STIGS Version 4, Release 1.3, Feb Version 4, Release 1.4, Oct Version 4, Release 1.5, July 2005 Version 5, Release 1.1, April 2006 Version 5, Release 2.1, Nov Version 5, Release 2.2, March 2007 Version 5, Release 2.3, May 2007 Version 5, Release 2.6, Nov Version 5, Release 2.10, Dec History of the STIGS Version The last release of the STIG Guideline (1000 page booklet that contained all the rationale behind the configuration control). Version 6.1 This release and all subsequent released as SRR checklists only. Version 6.2 XCCDF expressed checklist in line with Security Content Automation Protocol (SCAP). NIST Version 6.14 Released on Jan 25, 2013 is the current release. 14 Page 7
8 Categories of STIG Checks 2010 Vanguard Integrity Professionals, Inc. 15 Categories of STIG Checks z/os Data Analysis (AAMV) Security Server (RACF) Data Analysis (ACP, RACF) CA-1 (Tape Management System) Data Analysis (ZCA1) CICS Data Analysis (ZCIC) CL/Supersession Data Analysis (ZCLS) DBMS Data Analysis (ZDBM) Front End Processor Data Analysis (ZFEP) IBM Communications Server Data Analysis (IFTP,ISLG,ITCP,ITNT,IUTN) Integrated Cryptographic Services Facility (ZICS) Integrated Database Management System (IDMS) Data Analysis (ZIDM) BMC Control-D, Control M, Control-O and IOA checks (ZCDT, ZCDM, CA Auditor checks (ZADT) JES2 Data Analysis (ZJES) NC-Pass Data Analysis (ZNCP) 16 ZCDO,ZIOA) Page 8
9 Categories of STIG Checks SDSF Data Analysis (ZISF) DFSMS Data Analysis (ZSMS) TSO Data Analysis (ZTSO) UNIX System Services Data Analysis (ZUSS) VTAM Data Analysis (ZVTM) WebSphere Application Server for z/os Analysis (ZWAS) WebSphere MQSeries for z/os Analysis (ZWMQ) Hardware Configuration Definition (ZHCD) Tivoli Asset Discovery (ZTAD) Catalog Solutions (ZCSL) Roscoe (ZROS) SRR Audit (ZSRR) Transparent Data Migration Facility Data Analysis (ZTDM) NetView Data Analysis (ZNET) Vanguard Security Solutions (ZVSS) 17 Categories of STIG Checks CA Common Services (ZCCS) CA MIM (ZMIM) CA VTAPE (ZVTA) Compuware Abend-AID (ZAID) IBM CSSMTP (ZSMT) IBM Health Checker (ZHCK) IBM SDSF (SDSF) QWEST NC-PASS (ZNCP) 18 Page 9
10 Individual STIGS 2010 Vanguard Integrity Professionals, Inc. 19 OS/390 & z/os Data Analysis (AAMV) AAMV0010 A CMP (Change Management Process) is not being utilized on this system AAMV0012 Unsupported system software is installed and active on the system AAMV0014 Site does not have a formal migration plan for removing or upgrading OS systems software prior to the date the vendor drops security patch support AAMV0016 The IAO or Site does not subscribe to the DOD-CERT/VCTS (Vulnerability Compliance Tracking System) bulletin mailing list. AAMV0018 Site does not maintain documented procedures to apply security related software patches to their system and does not maintain a log of when these patches were applied AAMV0030 LNKAUTH=APFTAB is not specified in the IEASYSxx member(s) in the currently active parmlib data set(s). AAMV0040 Inaccessible APF libraries defined AAMV0050 Duplicated sensitive utilities and/or programs exist in APF libraries AAMV0160 Inapplicable PPT entries have not been invalidated AAMV0325 Non-existent or inaccessible Link Pack Area (LPA) libraries AAMV0350 Non-existent or inaccessible LINKLIST libraries AAMV0370 Non-standard SMF data collection options specified AAMV0380 Required SMF data record types not being collected AAMV0400 An automated process is not in place to collect and retain SMF data AAMV0410 ACP database is not on a separate physical volume from its backup and recovery datasets. AAMV0420 ACP database is not backed up on a scheduled basis documented correctly 20 Page 10
11 OS/390 & z/os Data Analysis (AAMV) AAMV0430 System DASD backups are not performed on a regularly scheduled basis AAMV0440 PASSWORD data set and OS passwords are utilized AAMV0450 System programs (e.g., exits, SVCs, etc.) are in use without DAA approval and/or are not documented correctly AAMV0500 Sensitive and critical system data sets exist on shared DASD 21 Security Server Data Analysis (ACP) ACP00010 SYS1.PARMLIB is not limited to only system programmers. ACP00020 Access to SYS1.LINKLIB is not properly protected ACP00030 Update and Allocate access to SYS1.SVCLIB is not limited to system programmers only ACP00040 Update and allocate access to SYS1.IMAGELIB is not limited to system programmers only. ACP00050 Update and allocate access to SYS1.LPALIB is not limited to system programmers only ACP00060 Update and allocate access to all APF authorized libraries are not limited to system programmers only ACP00070 Update and allocate access to all LPA libraries are not limited to system programmers only. ACP00080 Update and allocate access to SYS1.NUCLEUS is not limited to system programmers only. ACP00100 Update and allocate access to libraries that contain PPT modules are not limited to system programmers only ACP00110 Update and allocate access to LINKLIST libraries are not limited to system programmers only ACP00120 Update and allocate access to ACP files and/or databases are not limited to system programmers and/or security personnel ACP00130 Access Greater than Read to the System Master Catalog is not limited to system programmers only. ACP00135 Allocate access to system user catalogs are not limited to system programmers only. ACP00140 Update and allocate access to all system-level product installation libraries are not limited to system programmers only 22 Page 11
12 Security Server Data Analysis (ACP) ACP00150 Update and allocate access to the JES2 System data sets (e.g., Spool, Checkpoint, and Initialization parameters) are not limited to system programmers only ACP00170 Allocate access to SYS1.UADS is not limited to system programmers only and read and update access is not limited to system programmer personnel and/or security personnel ACP00180 Update and allocate access to SMF collection files (i.e., SYS1.MANx) are not limited to system programmers and/or batch jobs that perform SMF dump processing. ACP00190 Update and allocate access to data sets used to backup and/or dump SMF collection files are not limited to system programmers and/or batch jobs that perform SMF dump processing. ACP00200 Access to SYSTEM DUMP data sets are not limited to system programmers only ACP00210 Update and allocate access to System backup files are not limited to system programmers and/or batch jobs that perform DASD backups. ACP00220 Access to SYS(x) TRACE is not limited to system programmers only ACP00230 Access to System page data sets (i.e., PLPA, COMMON, and LOCALx) are not limited to system programmers. ACP00240 Update and allocate access to Libraries containing EXIT modules are not limited to system programmers only ACP00250 Update and alter access to all system proclib datasets are limited to system programmers only ACP00260 Memory and privileged program dumps are not protected in accordance with proper security requirements ACP00270 Dynamic lists are not protected in accordance with proper security requirements. 23 Security Server Data Analysis (ACP) ACP00282 z/os system commands are improperly protected. ACP00291 The system programmer will ensure that the CONSOLxx members are properly configured. ACP00292 MCS consoles userid(s) are improperly protected ACP00293 MCS consoles access authorization(s) for CONSOLE resource(s) is (are) improperly protected. ACP00294 Users that have access to the CONSOLE resource in the TSOAUTH resource class are not properly defined ACP00320 The ACP audit logs are not reviewed on a regular basis ACP00330 User accounts defined to the ACP do not uniquely identify system users ACP00340 z/os Baseline reports are not reviewed and validated to ensure only authorized changes have been made within the z/os operating system. This is a current DISA requirement for change management to system libraries. ACP00350 IEASYMUP resource will be protected in accordance with proper security requirements 24 Page 12
13 Security Server Data Analysis (RACF) RACF0244 FACILITY resource class is inactive RACF0246 The OPERCMDS resource class is not active. RACF0248 MCS consoles are not active RACF0250 The Automatic Data Set Protection (ADSP) SETROPTS value is not set to NOADSP RACF0260 The AUDIT SETROPTS value is improperly set. RACF0270 The CLASSACT SETROPTS has not been specified for the DATASET, USER, and GROUP Classes. RACF0280 The CMDVIOL SETROPTS value is not set to CMDVIOL RACF0290 The EGN SETROPTS value specified is not set to EGN RACF0300 The ERASE ALL SETROPTS value is not set to ERASE() on unclassified systems and ERASE(ALL) on Classified systems RACF0310 The GENCMD SETROPTS value is not enabled for ACTIVE classes RACF0320 The GENERIC SETROPTS value is not enabled for ACTIVE classes RACF0330 The TERMINAL SETROPTS value is not set to READ RACF0350 The GRPLIST SETROPTS value is not set to ACTIVE RACF0360 The INACTIVE SETROPTS value is not set to 35 days RACF0370 The INITSTATS SETROPTS value is not set to INITSTATS. RACF0380 The JES(BATCHALLRACF) SETROPTS value is not set to JES(BATCHALLRACF) RACF0400 The JES(XBMALLRACF) SETROPTS value is not set to JES(XBMALLRACF). RACF0420 The OPERAUDIT SETROPTS value is not set to OPERAUDIT. RACF0430 The PASSWORD(HISTORY) SETROPTS value is not set to 10 RACF0440 The PASSWORD(INTERVAL) SETROPTS value is not set to 60 days 25 Security Server Data Analysis (RACF) RACF0450 The PASSWORD(REVOKE) SETROPTS value specified is not in accordance with security requirements RACF0460 The PASSWORD(RULEn) SETROPTS value(s) specified is/are improperly set RACF0470 The PASSWORD(WARNING) SETROPTS value is improperly set RACF0480 The PROTECTALL SETROPTS value specified is improperly set RACF0490 The REALDSN SETROPTS value specified is improperly set RACF0500 The RETPD SETROPTS value specified is improperly set RACF0510 The RVARYPW SETROPTS value specified is improperly set RACF0520 The SAUDIT SETROPTS value specified is improperly set RACF0530 The SECLEVELAUDIT SETROPTS value specified is improperly set RACF0550 The TAPEDSN SETROPTS value specified is improperly set RACF0560 The WHEN(PROGRAM) SETROPTS value specified is not active RACF0570 RACF users do not have the required default fields RACF0580 There are interactive USERIDs defined to RACF that do not have the required fields completed RACF0590 RACF batch jobs are improperly secured RACF0595 Batch jobs are improperly defined RACF0600 RACF batch jobs are not protected with propagation control RACF0620 Started Tasks are not properly identified to RACF RACF0650 Started Tasks are improperly defined to RACF. RACF0660 There are started tasks defined to RACF with the trusted attribute that are not justified. 26 Page 13
14 Security Server Data Analysis (RACF) RACF0680 Maintenance USERIDs are improperly controlled RACF0690 Emergency USERIDs are improperly defined. RACF0710 The use of the RACF SPECIAL Attribute is not justified RACF0720 Assignment of the RACF OPERATIONS attribute to individual userids is not fully justified RACF0730 The use of the RACF AUDITOR privilege is not justified RACF0740 The number of USERIDs possessing the Tape Bypass Label Processing (BLP) privilege is not justified RACF0760 DASD Volume level protection does not exist or is improperly defined RACF0770 Access to sensitive utilities is not properly protected by RACF 27 CA-1 (Tape Management System) Data Analysis (ZCA1) ZCA10041 CA 1 Tape Management system password will be changed from the default. ZCA10060 CA 1 Tape Management exits when in use will be reviewed and/or approved. ZCA1R000 CA 1 Tape Management installation data sets will be properly protected ZCA1R003 CA 1 Tape Management TMC, AUDIT and optional RDS and VPD data sets will be properly protected ZCA1R020 CA 1 Tape Management command resources will be properly defined and protected. ZCA1R021 CA 1 Tape Management function and password resources will be properly defined and protected ZCA1R030 CA 1 Tape Management Started Task name will be properly identified and/or defined to the system ACP. ZCA1R032 CA 1 Tape Management Started task will be properly defined to the STARTED resource class for RACF. ZCA1R038 CA 1 Tape Management Resource Class will be defined or active in the ACP. ZCA1R040 CA 1 Tape Management external security options will be specified properly 28 Page 14
15 DBMS Data Analysis (ZDBM) ZDBM0010 Database management systems do not interface with the access control product to perform identification and authentication 29 Fast Dump Restore Data Analysis (ZFDR) ZFDR0000 Fast Dump Restore (FDR) install data sets are not properly protected. ZFDR0040 FDR (Fast Dump Restore) security options are improperly specified. 30 Page 15
16 CICS Data Analysis (ZCIC) ZCIC0010 CICS system data sets are not properly protected ZCIC0020 Sensitive CICS transactions are not protected in accordance with security requirements. ZCIC0030 CICS System Initialization Table (SIT) parameter values are not specified in accordance with proper security requirements ZCIC0040 CICS region logonid(s) are not defined and/or controlled in accordance with the security requirements ZCIC0041 CICS default logonid(s) are not defined and/or controlled in accordance with the security requirements ZCIC0042 CICS logonid(s) do not have time-out limit set to 15 minutes ZCICR021 External RACF Classes are not active for CICS transaction checking ZCICR021 IBM CICS Transaction Server SPI command resources will be properly defined and protected. ZCICR041 CICS regions are improperly protected to prevent unauthorized propagation of the region userid 31 Front End Processor (FEP) Data Analysis (ZFEP) ZFEP0011 All hardware components of the FEPs are not placed in secure locations where they cannot be stolen, damaged, or disturbed ZFEP0012 Procedures are not in place to restrict access to FEP functions of the service subsystem from operator consoles (local and/or remote), and to restrict access to the diskette drive of the service subsystem. ZFEP0013 A documented procedure is not available instructing how to load and dump the FEP NCP (Network Control Program ZFEP0014 An active log is not available to keep track of all hardware upgrades and software changes made to the FEP (Front End Processor ZFEP0015 NCP Dataset Analysis ZFEP0015 NCP (Net Work Control Program) Data set access authorization does not restricts UPDATE and/or ALLOCATE access to appropriate personnel ZFEP0016 A password control is not in place to restrict access to the service subsystem via the operator consoles (local and/or remote) and a key-lock switch is not used to protect the modem supporting the remote console of the service subsystem. 32 Page 16
17 Hardware Configuration Definition (ZHCD) ZHCDR000 IBM Hardware Configuration Definition (HCD) install data sets are not properly protected. ZHCDR002 IBM Hardware Configuration Definition (HCD) User data sets are not properly protected. ZHCDR020 IBM Hardware Configuration Definition (HCD) resources are not properly defined and protected. 33 IBM Communications Server Data (IFTP) IFTP0010 The FTP Server daemon is not defined with proper security parameters IFTP0020 The startup parameters for the FTP include the ANONYMOUS, ANONYMOUS=, or INACTIVE keywords. The FTP daemon s started task JCL does not specify the SYSTCPD and SYSFTPD DD statements for configuration files. IFTP0030 FTP.DATA configuration statements for the FTP Server are not specified in accordance with requirements IFTP0040 User exits for the FTP Server are in use without proper approval or proper documentation IFTP0050 The warning banner for the FTP Server is not specified properly IFTP0060 SMF recording options for the FTP Server are not configured to write SMF records for all eligible events IFTP0070 The permission bits and user audit bits for HFS objects that are part of the FTP Server component are not properly configured IFTP0080 Configuration Files Access and Audit IFTP0080 MVS data sets for the FTP Server are not properly protected. IFTP0090 The TFTP Server program is not properly protected IFTP0100 FTP / Telnet unencrypted transmissions require Acknowledgement of Risk Letter (AORL) IFTP0110 FTP Control cards will be properly stored in a secure PDS file. 34 Page 17
18 IBM Communications Server Data (ISLG) ISLG0010 The Syslog daemon is not started at z/os initialization. ISLG0020 The Syslog daemon is improperly defined and secured ISLG0030 The permission bits and user audit bits for HFS objects that are part of the Syslog daemon component are not configured properly 35 IBM Communications Server Data (ITCP) ITCP0010 Configuration files for the TCP/IP stack are not properly specified. ITCP0020 TCPIP.DATA configuration statements for the TCP/IP stack are not properly specified. ITCP0025 The hosts identified by the NSINTERADDR statement are not properly protected. ITCP0030 PROFILE.TCPIP configuration statements for the TCP/IP stack are not coded properly. ITCP0040 The permission bits and user audit bits for HFS objects that are part of the Base TCP/IP component are not configured properly ITCP0050 Resources for the Base TCP/IP component are improperly protected. ITCP0060 Started tasks for the Base TCP/IP component are not defined in accordance with security requirements TCP0070 MVS data sets for the Base TCP/IP component are not properly protected 36 Page 18
19 IBM Communications Server Data (ITNT) ITNT0010 PROFILE.TCPIP configuration statements for the TN3270 Telnet Server are not properly specified. ITNT0020 VTAM session setup controls for the TN3270 Telnet Server are not properly specified ITNT0030 The warning banner for the TN3270 Telnet Server is not specified or properly specified. ITNT0040 The use of Digital Certificates is not implemented in accordance with security requirements ITNT0050 SSL encryption options for the TN3270 Telnet Server are not specified or specified properly for each statement that defines a SECUREPORT ITNT0060 SMF recording options for the TN3270 Telnet Server are not properly specified 37 IBM Communications Server Data (IUTN) IUTN0010 The startup user account for the z/os UNIX Telnet Server is not defined properly IUTN0020 Startup parameters for the z/os UNIX Telnet Server are not specified properly IUTN0030 The warning banner for the z/os UNIX Telnet Server is not specified or not properly specified. IUTN0040 HFS objects for the z/os UNIX Telnet Server are not properly protected 38 Page 19
20 Integrated Cryptographic Services Facility (ZICS) ZICSR000 IBM Integrated Crypto Service Facility (ICSF) install data sets are not properly protected. ZICSR001 IBM Integrated Crypto Service Facility (ICSF) STC data sets are not properly protected. ZICSR030 IBM Integrated Crypto Service Facility (ICSF) Started Task name is not properly identified / defined to the system ACP. ZICSR032 IBM Integrated Crypto Service Facility (ICSF) Started task is not properly defined to the STARTED resource class for RACF. 39 Integrated Database Management System (ZIDM) ZIDM0010 IDMS is not using external security and/or the resource class is not configured properly to the IDMS-CV ZIDM0014 Each IDMS CV is not uniquely defined to the ACP IDMS resource class ZIDM0020 IDMS data set access authorization does not restricts UPDATE and/or ALLOCATE access to systems programming personnel ZIDM0030 IDMS regions (central versions) STC and or batch jobs are not defined in accordance with the proper security requirements ZIDM0032 IDMS regions (central versions) Userids/ACIDs are not defined to the PROPCNTL resource class 40 Page 20
21 BMC IOA for RACF STIG (ZIOA) ZIOAR000 BMC IOA installation data sets will be properly protected ZIOAR001 BMC IOA STC data sets will be properly protected. ZIOAR002 BMC IOA User data sets will be properly protected ZIOAR020 BMC IOA resources will be properly defined and protected. ZIOAR030 BMC IOA Started Task name is not properly identified / defined to the system ACP. ZIOAR032 BMC IOA Started task(s) must be properly defined to the STARTED resource class for RACF ZIOAR040 BMC IOA configuration/parameter values are not specified properly. ZIOA0060 BMC IOA security exits are not installed or configured properly 41 BMC CONTROL-D for RACF STIG (ZCDT) ZCTD0040 BMC CONTROL-D configuration/parameter values are not specified properly ZCTD0060 BMC CONTROL-D security exits are not installed or configured properly ZCTDR000 BMC CONTROL-D installation data sets are not properly protected ZCTDR001 BMC CONTROL-D STC data sets are not properly protected ZCTDR002 BMC CONTROL-D User data sets are not properly protected ZCTDR020 BMC CONTROL-D resources are not properly defined and protected ZCTDR030 BMC CONTROL-D Started Task name is not properly identified / defined to the system ACP ZCTDR032 BMC CONTROL-D Started task is not properly defined to the STARTED resource class for RACF. 42 Page 21
22 BMC CONTROL-O for RACF STIG (ZCTO) ZCTO0040 BMC CONTROL-O configuration/parameter values are not specified properly. ZCTO0041 BMC CONTROL-O configuration/parameter values are not specified properly. ZCTO0060 BMC CONTROL-O security exits are not installed or configured properly ZCTOR000 BMC CONTROL-O installation data sets are not properly protected ZCTOR001 BMC CONTROL-O STC data sets are not properly protected ZCTOR020 BMC CONTROL-O resources are not properly defined and protected. ZCTOR030 BMC CONTROL-O Started Task name is not properly identified / defined to the system ACP. ZCTOR032 BMC CONTROL-O Started task is not properly defined to the STARTED resource class for RACF. 43 BMC CONTROL-M for RACF STIG (ZCTM) ZCTM0060 BMC CONTROL-M security exits are not installed or configured properly. ZCTMR000 BMC CONTROL-M installation data sets are not properly protected. ZCTMR001 BMC CONTROL-M STC data sets are not properly protected. ZCTMR002 BMC CONTROL-M User data sets are not properly protected. ZCTMR003 BMC CONTROL-M User/Application JCL data sets are not properly protected ZCTMR020 BMC C0NTROL-M resources are not properly defined and protected. ZCTMR030 BMC CONTROL-M Started Task name is not properly identified / defined to the system ACP. ZCTMR032 BMC CONTROL-M Started task is not properly defined to the STARTED resource class for RACF. ZCTMR040 BMC CONTROL-M configuration/parameter values are not specified properly 44 Page 22
23 z/os BMC CONTROL-M/Restart for RACF (ZCTR) ZCTRR000 BMC CONTROL-M/Restart installation data sets are not properly protected. ZCTRR002 BMC CONTROL-M/Restart Archived Sysout data sets are not properly protected. 45 z/os CA Auditor for RACF STIG (ZADT) ZADTR000 CA Auditor installation data sets are not properly protected. ZADTR002 CA Auditor User data sets are not properly protected ZADTR020 CA Auditor resources are not properly defined and protected 46 Page 23
24 JES2 Data Analysis (ZJES) ZJES0011 RJE workstations and NJE nodes are not controlled in accordance with security requirements. ZJES0012 NJE nodes are not controlled in accordance with security requirements ZJES0014 RJE workstations and NJE nodes are not controlled in accordance with STIG requirements. ZJES0021 JES2 input sources are not controlled in accordance with the proper security requirements. ZJES0022 JES2 input sources are not properly controlled. ZJES0031 JES2 output devices are not controlled in accordance with the proper security requirements. ZJES0032 JES2 output devices are not properly controlled. ZJES0041 JESSPOOL resources are not protected in accordance with security requirements. ZJES0042 JESNEWS resources are not protected in accordance with security requirements. ZJES0044 JESTRACE and/or SYSLOG resources are not protected in accordance with security requirements. ZJES0046 JES2 spool resources are not controlled in accordance with security requirements. ZJES0052 JES2 system commands are not protected in accordance with security requirements. ZJES0060 Surrogate users are not controlled in accordance with proper security requirements. 47 NC-Pass Data Analysis (ZNCP) ZNCPR000 Quest NC-Pass installation data sets will be properly protected. ZNCPR001 Quest NC-Pass STC data sets will be properly protected. ZNCPR020 Quest NC-Pass will be used by Highly-Sensitive users. ZNCPR030 Quest NC-Pass Started Task name will be properly identified and/or defined to the system ACP. ZNCPR032 Quest NC-Pass Started task will be properly defined to the STARTED resource class for RACF. 48 Page 24
25 SDSF Data Analysis (ZISF) ZISF0005 SDSF product data sets do not restrict all update and alter access to systems programming personnel. ZISFR000 IBM System Display and Search Facility (SDSF) installation data sets will be properly protected ZISFR002 IBM System Display and Search Facility (SDSF) HASPINDX data set identified in the INDEX parameter must be properly protected. ZISFR020 IBM System Display and Search Facility (SDSF) resources will be properly defined and protected. ZISFR021 IBM System Display and Search Facility (SDSF) resources will be properly defined and protected. ZISFR030 IBM System Display and Search Facility (SDSF) Started Task name will be properly identified and/or defined to the system ACP. ZISFR032 IBM System Display and Search Facility (SDSF) Started task will be properly defined to the STARTED resource class for RACF. ZISFR038 IBM System Display and Search Facility (SDSF) Resource Class will be active in the RACF. ZISF0040 IBM System Display and Search Facility (SDSF) Configuration parameters will be correctly specified. 49 DFSMS Data Analysis (ZSMS) & Time Sharing Option (ZTSO) ZSMSR008 Active and Raclisted Classes Analysis ZSMS0010 DFSMS STGADMIN Class resources are not protected in accordance with security requirements ZSMS0012 DFSMS DGT resource in the PROGRAM resource class is not protected in accordance with security requirements ZSMS0014 DFSMS DFP Resource Ownership is not configured in accordance with security requirements ZSMS0020 DFSMS control data sets are not protected in accordance with security requirements ZSMS0022 DFSMS control data sets are not properly protected. ZSMS0030 SYS(x).Parmlib(IEFSSNxx) SMS configuration parameter settings are not properly specified ZSMS0032 SYS(x).PARMLIB(IGDSMSxx), SMS parameter settings are not properly specified ZTSO0020 ZTSO0030 There are LOGONIDs defined to SYS1.UADS for non-emergency use Unauthorized users possess access to the resource TSOAUTH 50 Page 25
26 UNIX System Services Data Analysis (ZUSS) ZUSS0011 z/os UNIX OMVS parameters in PARMLIB are not properly specified. ZUSS0012 z/os UNIX BPXPRMxx security parameters in PARMLIB are not properly specified. ZUSS0013 z/os UNIX HFS MapName files security parameters are not properly specified ZUSS0014 z/os UNIX security parameters for restricted network service(s) in /etc/inetd.conf are not properly specified. ZUSS0015 z/os UNIX security parameters in etc/profile are not properly specified ZUSS0016 z/os UNIX security parameters in /etc/rc not properly specified ZUSS0021 BPX resource(s) is (are) not protected in accordance with security requirements. ZUSS0022 z/os UNIX resources are not protected in accordance with security requirements. ZUSS0023 z/os UNIX SUPERUSER resource is not protected in accordance with guidelines ZUSS0031 z/os UNIX MVS data sets or HFS objects are not properly protected ZUSS0032 z/os UNIX MVS data sets WITH z/os UNIX COMPONENTS are not properly protected ZUSS0033 z/os UNIX MVS data sets used as step libraries in /etc/steplib are not properly protected ZUSS0034 z/os UNIX HFS permission bits and audit bits for each directory are not properly protected or specified. ZUSS0035 z/os UNIX SYSTEM FILE SECURITY SETTINGS are not properly protected or specified. ZUSS0036 z/os UNIX MVS HFS directory(s) with "other" write permission bit set are not properly defined. ZUSS0041 Attributes of z/os UNIX user accounts are not defined properly ZUSS0042 z/os UNIX each group is not defined with a unique GID. 51 UNIX System Services Data Analysis (ZUSS) (continued) ZUSS0043 The user account for the z/os UNIX kernel (OMVS) is not properly defined to the security database. ZUSS0044 The user account for the z/os UNIX BPXROOT is not properly defined. ZUSS0045 The user account for the z/os UNIX (RMFGAT ) is not properly defined. ZUSS0046 UID(0) is improperly assigned. ZUSS0047 z/os UNIX user accounts are not properly defined. ZUSS0048 Attributes of z/os UNIX user accounts are not defined in accordance with security requirements. ZUSSR050 The z/os Default Userid is not properly defined with the corresponding FACILITY Class Profile. ZUSSR060 The RACF Classes required to properly security the z/os UNIX environment are not ACTIVE. ZUSSR070 RACF Classes required to support z/os UNIX security are not properly implemented with the SETROPTS RACLIST command. ZUSS0080 z/os USS Software owning Shared accounts do not meet strict security and creation restrictions. 52 Page 26
27 VTAM Data Analysis (ZVTM) and CA VTAPE ZVTM0011 The VTAM USSTAB definitions are being used for unsecured terminals ZVTM0018 The System datasets used to support the VTAM network are not properly secured ZVTAR000 CA VTAPE installation data sets are not properly protected. ZVTAR001 CA VTAPE STC data sets will be properly protected. ZVTAR030 CA VTAPE Started Task name is not properly identified/defined to the system ACP. ZVTAR032 CA VTAPE Started task(s) must be properly defined to the STARTED resource class for RACF. 53 WebSphere MQSeries for z/os Analysis (ZWMQ) ZWMQ0011 WebSphere MQ channel security is not implemented in accordance with security requirements. ZWMQ0012 WebSphere MQ channel security is not implemented in accordance with security requirements ZWMQ0014 Production WebSphere MQ Remotes will utilize Certified Name Filters (CNF). ZWMQ0020 User timeout parameter values for WebSphere MQ queue managers are not specified in accordance with security requirements. ZWMQ0030 WebSphere MQ started tasks are not defined in accordance with the proper security requirements ZWMQ0040 WebSphere MQ all update and alter access to MQSeries/WebSphere MQ product and system data sets are not properly restricted ZWMQ0049 WebSphere MQ resource classes are not properly actived for security checking by the ACP. ZWMQ0051 WebSphere MQ "switch" profiles are improperly defined to the MQADMIN class. ZWMQ0052 WebSphere MQ MQCONN Class (Connection) resource definitions are not protected in accordance with security. ZWMQ0053 WebSphere MQ dead letter and alias dead letter queues are not properly defined. ZWMQ0054 WebSphere MQ MQQUEUE (Queue) resource profiles defined to the MQQUEUE class are not protected in accordance with security requirements. ZWMQ0055 WebSphere MQ Process resource profiles defined in the MQPROC Class are not protected in accordance with security requirements. 54 Page 27
28 WebSphere MQSeries for z/os Analysis (ZWMQ) ZWMQ0056 WebSphere MQ Namelist resource profiles defined in the MQNLIST Class are not protected in accordance with security requirements. ZWMQ0057 WebSphere MQ Alternate User resources defined to MQADMIN resource class are not protected in accordance with security requirements. ZWMQ0058 WebSphere MQ context resources defined to the MQADMIN resource class are not protected in accordance with security requirements. ZWMQ0059 WebSphere MQ command resources defined to MQCMDS resource class are not protected in accordance with security requirements. ZWMQ0060 WebSphere MQ RESLEVEL resources in the MQADMIN resource class are not protected in accordance with security requirements. 55 WebSphere (ZWAS) ZWAS0010 MVS data sets for the WebSphere Application Server are not protected in accordance with the proper security requirements ZWAS0020 HFS objects for the WebSphere Application Server are not protected in accordance with the proper security requirements. ZWAS0030 The CBIND Resource Class for the WebSphere Application Server is not configured in accordance with security requirements ZWAS0040 Vendor-supplied user accounts for the WebSphere Application Server are defined to the ACP ZWAS0050 The WebSphere Application Server plug-in is not specified in accordance with the proper security requirements. 56 Page 28
29 Tivoli Asset Discovery (ZTAD) ZTADR000 Tivoli Asset Discovery for z/os (TADz) Install data sets are not properly protected. ZTADR001 Tivoli Asset Discovery for zos (TADz) STC and/or batch data sets are not properly protected. ZTADR030 Tivoli Asset Discovery for z/os (TADz) Started Task name(s) is not properly identified / defined to the system ACP ZTADR032 The Tivoli Asset Discovery for zos (TADz) Started task is not properly defined to the STARTED resource class for RACF 57 Catalog Solutions (ZCSL) ZCSLR000 Catalog Solutions Install data sets are not properly protected. ZCSLR020 Catalog Solutions resources are not properly defined and protected. 58 Page 29
30 ROSCOE (ZROS) ZROSR000 ROSCOE Install data sets are not properly protected. ZROSR001 ROSCOE STC data sets are not properly protected. ZROSR020 ROSCOE resources are not properly defined and protected. ZROSR030 ROSCOE Started Task name is not properly identified / defined to the system ACP. ZROSR032 The ROSCOE Started task is not properly defined to the STARTED resource class for RACF ZROSR038 The Product's Resource Class for Roscoe is not defined or active in the ACP. ZROSR040 Product configuration/parameter values are not specified properly. 59 SRR Audit (ZSRR) ZSRRR000 SRRAUDIT Install data sets are not properly protected. ZSRRR002 SRRAUDIT User data sets are not properly protected. 60 Page 30
31 Transparent Data Migration Facility (TDMF) ZTDMR000 Transparent Data Migration Facility (TDMF) Install data sets are not properly protected. ZTDM0040 Transparent Data Migration Facility (TDMF) configuration/parameter/option values are not specified properly. 61 NetView (ZNET) ZNET0040 NetView configuration/parameter values are not specified properly. ZNETR000 NetView install data sets are not properly protected. ZNETR001 NetView STC data sets are not properly protected. ZNETR030 NetView Started Task name(s) is not properly identified / defined to the system ACP. ZNETR032 NetView Started Task name(s) is not properly identified / defined to the system ACP. 62 Page 31
32 Vanguard Security Solutions (ZVSS) ZVSSR000 Vanguard Security Solutions (VSS) Install data sets are not properly protected. ZVSSR002 Vanguard Security Solutions (VSS) User data sets are not properly protected. ZVSSR020 Vanguard Security Solutions' resources for the FACILITY resource class are not properly defined and protected. 63 IBM Health Checker (ZHCK) and IBM CSSMTP ZHCKR001 IBM Health Checker STC data sets will be properly protected. ZHCKR030 IBM Health Checker Started Task name will be properly identified and/or defined to the system ACP. ZHCKR032 IBM Health Checker Started task will be properly defined to the STARTED resource class for RACF. ZSMTR030 IBM CSSMTP Started Task name is not properly identified and/or defined to the system ACP. ZSMTR032 IBM CSSMTP Started task(s) must be properly defined to the STARTED resource class for RACF. 64 Page 32
33 Anatomy of a STIG Check 2010 Vanguard Integrity Professionals, Inc. 65 Anatomy of a STIG Group ID (Vulid): V-3895 Group Title: ZSMS0020 Rule ID: SV-7357r1_rule Severity: CAT II Rule Version (STIG-ID): ZSMS0020 Rule Title: DFSMS control data sets are not protected in accordance with security requirements Vulnerability Discussion: DFSMS control data sets provide the configuration and operational characteristics of the system-managed storage environment. Failure to properly protect these data sets may result in unauthorized access. This exposure could compromise the availability and integrity of some system services and customer data. Responsibility: Information Assurance Officer IAControls: DCCS-1, DCCS-2, ECCD-1, ECCD 66 Page 33
34 Anatomy of a STIG Check Content: Review the logical parmlib data sets, example: SYS1.PARMLIB(IGDSMSxx), to identify the fully qualified file names for the following SMS data sets: Source Control Data Set (SCDS) Active Control Data Set (ACDS) Communications Data Set (COMMDS) ACDS Backup Automatic Class Selection Routine Source Data Sets (ACS) COMMDS Backup If the RACF data set rules for the SCDS, ACDS, COMMDS, and ACS data sets restrict UPDATE and ALTER access to only systems programming personnel, there is NO FINDING. If the RACF data set rules for the SCDS, ACDS, COMMDS, and ACS data sets do not restrict UPDATE and ALTER access to only systems programming personnel, this is a FINDING 67 Anatomy of a STIG Fix Text: Review the SYS1.PARMLIB(IGDSMS00) data set to identify the fully qualified file names for the following SMS data sets: Source Control Data Set (SCDS) Active Control Data Set (ACDS) Communications Data Set (COMMDS) Automatic Class Selection Routine Source Data Sets (ACS) ACDS Backup COMMDS Backup The RACF data set rules for the SCDS, ACDS, COMMDS, and ACS data sets must restrict UPDATE and ALTER access to only z/os systems programming personnel. Some example commands to implement the proper controls are shown here: AD 'sys3.dfsms.mmd.commds.**' UACC(NONE) OWNER(SYS3) AUDIT(ALL(READ)) DATA('PROTECTED PER ZSMS0020') PE 'sys3.dfsms.mmd.commds.**' ID(<syspaudt>) ACC(A) 68 Page 34
35 Summary & Questions 2010 Vanguard Integrity Professionals, Inc. 69 Page 35
21 Things You Didn t Used to Know About RACF
21 Things You Didn t Used to Know About RACF (A Technical Update for IT Auditors) Stuart Henderson The Henderson Group (301) 229-7187 1 Here Are 21 Things Auditors Should Know About RACF One Person s Opinion,
RACF & Payment Card Industry (PCI) Data Security Standards RUGONE May 2012
RACF & Payment Card Industry (PCI) Data Security Standards Robert S. Hansel Lead RACF Consultant [email protected] 617 969 9050 Robert S. Hansel Robert S. Hansel is Lead RACF Specialist and founder
How to Secure Mainframe FTP
How to Secure Mainframe FTP Stu Henderson (301) 229-7187 [email protected] Scott Myers (408) 973-8374 [email protected] 1 AGENDA I. Introduction II. III. IV. How Mainframe FTP is Different Mainframe
Agenda. z/os Ethical Hacking Vulnerability Scanning & Pen Testing. Mark Wilson RSM Partners. Session Number: 12275. l Disclaimer.
z/os Ethical Hacking Vulnerability Scanning & Pen Testing Mark Wilson RSM Partners Session Number: 12275 Agenda l Disclaimer l Introduction l Objectives l Mainframe Hacking Fact or Fiction? l Penetration
Utility Mainframe System Administration Training Curriculum
Utility Mainframe System Administration Training Curriculum MVS SYSTEM ADMINISTRATION MVS SYSTEM ADMINISTRATION- LEVEL 1 TO 1.5 Name of the Module Common for All Administration LSO TSO/ISPF JCL & UTILITIES
PREPARED BY: AUDIT PROGRAM Author: Lance M. Turcato. APPROVED BY: Logical Security Operating Systems - Generic. Audit Date:
A SYSTEMS UNDERSTANDING A 1.0 Organization Objective: To ensure that the audit team has a clear understanding of the delineation of responsibilities for system administration and maintenance. A 1.1 Determine
z/os VULNERABILITY SCANNING AND MANAGEMENT Key Resources, Inc. [email protected] (312) KRI-0007 www.kr-inc.com
1 z/os VULNERABILITY SCANNING AND MANAGEMENT Key Resources, Inc. [email protected] (312) KRI-0007 www.kr-inc.com 2 Ray Overby SKK - ACF2 Developer (1981-1988) Key Resources, Inc. incorporated in 1988
CA Auditor for z/os. System Review Checklist. r12. Second Edition
CA Auditor for z/os System Review Checklist r12 Second Edition This documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
Mark Wilson [email protected] Session Details: The Introduction
Everything you wanted to know about mainframe security, pen testing and vulnerability scanning.. But were too afraid to ask! Mark Wilson [email protected] Session Details: The Introduction Agenda Introduction
PRACTICAL TIPS FOR Z/OS VULNERABILITY SCANNING & PROACTIVE SECURITY MANAGEMENT
1 PRACTICAL TIPS FOR Z/OS VULNERABILITY SCANNING & PROACTIVE SECURITY MANAGEMENT Key Resources, Inc. [email protected] (312) KRI-0007 www.kr-in.com 2 Ray Overby SKK - ACF2 Developer (1981-1988) Key
UNCLASSIFIED. Trademark Information
SAMSUNG KNOX ANDROID 1.0 SECURITY TECHNICAL IMPLEMENTATION GUIDE (STIG) OVERVIEW Version 1, Release 1 3 May 2013 Developed by Samsung Electronics Co., Ltd.; Fixmo, Inc.; and General Dynamics C4 Systems,
CA Deliver r11.7. Business value. Product overview. Delivery approach. agility made possible
PRODUCT SHEET CA Deliver agility made possible CA Deliver r11.7 CA Deliver is an online report management system that provides you with tools to manage and reduce the cost of report distribution. Able
z/os Curriculum Job Control Language (JCL) Curriculum JES Curriculum WebSphere Curriculum TSO/ISPF for z/os Curriculum
A relação de cursos de mainfame a seguir representa mais de 1.000 horas de treinamento e-learning, fornecendo uma abordagem ampla e atual sobre o assunto. z/os Curriculum z/os 1.13 Series o z/os Concepts
ESM s management across multi-platforms eliminates the need for various account managers.
DetectIT & Axent s ESM Product Description Axent s Enterprise Security Manager (ESM) provides enterprise-wide, multi-platform management that simplifies and centralizes the administration of security.
Top Ten Security Vulnerabilities in z/os Security
Top Ten Security Vulnerabilities in z/os Security John Hilman Vanguard Professional Services 1 The Issues Is your mainframe critical to your enterprise? Is it central to your Disaster Recover Plan Does
CICS Transactions Measurement with no Pain
CICS Transactions Measurement with no Pain Prepared by Luiz Eduardo Gazola 4bears - Optimize Software, Brazil December 6 10, 2010 Orlando, Florida USA This paper presents a new approach for measuring CICS
What IT Auditors Need to Know About Secure Shell. SSH Communications Security
What IT Auditors Need to Know About Secure Shell SSH Communications Security Agenda Secure Shell Basics Security Risks Compliance Requirements Methods, Tools, Resources What is Secure Shell? A cryptographic
05.0 Application Development
Number 5.0 Policy Owner Information Security and Technology Policy Application Development Effective 01/01/2014 Last Revision 12/30/2013 Department of Innovation and Technology 5. Application Development
z/os 1.8 Erfahrungsbericht
z/os 1.8 Erfahrungsbericht z/os Guide Lahnstein 04.-06.10.2006 GAD eg Installation Migration von z/os 1.7 nach 1.8 ServerPac Installation Umgestellte Images Test-Sysplex (2/2) Entwicklungs-Sysplex (3/4)
Configuring and Tuning SSH/SFTP on z/os
Configuring and Tuning SSH/SFTP on z/os Kirk Wolf / Steve Goetze Dovetailed Technologies [email protected] dovetail.com Monday, March 10, 2014, 1:30PM Session: 14787 www.share.org Session Info/Eval link
z/os Performance Monitoring Tools Shoot-Out: ASG, BMC, CA, Rocket
z/os Performance Monitoring Tools Shoot-Out: ASG, BMC, CA, Rocket Gary Henderson ASG (Allen Systems Group) 1 March 2011, 9:30 AM-10:30 AM Session Number 8695 Installation and Maintenance Installation and
BMC Mainframe Solutions. Optimize the performance, availability and cost of complex z/os environments
BMC Mainframe Solutions Optimize the performance, availability and cost of complex z/os environments If you depend on your mainframe, you can rely on BMC Sof tware. Yesterday. Today. Tomorrow. You can
Best Practices For Department Server and Enterprise System Checklist
Best Practices For Department Server and Enterprise System Checklist INSTRUCTIONS Information Best Practices are guidelines used to ensure an adequate level of protection for Information Technology (IT)
FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE
Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security
Someone may be manipulating information in your organization. - and you may never know about it!
for iseries, version 3.5 Complete Security Suite for iseries (AS/400) TCP/IP and SNA Connectivity Someone may be manipulating information in your organization - and you may never know about it! If your
Computer Associates Unicenter CA-JARS Resource Accounting Software
John Inverso Product Report 1 October 2003 Computer Associates Unicenter CA-JARS Resource Accounting Software Summary CA s Unicenter CA-JARS Resource Accounting suite brings several resource management
Second Edition (May 1984)
5C28-1342-1 File No. 5370-40 Program Product Resource Access Control Facility (RACF) Auditor's Guide Program Number 5740-XXH Version 1, Release 6 ---- - ----- - - - --- -- ------ -. - Second Edition (May
STIGs,, SCAP and Data Metrics
Defense Information Systems Agency A Combat Support Agency STIGs,, SCAP and Data Metrics Roger S. Greenwell, CISSP, CISA, CISM Technical Director / Capabilities Implementation Division DISA Field Security
OS/390 Firewall Technology Overview
OS/390 Firewall Technology Overview Mary Sweat E - Mail: [email protected] Washington System Center OS/390 Firewall/VPN 1 Agenda OS/390 Firewall OS/390 Firewall Features Hardware requirements Software
PCI DSS, z/os and Keeping You from Becoming a News Headline
PCI DSS, z/os and Keeping You from Becoming a News Headline Charles Mills CorreLog, Inc. March 13, 2012 Session #11089 Copyright and Trademarks Copyright 2012 CorreLog, Inc. Trademarks CorreLog is a registered
Writing the Definitive Systems Programmer Resume
Writing the Definitive Systems Programmer Resume Joe Gallaher Systems Programming Consultants, Inc. (SPCI) Monday, March 2, 2015 SHARE Session: 17133 Insert Custom Session QR if Desired. PowerPoint slides:
CA Top Secret r15 for z/os
PRODUCT SHEET: CA TOP SECRET FOR z/os we can CA Top Secret r15 for z/os CA Top Secret for z/os (CA Top Secret ) provides innovative, comprehensive security for your business transaction environments, including
Promoting Application Security within Federal Government. AppSec DC November 13, 2009. The OWASP Foundation http://www.owasp.org
Promoting Application Security within Federal Government AppSec DC November 13, 2009 Dr. Sarbari Gupta, CISSP, CISA Founder/President Electrosoft [email protected] 703-437-9451 ext 12 The Foundation
Health Insurance Portability and Accountability Act Enterprise Compliance Auditing & Reporting ECAR for HIPAA Technical Product Overview Whitepaper
Regulatory Compliance Solutions for Microsoft Windows IT Security Controls Supporting DHS HIPAA Final Security Rules Health Insurance Portability and Accountability Act Enterprise Compliance Auditing &
New SMTP client for sending Internet mail
IBM Software Group Enterprise Networking Solutions z/os V1R11 Communications Server New SMTP client for sending Internet mail z/os Communications Server Development, Raleigh, North Carolina This presentation
Digital Certificate Goody Bags on z/os
Digital Certificate Goody Bags on z/os Ross Cooper, CISSP IBM Corporation RACF/PKI Development Poughkeepsie, NY Email: [email protected] August 6 th, 2012 Session 11623 Agenda What is a Digital Certificate?
Alliance Key Manager A Solution Brief for Technical Implementers
KEY MANAGEMENT Alliance Key Manager A Solution Brief for Technical Implementers Abstract This paper is designed to help technical managers, product managers, and developers understand how Alliance Key
z/os Firewall Technology Overview
z/os Firewall Technology Overview Mary Sweat E - Mail: [email protected] Washington System Center OS/390 Firewall/VPN 1 Firewall Technologies Tools Included with the OS/390 Security Server Configuration
Data Stored on a Windows Server Connected to a Network
Attachment A Form to Describe Sensitive Data Security Plan For the Use of Sensitive Data from The National Longitudinal Study of Adolescent to Adult Health Data Stored on a Windows Server Connected to
modules 1 & 2. Section: Information Security Effective: December 2005 Standard: Server Security Standard Revised: Policy Ref:
SERVER SECURITY STANDARD Security Standards are mandatory security rules applicable to the defined scope with respect to the subject. Overview Scope Purpose Instructions Improperly configured systems,
IBM Crypto Server Management General Information Manual
CSM-1000-0 IBM Crypto Server Management General Information Manual Notices The functions described in this document are IBM property, and can only be used, if they are a part of an agreement with IBM.
CA Auditor for z/os. Technical Reference. r12. Second Edition
CA Auditor for z/os Technical Reference r12 Second Edition This documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
IBM DevOps for Enterprise Systems DevOps for z Systems Is Essential To Deliver Real Business Outcomes
DevOps for z Systems Is Essential To Deliver Real Business Outcomes New IBM DevOps capabilities help enterprises deliver significant improvements to transform your software delivery capability 1 Secure
NIST 800-53A: Guide for Assessing the Security Controls in Federal Information Systems. Samuel R. Ashmore Margarita Castillo Barry Gavrich
NIST 800-53A: Guide for Assessing the Security Controls in Federal Information Systems Samuel R. Ashmore Margarita Castillo Barry Gavrich CS589 Information & Risk Management New Mexico Tech Spring 2007
RACF PERFORMANCE TUNING
SHARE - August 2010 Robert S. Hansel Lead RACF Specialist - RSH Consulting, Inc. [email protected] - 617-969-9050 - www.rshconsulting.com 1 RSH PRESENTER Robert S. Hansel is Lead RACF Specialist
SonicWALL PCI 1.1 Implementation Guide
Compliance SonicWALL PCI 1.1 Implementation Guide A PCI Implementation Guide for SonicWALL SonicOS Standard In conjunction with ControlCase, LLC (PCI Council Approved Auditor) SonicWall SonicOS Standard
Locking down a Hitachi ID Suite server
Locking down a Hitachi ID Suite server 2016 Hitachi ID Systems, Inc. All rights reserved. Organizations deploying Hitachi ID Identity and Access Management Suite need to understand how to secure its runtime
INFORMATION TECHNOLOGY CONTROLS
CHAPTER 14 INFORMATION TECHNOLOGY CONTROLS SCOPE This chapter addresses requirements common to all financial accounting systems and is not limited to the statewide financial accounting system, ENCOMPASS,
March 2012 www.tufin.com
SecureTrack Supporting Compliance with PCI DSS 2.0 March 2012 www.tufin.com Table of Contents Introduction... 3 The Importance of Network Security Operations... 3 Supporting PCI DSS with Automated Solutions...
DoDI 8500-2 IA Control Checklist - MAC 3-Public. Version 1, Release 1.4. 28 March 2008
DoDI 8500-2 IA Control Checklist - MAC 3-Public Version 1, Release 1.4 Developed by DISA for the DOD UNTILL FILLED IN CIRCLE ONE FOR OFFICIAL USE ONLY (mark each page) CONFIDENTIAL and SECRET (mark each
SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This
Session 2826 February 2001. Stop those Unnecessary IPLS: The Dynamic OS/390 Functions
Stop those Unnecessary IPLS: The Dynamic OS/390 Functions [email protected] March 6, 2002 Session 2859 1 Trademarks and Copyrights Trademarks and Registered trademarks used in this presentation
z/os 2.1 Security Updates
z/os 2.1 Security Updates September 2013 Julie Bergh [email protected] 1 2012 IBM Corporation Agenda Overview of Security Changes z/os Communication Server RACF ICSF PKI Services z/os ITDS zsecure 2 2
NY/TB RUG: The Mainframe isn t Dead: Call the Doctor not the Undertaker with Real-time Enterprise Alert Correlation
NY/TB RUG: The Mainframe isn t Dead: Call the Doctor not the Undertaker with Real-time Enterprise Alert Correlation Charles Mills Director of Special Projects CorreLog, Inc. [email protected]
CA Chorus for Security and Compliance Management
CA Chorus for Security and Compliance Management Site Preparation Guide Version 03.0.00, Fifth Edition This Documentation, which includes embedded help systems and electronically distributed materials,
The Comprehensive Guide to PCI Security Standards Compliance
The Comprehensive Guide to PCI Security Standards Compliance Achieving PCI DSS compliance is a process. There are many systems and countless moving parts that all need to come together to keep user payment
GE Measurement & Control. Cyber Security for NEI 08-09
GE Measurement & Control Cyber Security for NEI 08-09 Contents Cyber Security for NEI 08-09...3 Cyber Security Solution Support for NEI 08-09...3 1.0 Access Contols...4 2.0 Audit And Accountability...4
UPSTREAM for Linux on System z
PRODUCT SHEET UPSTREAM for Linux on System z UPSTREAM for Linux on System z UPSTREAM for Linux on System z is designed to provide comprehensive data protection for your Linux on System z environment, leveraging
CA Integrated Agent Services
CA Integrated Agent Services Implementation Guide Version 12.0.00 Second Edition This Documentation, which includes embedded help systems and electronically distributed materials (hereinafter referred
CA MICS Resource Management r12.7
PRODUCT SHEET agility made possible CA MICS Resource Management r12.7 CA MICS Resource Management (CA MICS) is a comprehensive IT resource utilization management system designed to fulfill the information
New Security Options in DB2 for z/os Release 9 and 10
New Security Options in DB2 for z/os Release 9 and 10 IBM has added several security improvements for DB2 (IBM s mainframe strategic database software) in these releases. Both Data Security Officers and
Nalini Elkins' TCP/IP Performance Management, Security, Tuning, and Troubleshooting on z/os
Nalini Elkins' TCP/IP Performance Management, Security, Tuning, and Troubleshooting on z/os Do you have the responsibility for TCP/IP performance management? Are you unsure of where to start? Or do you
Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping
Larry Wilson Version 1.0 November, 2013 University Cyber-security Program Critical Asset Mapping Part 3 - Cyber-Security Controls Mapping Cyber-security Controls mapped to Critical Asset Groups CSC Control
Table of Contents. Introduction. Audience. At Course Completion
Table of Contents Introduction Audience At Course Completion Prerequisites Microsoft Certified Professional Exams Student Materials Course Outline Introduction This three-day instructor-led course provides
CA Dispatch. Best Practices Guide. Release 11.7
CA Dispatch Best Practices Guide Release 11.7 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is for your
DoD ANNEX FOR MOBILE DEVICE MANAGEMENT (MDM) PROTECTION PROFILE Version 1, Release 1. 14 February 2014
DoD ANNEX FOR MOBILE DEVICE MANAGEMENT (MDM) PROTECTION PROFILE Version 1, Release 1 14 February 2014 Trademark Information Names, products, and services referenced within this document may be the trade
Top 10 Tips for z/os Network Performance Monitoring with OMEGAMON Session 11899
Top 10 Tips for z/os Network Performance Monitoring with OMEGAMON Session 11899 Dean Butler [email protected] 2012 IBM Corporation Agenda IBM Software Group Tivoli software Best Practices in Monitoring
CSN38:Tracking Privileged User Access within an ArcSight Logger and SIEM Environment Philip Lieberman, President and CEO
CSN38:Tracking Privileged User Access within an ArcSight Logger and SIEM Environment Philip Lieberman, President and CEO 2009 by Lieberman Software Corporation. Rev 20090921a Identity Management Definitions
CA Chorus Software Manager
CA Chorus Software Manager User Guide Release 5.1 Third Edition This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
Using the z/os SMB Server. to access z/os data from Windows. -- Hands-On Lab Session 10634-10879
Using the z/os SMB Server to access z/os data from Windows -- Hands-On Lab Session 10634-10879 Using the z/os SMB server to access z/os data from Windows Hands-On-Lab Marna Walle Jim Showalter Karl Lavo
System Security Policy Management: Advanced Audit Tasks
System Security Policy Management: Advanced Audit Tasks White Paper October 6, 2005 2005 Altiris Inc. All rights reserved. ABOUT ALTIRIS Altiris, Inc. is a pioneer of IT lifecycle management software that
SNI Vulnerability Assessment Report
SI Vulnerability Assessment Report Generated sample report Automated Infrastructure Discovery and Analysis Scan period 2009-04-07 10:31-2009-04-07 11:27 umber of scanned hosts 12 umber of hosts requiring
DSZ-3732 Secure Mainframe Development in the Cloud has Arrived
DSZ-3732 Secure Mainframe Development in the Cloud has Arrived Stan King CTO, Information Technology Company [email protected] Chris Trobridge, Product Manager, IBM [email protected] 2014 IBM Corporation
z/os Management Facility (z/osmf) V1.13 Implementation and Configuration Session: 09733
z/os Management Facility (z/osmf) V1.13 Implementation and Configuration Session: 09733 Anuja Deedwaniya [email protected] STSM, z/os Systems Management and Simplification Agenda Overview of z/os Management
LAB FORWARD. WITH PROService RMS TECHNOLOGY, ARCHITECTURE AND SECURITY INFORMATION FOR IT PROFESSIONALS
LAB FORWARD WITH PROService RMS TECHNOLOGY, ARCHITECTURE AND SECURITY INFORMATION FOR IT PROFESSIONALS Medical diagnostics are a vital part of the modern healthcare system, and instrument uptime is critical
CMS Operational Policy for Infrastructure Router Security
Chief Information Officer Office of Information Services Centers for Medicare & Medicaid Services CMS Operational Policy for Infrastructure Router Security September 2005 Document Number: CMS-CIO-POL-INF05-01
Building Robust Security Solutions Using Layering And Independence
Building Robust Security Solutions Using Layering And Independence Fred Roeper Neal Ziring Information Assurance Directorate National Security Agency Session ID: STAR-401 Session Classification: Intermediate
CorreLog Alignment to PCI Security Standards Compliance
CorreLog Alignment to PCI Security Standards Compliance Achieving PCI DSS compliance is a process. There are many systems and countless moving parts that all need to come together to keep user payment
Stu Henderson s Clear Explanation of Effective z/os Security Auditing
Stu Henderson s Clear Explanation of Effective z/os Security Auditing (A Brief Description of the Steps to a Proven Practical Audit Program, Without Much Technical Detail) Stu Henderson The Henderson Group
PCI Compliance Can Make Your Organization Stronger and Fitter. Brent Harman Manager, Systems Consultant Team West NetPro Computing, Inc.
PCI Compliance Can Make Your Organization Stronger and Fitter Brent Harman Manager, Systems Consultant Team West NetPro Computing, Inc. Today s Agenda PCI DSS What Is It? The Regulation 6 Controls 12 Requirements
6. AUDIT CHECKLIST FOR NETWORK ADMINISTRATION AND SECURITY AUDITING
6. AUDIT CHECKLIST FOR NETWORK ADMINISTRATION AND SECURITY AUDITING The following is a general checklist for the audit of Network Administration and Security. Sl.no Checklist Process 1. Is there an Information
Software Product Description
Software Product Description PRODUCT NAME: HP SNA Data Transfer SPD 27.85.13 This SPD describes HP SNA Data Transfer Facility for OpenVMS, which is available for the OpenVMS I64, OpenVMS Alpha and OpenVMS
CA Products for z/vm Old Dogs with New Tricks
CA Products for z/vm Old Dogs with New Tricks Yvonne DeMeritt Sr. Sustaining Engineer CA Objective -Provide information on CA s z/vm product offerings that are available to assist you in meeting your z/vm
TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices
Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security
Windows Operating Systems. Basic Security
Windows Operating Systems Basic Security Objectives Explain Windows Operating System (OS) common configurations Recognize OS related threats Apply major steps in securing the OS Windows Operating System
UNITED STATES PATENT AND TRADEMARK OFFICE. AGENCY ADMINISTRATIVE ORDER 212-04 Agency Administrative Order Series. Secure Baseline Attachment
UNITED STATES PATENT AND TRADEMARK OFFICE AGENCY ADMINISTRATIVE ORDER 212-04 Agency Administrative Order Series Secure Baseline Attachment Date of Issuance: Effective Date: TABLE OF CONTENTS I. Purpose
Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes
Category Question Name Question Text C 1.1 Do all users and administrators have a unique ID and password? C 1.1.1 Passwords are required to have ( # of ) characters: 5 or less 6-7 8-9 Answer 10 or more
IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results
Acquire or develop application systems software Controls provide reasonable assurance that application and system software is acquired or developed that effectively supports financial reporting requirements.
New Users Cookbook. S/390 Partners in Development: OS/390 (and z/os) Front cover. ibm.com/redbooks. Hints & tips for new users
Front cover S/390 Partners in Development: OS/390 (and z/os) New Users Cookbook Hints & tips for new users Based on OS/390 R10 and Z/OS R1.1 AD CD-ROMs Uses P/390, MP3000, and Netfinity Enabled for S/390
Security and Control Issues within Relational Databases
Security and Control Issues within Relational Databases David C. Ogbolumani, CISA, CISSP, CIA, CISM Practice Manager Information Security Preview of Key Points The Database Environment Top Database Threats
NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS
NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS Scope and Applicability: These Network and Certificate System Security Requirements (Requirements) apply to all publicly trusted Certification Authorities
Promoting Application Security within Federal Government. AppSec DC November 13, 2009. The OWASP Foundation http://www.owasp.org
Promoting Application Security within Federal Government AppSec DC November 13, 2009 Dr. Sarbari Gupta, CISSP, CISA Founder/President Electrosoft [email protected] 703-437-9451 ext 12 The Foundation
DoDI 8500-2 IA Control Checklist - MAC 2-Sensitive. Version 1, Release 1.4. 28 March 2008
DoDI 8500-2 IA Control Checklist - MAC 2-Sensitive Version 1, Release 1.4 Developed by DISA for the DOD UNTILL FILLED IN CIRCLE ONE FOR OFFICIAL USE ONLY (mark each page) CONFIDENTIAL and SECRET (mark
System i and System p. Customer service, support, and troubleshooting
System i and System p Customer service, support, and troubleshooting System i and System p Customer service, support, and troubleshooting Note Before using this information and the product it supports,
USFSP Network Security Guidelines
USFSP Network Security Guidelines Table of Contents I. Access to Data II. Workstations and Personal Computers A. Computer Viruses B. Software C. Hardware D. Storage Media III. Local Area Networks (LANs)
CA JCLCheck Workload Automation
PRODUCT SHEET CA JCLCheck Workload Automation CA JCLCheck Workload Automation CA JCLCheck Workload Automation (CA JCLCheck WA) validates z/os JCL before it is submitted for execution. CA JCLCheck WA helps
