So You still Have a Mainframe? Edward Napoleon, CISSP, CISM. ISACA March 17, 2016

Size: px
Start display at page:

Download "So You still Have a Mainframe? Edward Napoleon, CISSP, CISM. ISACA March 17, 2016"

Transcription

1 1 So You still Have a Mainframe? Edward Napoleon, CISSP, CISM ISACA March 17, 2016

2 2 So You Still Have a Mainframe In this day of highly distributed systems and networks who still talks about mainframe computers? Most major banks, insurance companies, government agency, etc. still have mainframe systems as a key component of their IT infrastructure. The problem is most people that supported their organizations mainframes have already or are ready to retire.

3 This presentation is an overview for those who still have to secure or audit their organizations mainframe. We will also briefly discuss the three major mainframe security sub systems, CA-ACF2, CA- Top Secret and IBM s RACF. 3

4 What Is a Mainframe? Enterprise Server

5 What Is a Mainframe? An obsolete device still used by thousands of obsolete companies serving billions of obsolete customers and making huge obsolete profits for their obsolete shareholders. And this year s run twice as fast as last year s. The Devil s IT Dictionary, I predict that the last mainframe will be unplugged on March 15, Stewart Alsop, Infoworld, March 1991

6 What Is a Mainframe? (Cont.) The IBM mainframe is a traditionally large computer (large as in physical size, data processing and I/O performance, or both). System/ System/ System/ z/os Series Hosts the databases, transaction servers, and applications that require a great degree of security and availability. The primary operating systems are: z/os (also called OS/390) - Still based on the MVS z/vm) VSE TPF GNU/Linux

7 What Is a Mainframe? (Cont.) Businesses today rely on the mainframe to: Perform large-scale transaction processing (thousands of transactions per second) Support thousands of users and application programs concurrently accessing numerous resources Manage terabytes of information in databases Handle large-bandwidth communications The roads of the information superhighway often lead to a mainframe.

8 Why the Mainframe High Standards System z is the only computing platform that demonstrates compliance to the Common Criteria's Evaluation Level 5+ rating EAL5: Semiformally Designed and Tested The mainframe has the highest mean-timebetween-failure rating: 30 Years Most mainframes experience: less than 5 minutes of downtown a year

9 Why Are Mainframes Still Used? The reasons for mainframe use are many, but most generally fall into one or more of the following categories: Reliability, availability, serviceability Security Scalability Continuing compatibility Evolving architecture

10 Why Are Mainframes Still Used? (Cont.) Mainframes Very high reliability and stability >99,999%, or less than 5 minutes of downtime a year Very high storage capacity Disks, tapes: several terabytes Very high I/O throughput Large number of users (more than 5,000)

11 Why Enterprise Server Audit Training? 96 of the world s top 100 banks 23 of the 25 top retailors 9 0f 10 largest insurance companies 75% of the global 500 companies Mainframes process 30 billion transactions per day The roads of the information superhighway often lead to a mainframe.

12 IBM z13 -Mainframe IBM claims the z13 mainframe is the first system able to process 2.5 billion transactions a day (or the equivalent of 100 Cyber Mondays every day, according to the company). It can encrypt mobile transactions in real-time and provide on-the-fly insights on all transactions that pass through it. This will help companies and governments improve fraud detection, IBM says, and it give them a live view of a your purchasing habits so they can push related promotions to consumers right when they re in-store.

13 System z Integrity Statement Designed to help protect the systems data, transactions and applications from accidental or malicious modification System integrity is the inability to bypass the security on system resources IBM will always take action to resolve if a case is found where the above can be circumvented System z integrity statements and the Common Criteria certifications are helpful proof points in addressing compliance requirements.

14 Auditing z/os

15 Module z/os Objectives Gain a general understanding of IBM z/os operating system Understand IBM z/os audit considerations and their effect on the audit approach Gain an understanding of the z/os Enterprise Security Managers (ESMs) and the audit approach

16 Let's get a little technical

17 IBM Integrity Statement A paraphrase: IBM warrants, provided that mechanisms under the user s control are properly protected, z/os integrity is guaranteed. That is if you find an undocumented exposure in the z/os operating system, IBM will close that exposure or provide you with a mechanism to control it.

18 Operating System Integrity An operating system is said to have system integrity when it is designed, implemented, and maintained to protect itself against unauthorized access, and does so to the extent that security controls specified for that system cannot be compromised

19 Operating System Integrity Specifically for z/os, this means that there must be no way for any unauthorized program, using any system interface, defined or undefined, to do the following: Obtain control in an authorized state Bypass store or fetch protection Bypass password checking

20 The Hardware Controls and the Integrity Statement IBM mainframe computers (the z series ) have three hardware controls which form the basis of all z/os security: 1. The Supervisor State Switch (restricts when a program can execute privileged hardware instructions [such as the instruction to change the date and the instruction which writes directly to a disk drive]) 2. Protect Keys (restrict what memory a program can update or read) 3. Address Spaces (restrict what memory a program can touch)

21 The Hardware Controls and the Integrity Statement The z/os operating system uses these three controls to build a virtual fence around each program running on the computer This virtual fence prevents each program from interfering with other programs executing at the same time, and also from interfering with z/os itself. These hardware controls and the virtual fence z/os constructs from them are the basis of z/os security.

22 The Hardware Controls and the Integrity Statement This architecture is so solid that IBM provides us with written assurance that no program can break out of its virtual fence unless you modify the system to permit this This assurance is the basis of the IBM s Integrity Statement for z/os, which we ve already read IBM also provides several standard methods for you to modify the system to give a specified program privileges which permit it to break out of its virtual fence. Such programs (called privileged programs ) can bypass all security on the system, including that provided by CA ACF2, CA Top Secret, and IBM s RACF.

23 The Hardware Controls and the Integrity Statement A typical mainframe installation may have hundreds of such privileged programs These privileged programs act like backdoors, neither good or bad, just practical We need to be able to know however that they don t introduce security exposures to our systems

24 So What Is the Risk? The essential issue here is control of the ability to update Key Datasets The Key Datasets are those where the backdoors are specified and those where they reside User Supervisor Calls (these programs reside in the dataset SYS1.NUCLEUS or in the LPALIST datasets APF Authorization and TSO APF Authorization (these programs all reside in datasets which have been flagged as APF-authorized) I/O Appendages (acquire their privileges through APF authorized datasets) Functional Sub-Systems (acquire their privileges through LINKLIST datasets) Exits (assembler or REXX language programs which can modify the logic of standard software) (Many exits reside in APF-authorized or other system datasets.) The Program Properties Table (Programs listed in this table only receive privileges if they reside in APF-authorized libraries.) All these backdoors are specified in the parmlib datasets

25 So What is the Risk? cont. In other words, any programmer who can update (write to) such datasets can introduce or modify programs which can bypass all the security on the system. We want to know that management can provide reasonable assurance that these programs do not introduce security exposures to the system.

26 Operating System Integrity

27 z/os Security and Integrity Controls z/os Internal Security Controls Program Status Word Bypass store or fetch protection Storage Keys Supervisor State APF Authorization z/os Integrity Mechanisms Authorized Libraries Program Properties Table (PPT) User Supervisor Calls (SVCs) Command Authority (System, Operator) System Management Facility

28 Other Critical Areas of Concern Command Authority Restricted Utilities Exits Change Control

29 The Foundation of z/os Security

30 Instruction Set The instruction set architected is part of the hardware design. For example: on a System z system, there are instructions for changing the flow of a program. These are the BRANCH instructions. On Intel 80x86 processors, the same type of instruction is a JUMP. Each instruction in the instruction set has a numerical value. The BRANCH instruction is an 07. When a System z system sees an 07 it knows to extract an address from a register and fetch the instruction at that address in memory. That fetched instruction is then executed. If a System z system saw a JUMP instruction it would take exception to it, since JUMP isn t in the architected instruction set IBM

31 Instruction Set Many ways to ADD Name Mnemonic Type OpCode ADD A RX 5A ADD NORMALIZED (long) AD RX 6A ADD NORMALIZED (long) ADR RR 2A ADD NORMALIZED (short) AE RX 7A ADD NORMALIZED (short) AER RR 3A ADD HALFWORD AH RX 4A ADD HALFWORD IMMEDIATE AHI RI A7A ADD LOGICAL AL RX 5E ADD LOGICAL ALR RR 1E ADD DECIMAL AP SS FA ADD AR RR 1A ADD UNNORMALIZED (short) AU RX 7E ADD UNNORMALIZED (short) AUR RR 3E ADD UNNORMALIZED (long) AW RX 6E ADD UNNORMALIZED (long) AWR RR 2E ADD NORMALIZED (extended) AXR RR IBM

32 Multiplicity and Security issues Cont d Where all programs are not made equal Control Instructions: Have the capability of affecting the user execution environment. Should be made available to the OS only General Instructions: Can be executed by any program IBM

33 System z Control Instructions BRANCH AND SET AUTHORITY BRANCH AND STACK BRANCH IN SUBSPACE GROUP DIAGNOSE EXTRACT PRIMARY ASN EXTRACT SECONDARY ASN EXTRACT STACKED REGISTERS EXTRACT STACKED STATE INSERT ADDRESS SPACE CONTROL INSERT PSW KEY INSERT STORAGE KEY EXTENDED INSERT VIRTUAL STORAGE KEY INVALIDATE PAGE TABLE ENTRY LOAD ADDRESS SPACE PARAMETERS LOAD CONTROL LOAD PSW LOAD REAL ADDRESS LOAD USING REAL ADDRESS MODIFY STACKED STATE MOVE PAGE (Facility 2) MOVE TO PRIMARY MOVE TO SECONDARY MOVE WITH DESTINATION KEY MOVE WITH KEY MOVE WITH SOURCE KEY PROGRAM CALL PROGRAM RETURN PROGRAM TRANSFER PURGE ALB PURGE TLB RESET REFERENCE BIT EXTENDED SET ADDRESS SPACE CONTROL SET ADDRESS SPACE CONTROL FAST SET CLOCK SET CLOCK COMPARATOR SET CPU TIMER SET PREFIX SET PSW KEY FROM ADDRESS SET SECONDARY ASN SET STORAGE KEY EXTENDED SET SYSTEM MASK SIGNAL PROCESSOR STORE CLOCK COMPARATOR STORE CONTROL STORE CPU ADDRESS STORE CPU ID STORE CPU TIMER STORE PREFIX STORE THEN AND SYSTEM MASK STORE THEN OR SYSTEM MASK STORE USING REAL ADDRESS TEST ACCESS TEST BLOCK TEST PROTECTION TRACE 2006 IBM

34 z/os Security Controls Supervisor State/Problem State z/os architecture Two states: Supervisor (0) and Problem (1) 16 keys:0 7 system; 8 F user Storage protection key A program in supervisor state can perform any operation. A program in problem state can perform operations only within its address space. UNIX equivalent: kernel mode vs. user mode

35 Instruction Execution 2006 IBM

36 Interrupt Driven Systems Systems running on System z processors are interrupt driven When events occur in the system, execution of the program on the processor is paused and the event is handled Types of events that cause interruptions: Restart Supervisor-Call External I/O Machine-Check Program 2006 IBM

37 The Interruption Mechanism When an interruption event occurs, the program status word (PSW) is changed in favor of a PSW which drives the interrupt handling software This requires some strict conventions and preparation to happen The new PSW is fetched from memory locations fixed by the z/architecture. The Operating System prepares the new PSWs so that the proper instruction sequences are given control when the interruption occurs. The interrupted program eventually regains control when the OS retrieves the old PSWs from the architecturally defined location where it was stored IBM

38 z/os Security Control Security at the CPU Level Security within z/os begins at the CPU level with the Current Program Status Word (PSW) register. The PSW includes the instruction address and other information used to control and determine the state of the CPU for an executing program. The current PSW is the PSW for the program instructions currently being executed by the CPU. There is a PSW for each active processor.

39 Security at the CPU Level The PSW also contains the Problem State bit at bit 15. When this bit is set to 0, the CPU is said to be executing in supervisor state. In supervisor state, all instructions to be executed by the CPU are valid. When this bit is set to 1, the CPU is said to be executing in problem state. In the problem state, the only valid instructions are those instructions that provide meaningful information to the problem program and that cannot affect system integrity; such instructions are called unprivileged instructions.

40 Program Status Word

41 Multiprocessing 2006 IBM

42 Compartmenting the System z computer memory The Storage Protection keys. The Storage Key principles of operation Every page frame is allocated a Storage Key which consists of a set of four bits called the Access-Control bits plus an additional bit called the Fetch Protection bit. The Storage Key is physically located in associated system-only memory, that is storage keys and Fetch protection bits are not accessible as regular memory data by instructions.

43 Getting the Storage Protection Keys to work A control instructions is allowed to set a Storage key value, that is a specific value out of 16 possible values, for a given page frame. There is also a PSW key value that can be set in bits 8 to 11 of the PSW. When an instruction being executed in the CPU requests for memory access, the hardware compares the Storage Key and the current PSW key values before proceeding with any effective access.

44 Getting the Storage Protection Keys to work When the memory access is denied the requesting program is interrupted. The Storage protection Key violation event falls in the category of Program-check interrupt. It is typically expected that in such a case the operating system is not to resume the execution of the interrupted program, as it is either an addressing mistake in the user program or the user program deliberately attempts to penetrate memory areas it is not authorized to access.

45 z/os concepts Storage protection keys Keys 0 to 15 Key 0: Master Key Permitting read access to all storage Keys 1 7: z/os components, such as JES, RACF, VTAM, CICS, IMS, etc. Keys 8 15: User program keys

46 Security at the CPU Level The instructions that are never valid in the problem state are called privileged instructions. When a CPU in the problem state attempts to execute a privileged instruction, a privileged operation exception is recognized. Another group of instructions, called semi-privileged instructions, are executed by a CPU in the problem state only if specific authority tests are met (the program is authorized ); otherwise, a privilegedoperation exception or a special operation exception is recognized. The corresponding exception occurs.

47 Multiprocessing 2006 IBM

48 System z Virtual Storage The concept of virtual storage This physical mapping is transparent to programs in that programs use the memory address in a purely conceptual view: programs designers are expecting that: an address used to store data is also the address to be used to retrieve these same data. contiguous address values point at contiguous data.

49 System z Virtual Storage Address values as used by programs can be decoupled from actual physical addresses used by the memory technology. Such a decoupling would allow better use of the available space in the physical memory, which then became the real storage programs ranges of logical addresses that would go beyond the actual limit of real storage. The logical address being the address used by the CPU to fetch the instructions to be executed, to fetch the data to be worked on and to store the results of instructions execution. inter-user isolation at the virtual storage level. The term Virtual Storage was coined to designate the capability, offered by a system, to use logical addressing.

50 How virtual storage works Virtual storage is divided into 4-kilobyte pages Transfer of pages between auxiliary storage and real storage is called paging When a requested address is not in real storage, an interruption is signaled and the system brings the required page into real storage z/os uses tables to keep track of pages Dynamic address translation (DAT) Frames, pages, slots are all repositories for a page of information

51 Logical Partitioning PR/SM (processor resource/systems manager) is a standard feature of System z that allows the user to define logical partitions (LPARs) in the physical system. A logical partition provides the set of resources necessary to load an execute an Operating System and users applications. A single physical System z system can host several Operating Systems that operate concurrently under control of the PR/SM microcode and hardware mechanisms. Each logical partition appears as a complete system to its users and administrators IBM

52

53 z/os Integrity Mechanisms 1. APF Authorization 2. Authorized Libraries 3. Program Properties Table (PPT) 4. User Supervisor Calls (SVCs) 5. Command Authority (System, Operator) 6. System Management Facility

54 APF Authorization

55 What Is APF Authorization? APF authorization is a mechanism that permits the operating system to recognize itself and thereby distinguish between operating system software and other software. z/os contains a feature called the authorized program facility (APF) to allow selected programs to access sensitive system functions.

56 Authorized Programs APF was designed to avoid integrity exposures. The installation identifies which libraries contain those special functions or programs. Those libraries are then called APF libraries. Key Issue: An APF-authorized program can do virtually anything that it wants: It is essentially an extension of the operating system. It can put itself into supervisor state or a system key. It can modify system control blocks. It can execute privileged instructions (while in supervisor state). It can turn off logging to cover its tracks.

57 Control Issues The power of APF is such that, theoretically, a capable system programmer could intercept or reveal any data under the control of z/os or erase all online disks and set the entire virtual and real storage to binary zeros. Due to the privileged capabilities afforded to APF authorized programs: APF libraries should contain only programs authorized by APF (in one of the specified libraries). Access to APF-authorized libraries should be restricted, accesses monitored, all changes and additions carefully controlled. It is important to ensure that APF libraries physically exist, because if they do not, the possibility exists of substitution of a Trojan Horse library in place of the missing APF library.

58 Program Properties Table

59 Program Properties Table (PPT) Certain system programs need to run with special powers. The program properties table (PPT) lists these programs by name and the special properties assigned to each. The PPT is used to assign unique attributes to specific programs from the start of system initialization.

60 Program Properties Table Programs in the PPT can perform special actions: Bypass password checking Get a specific key <8; that is, get supervisor state Bypass integrity checking Allow access to a data set already in use by another program Be protected against cancellation or swap Program must be APF-authorized.

61 PPT Control Issues All programs in the PPT should be approved by management, and no application programs should reside therein. Attributes selected for the programs should be reviewed to ensure that they do not pose security concerns and they are in accordance with the installation s security policy. Access to the PPT also should be restricted and its use monitored. The PPT should not contain any redundant programs, as this could permit the use of that program s name for substitution into an APF-authorized library and therefore provide that program APF-authorized status.

62 Audit Program for PPT Review PPT definitions in the active SCHEDxx member of SYS1.PARMLIB. This member of PARMLIB has entries that supplement or override IEFSDPPT. Ensure that all entries are documented and authorized by management. Ensure that all entries are properly documented and authorized by management. Determine if programs in the PPT portion of the SCHEDxx member are vendor supplied or installation written. Perform a scan of all APF and LNKLST libraries and look for duplicate PPT program names. Use : RACF you (DSMON, SYSPPT function) CA-Audit

63 Supervisor Call (SVC)

64 Supervisor Call A supervisor call is a function that permits z/os programs to invoke one of the common functions of z/os, which must execute in an authorized state. SVCs are high-level programs that perform system services (e.g., allocating data sets) at the supervisor level. Two main types of SVCs exist: restricted and unrestricted. Restricted SVCs may be invoked only from APF-authorized programs and are not available to all programmers. These SVCs carry out sensitive supervisory or security related functions. Unrestricted SVCs may be used by any program to carry out functions needed by everyone.

65 Supervisor Call A main reason for SVCs is so that every programmer wanting to open a data set (file) and read data from that data set would not have to code all the program steps in their program. Supervisor call programs are normally launched from a macro issued from a program. Example: Open Macro calls SVC 19, open a data set. There are 256 possible supervisor calls: SVCs are IBM-supplied. SVCs are installation-written.

66 Supervisor Call (SVC) SVCs are defined at SYSGEN or in the IEASVCxx PARMLIB member. User-installed Third-party tools IBM subsystems not part of base z/os (CICS, etc.) SVCs are supposed to protect the supervisor state by performing integrity checks.

67 Restricted SVC If a program is APF-authorized, it can issue restricted SVCs. For example: SVC 76 may enable a programmer to falsify hardware and system software errors. SVC 83 may be used to falsify SMF records. SVC 85 may be used to swap one device for another during the execution of a job. SVC 107 may be used to swap the system s mode of operation: Key=ZERO Key=NZERO

68 Supervisor Calls (SVCs) The coding of SVCs requires exceptional assembler skills and usually leads to the compromise of z/os integrity. Many vendors and customers write their own SVCs and have had problems with them.

69 SVC Control Issues SVCs are of particular importance from a control perspective because they acquire control of the system in an authorized state. Installation-written SVCs are also important because they may contain unauthorized code. Access to the libraries where SVCs are stored should be restricted and such access should be monitored. Active SVCs, particularly installation-written SVCs, should be reviewed and authorized and their functions documented (because of the possibility of unauthorized code), and their use should be monitored. For sensitive SVCs, there should be a requirement for the caller to be APF-authorized. A caller is a program that tells the SVC to perform a task. Access to the SVCUPDTE macro and the update recording table should be reviewed for the latest changes to any SVCs.

70 Exits

71 Exits z/os exits are basically trap doors that allow changes in normal processing based on the function and location of the exit. From an audit and security standpoint, exits are important for a number of reasons: Exits can make the system operate differently from the way the vendor documentation describes it. Exits can introduce exposures in the security of your system: Most z/os components contain exits that can be used to customize their behavior and adapt to local need.

72 Control Issues Because of their ability to significantly affect processing and subsystems operation, it is important to ensure that only authorized exits are in place. Changes to exits also should be monitored, and only authorized changes, subject to proper change control procedures, should be implemented. Libraries where the exits are kept also should be subject to proper access controls. All of the mainframe security packages, RACF, CA-ACF2, and CA Top Secret, have a number of exits that need to be checked as well.

73 Critical and Sensitive System Data Sets

74 Sensitive and Critical Data Sets The sensitive and critical libraries are data sets used by the operating system, or components/subsystems, for initialization and smooth running of the operating system. These data sets, or libraries, along with other files, make up the system data sets which are required for z/os to operate. Illegal access to or corruption of these data sets may have a significant impact on the integrity of the operating system. These data sets contain IPL parameters and the programs that make up the system control parameters.

75 Sensitive and Critical Data Sets High-level qualifier for system libraries Most of time SYS(x) SYS1.PARMLIB SYS1.VTAMLST SYS1.UADS In many cases, another name is used. Depends on the naming convention of the.

76 SYS1.Parmlib(IEASYS00) LNKLSTxx IEAAPFxx PFKTABxx MPFLSTxx CONSOLxx LPASTxx IEASYS00 CLOCKxx IEALPAxx SMFPRMxx IEAFIXxx SCHEDxx IEASVCxx IEFSSNxx IEAAPP00 PROGxx

77 Standard System Libraries z/os has many standard system libraries; some of these are related to IPL processing, while others are related to the search order of invoked programs or to system security, as described here: SYS1.PARMLIB contains system control parameters. SYS1.LINKLIB has many system execution modules. SYS1.LPALIB contains the re-entrant system execution modules that are loaded into the link pack area when the system initializes. SYS1.PROCLIB contains JCL procedures distributed with z/os. SYS1.NUCLEUS has the basic supervisor modules of the system.

78 Sensitive Data Sets Reside on IPL Volume SYS1.NUCLEUS - Operating system nucleus and initialization code SYS1.LOGREC - Error log SYS1.SVCLIB - I/O appendages and non-standard label routines PASSWORD - z/os passwords

79 Sensitive Data Sets Optional : SYS1.MANx - SMF data sets SYS1.UADS - TSO user attributes SYS1.CMDLIB - TSO commands SYS1.VTAMLST - VTAM options SYS1.VTAMOBJ - VTAM options

80 Critical Data Sets Required : SYS1.PARMLIB - Parameter library SYS1.PROCLIB - First JCL procedure library SYS1.LPALIB - All re-entrant programs that will be loaded into PLPA SYS1.LINKLIB - All executable programs that are frequently used and available to everyone SYS1.MACLIB - Assembler macros

81 Critical Data Sets Control Issues Data sets used during an IPL and those supporting system libraries used to house system modules, utilities, and programs need to be adequately secure. The IPL process runs as a privileged system. If supporting data sets are not properly controlled, it is possible for someone to insert his own code to execute privileged during the IPL. System programmers often need access to these libraries to manage system update and additions. Update to these libraries should be tightly controlled, with any changes to SYS1.PARMLIB or nucleus data sets going through established change control procedures, with audit updates, sign-off, and appropriate review.

82 Audit Program for Sensitive and Critical Data Sets In most shops SYS1 is the high-level qualifier for system data sets. This is not always the case though, and you should ask which highlevel qualifiers are used by the organization. (SYSn) Ensure that all system data sets are adequately controlled. Users outside of technical support, or operations should not have update access. Ensure that any globally applied access rules contain entries for any critical system data set. Ensure that data sets considered system level are not user data sets. The high level qualifier should not be for an individual TSO user. Identify all system data sets.

83 System Management Facility (SMF)

84 System Management Facility (SMF) System Management Facility (SMF) is critical to the auditability of z/os and its subsystems. SMF is used for the collection of system activity as well as ESM security events. When an external security manager is used, the corresponding SMF records must be enabled. Equivalent to UNIX syslog.

85 System Management Facility (SMF) SMF collects several types of system information. This is used as the primary input to programs generating reports on system efficiency, performance, and usage. The SMF routines record the following data: System performance data JOB-related data Security violations and audit trails (ACF2, RACF) Data set access data (Open and Close) System configuration Job and job step identification, and much more The names of the data sets and which records are to be recorded in the SMF are defined in the SMFPRMxx member of PARMLIB.

86 SMF Control Issues Incorrect settings of SMF parameters can cause records not to be logged. SMF exits can also selectively or completely suppress SMF logging. Failure to log record types required by the enterprise may result in lack of information for performance measurement, accounting, security event tracking, and an incomplete audit trail.

87 Audit Program for SMF, Cont. SMF settings Example Extract of PARMLIB(SMFPRMxx) ACTIVE /*ACTIVE SMF RECORDING*/ DSNAME(SYS1.MAN1,SYS1.MAN2,SYS1.MAN3) MAXDORM(3000) /* WRITE AN IDLE BUFFER AFTER 30 MIN*/ STATUS(010000) /* WRITE SMF STATS AFTER 1 HOUR*/ LISTDSN /* LIST DATA SET STATUS AT IPL*/ SYS(NOTYPE(4:5,16:19,40,62:69,150),EXITS(IEFU83,IEFU84, IEFACTRT, IEFUJV, IEFUSI, IEFUJI, IEFUTL, IEFU29), INTERVAL(010000), DETAIL) SUBSYS(STC,EXITS(IEFU29,IEFU83,IEFU84,IEFUJP,IEFUSO))

88 Command Authority

89 Command Authority Execution of operator and/or system commands should be controlled by ESM Inspect: JES2 parameters for command authority on: INTRDR JOBCLASS TSUCLASS STCCLASS SDSF Netview Check for other products bypassing ESM for operation or system commands

90 Utility Programs

91 What Are Utility Programs? Tools to assist with the management of and collection of data Very helpful in collecting information related to the audit Programs that have been around since the early mainframe days

92 Utility Programs IEFBR14 IEBGENER IEBCOPY IEBDG IDCAMS IEBUPDTE

93 System-Oriented Utilities IEHLIST - The IEHLIST utility is used to list a partitioned data set directory or a disk volume VTOC. It is normally used for VTOC listings and provides bit-level information. IEHINITT - The IEHINITT utility is used to write standard labels on tapes. IEHPROGM - The IEHPROGM utility is almost obsolete. It is used primarily to manage catalogs, rename data sets, and delete data sets by a program instead of by JCL actions. It was primarily used during system installation or the installation of a major program product. ICKDSF - The ICKDSF utility is used primarily to initialize disk volumes. At a minimum, this involves creating the disk label record and the VTOC. ICKDSF can also scan a volume to ensure that it is usable, reformat all the tracks, write home addresses and R0 records, and so forth. SUPERZAP - The SUPERZAP program is used to patch VTOCs, executable programs, or almost any other disk record. In practice it is mostly used to patch executable programs. It was extensively used in earlier days to install minor fixes in programs.

94 Restricted Utilities Restricted utilities are programs that have the capability of bypassing normal security controls, like: Backup/recovery tools (ADRDSSU, FDR) ZAPPERS, AMASPZAP, IMASPZAP, IRRUT300 Initialization routines, IEHNITT, Tape INIT utilities Check Check programs defined in the PPT with NOPASS attribute Is all software evaluated for potential restricted utilities? Protection of restricted utilities by ESM against malicious execution

95 Change Control in z/os

96 Change Control Change control is the process of monitoring and controlling the application of changes to a mainframe environment. Enterprise Servers, because of their uptime requirements, are brought down only rarely to apply changes. Dues to the criticality and security requirements of mainframes, changes that are applied must be done so in a very controlled environment.

97 Greatest Source of Errors Is Change Unplanned changes to application and system software affect the stability and availability of critical business systems. Companies spend millions on change management systems only to have them circumvented and never know it.

98 Change Control To ensure that changes are applied appropriately, the change control process and supporting documentation should include the following: Who - the department, group, or person that requires the change and is responsible for implementing the change, completing the successful test, and backing out if required; also will sign off the change as successful What - the affected systems or services. Include as much detail as possible. Ideally, complete instructions should be included so that the change could be performed by someone else in an emergency. Where - scope of change; the business units, buildings, departments or groups affected or required to assist with the change When - start date and time and estimated duration of the change. There are often three dates: requested, scheduled, and actual. Priority - high, medium, low, business as usual, emergency, dated Risk - high, medium, low Impact - what will happen if the change is implemented; what will happen if it is not; what other systems may be affected; what will happen if something unexpected occurs.

99 z/os External Security

100 z/os Security z/os was not designed with a lot of internal access control capability. z/os natively has no built in authentication and authorization capability. All access control functionality is built into its subsystems. The major subsystems with their own internal access control mechanisms: TSO CICS IMS DB2 To get the level of security control needed in a mainframe, you need an external security manager (ESM): RACF CA-ACF2 CA-Top Secret

101 Systems with RACF, ACF2 or Top Secret

102 The Security Access Facility (SAF) Requests for security services on z/os are passed through the Security Access Facility (SAF). This facility is the interface between system services and the External Security Manager (ESM) installed on the system. SAF routes requests for authentication, resource accesses checking, and other security related processes to the ESM through control points. Applications and system components call these common control points in order to interface with the ESM. Security on z/os is therefore centralized on SAF and the installed ESM. When there is no ESM installed, SAF creates the security constructs needed by system services.

103 The SAF Router 112 For each request type presented to SAF, a different routine is accessed. The location of these routines are in the SAF Routing Table

104 Mechanics of Authorization Checking

105 RACF Overview Resource Access Control Facility RACF is a member of the SecureWay Security Server SecureWay Security Server consists of: LDAP server Firewall technologies DCE security server Open Cryptographic Enhanced Plugins (OCEP) RACF Very good utility programs (SETROPTS) OK reporting programs (DSMON)

106 CA ACF2 Overview Product of Computer Associates Intl. (CA) Data is protected by default. The security focus is on the resources and is controlled by access and resource rules. Requires a higher level of technical skill to administer (Not really, but was designed by system programmers) Very good utility programs OK reporting programs

107 CA-TSS Overview Product of Computer Associates Intl. (CA) Data is not protected by default (optional). The security focus is on the user. Some think it is the easiest to administer(?) Very good utility programs OK reporting programs

108 Conclusion 117

109 118 Conclusion The reasons for Enterprise Servers (mainframes) use are many, but most generally fall into one or more of the following categories: Reliability, availability, serviceability Security Scalability Continuing compatibility Evolving architecture

110 119 Conclusion (Cont.) Enterprise Servers have: Very high reliability and stability Very high storage capacity Very high I/O throughput Large number of users Very high number of transactions Biggest Problem It is a 50 year old technology that has been enhanced to support both current and future large scale system needs The people skilled at managing these system are rapidly retiring and there is a shortage of skilled professionals

111 120 Resources to Learn z/os Security Security Server RACF Audit Guide RACF Security Administrators Guide Stu Henderson s Clear Explanation of Effective z/os Security Auditing Reduce Risk and Improve Security on IBM Mainframes: Vol 1, 2, 3 Introduction to the New Mainframe Security, Large-Scale Commercial Computing, Networking

112 121 Edward Napoleon, CISSP, CISM Tutis Security Consulting and Training 30 years, of Information Technology and Information Security experience. He has worked with and taught z/os security and auditing practices for Computer Associates, Key Bank and EY. Ed has experience with ACF2, RACF and Top Security z/os enterprise security managers. Ed is a retired principal from EY s security and risk management practice.

z/os VULNERABILITY SCANNING AND MANAGEMENT Key Resources, Inc. [email protected] (312) KRI-0007 www.kr-inc.com

z/os VULNERABILITY SCANNING AND MANAGEMENT Key Resources, Inc. ray.overby@kr-inc.com (312) KRI-0007 www.kr-inc.com 1 z/os VULNERABILITY SCANNING AND MANAGEMENT Key Resources, Inc. [email protected] (312) KRI-0007 www.kr-inc.com 2 Ray Overby SKK - ACF2 Developer (1981-1988) Key Resources, Inc. incorporated in 1988

More information

Traditional IBM Mainframe Operating Principles

Traditional IBM Mainframe Operating Principles C H A P T E R 1 7 Traditional IBM Mainframe Operating Principles WHEN YOU FINISH READING THIS CHAPTER YOU SHOULD BE ABLE TO: Distinguish between an absolute address and a relative address. Briefly explain

More information

Stu Henderson s Clear Explanation of Effective z/os Security Auditing

Stu Henderson s Clear Explanation of Effective z/os Security Auditing Stu Henderson s Clear Explanation of Effective z/os Security Auditing (A Brief Description of the Steps to a Proven Practical Audit Program, Without Much Technical Detail) Stu Henderson The Henderson Group

More information

Mark Wilson [email protected] Session Details: The Introduction

Mark Wilson markw@rsmpartners.com Session Details: The Introduction Everything you wanted to know about mainframe security, pen testing and vulnerability scanning.. But were too afraid to ask! Mark Wilson [email protected] Session Details: The Introduction Agenda Introduction

More information

Chapter 3: Operating-System Structures. System Components Operating System Services System Calls System Programs System Structure Virtual Machines

Chapter 3: Operating-System Structures. System Components Operating System Services System Calls System Programs System Structure Virtual Machines Chapter 3: Operating-System Structures System Components Operating System Services System Calls System Programs System Structure Virtual Machines Operating System Concepts 3.1 Common System Components

More information

CA VM:Operator r3. Product Overview. Business Value. Delivery Approach

CA VM:Operator r3. Product Overview. Business Value. Delivery Approach PRODUCT SHEET: CA VM:OPERATOR CA VM:Operator r3 CA VM:Operator is an automated console message management system for z/vm and mainframe Linux environments. It allows you to minimize human intervention

More information

CA Auditor for z/os. System Review Checklist. r12. Second Edition

CA Auditor for z/os. System Review Checklist. r12. Second Edition CA Auditor for z/os System Review Checklist r12 Second Edition This documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

Chapter 2: OS Overview

Chapter 2: OS Overview Chapter 2: OS Overview CmSc 335 Operating Systems 1. Operating system objectives and functions Operating systems control and support the usage of computer systems. a. usage users of a computer system:

More information

IBM i Version 7.2. Security Service Tools

IBM i Version 7.2. Security Service Tools IBM i Version 7.2 Security Service Tools IBM i Version 7.2 Security Service Tools Note Before using this information and the product it supports, read the information in Notices on page 37. This edition

More information

CICS Transactions Measurement with no Pain

CICS Transactions Measurement with no Pain CICS Transactions Measurement with no Pain Prepared by Luiz Eduardo Gazola 4bears - Optimize Software, Brazil December 6 10, 2010 Orlando, Florida USA This paper presents a new approach for measuring CICS

More information

Utility Mainframe System Administration Training Curriculum

Utility Mainframe System Administration Training Curriculum Utility Mainframe System Administration Training Curriculum MVS SYSTEM ADMINISTRATION MVS SYSTEM ADMINISTRATION- LEVEL 1 TO 1.5 Name of the Module Common for All Administration LSO TSO/ISPF JCL & UTILITIES

More information

21 Things You Didn t Used to Know About RACF

21 Things You Didn t Used to Know About RACF 21 Things You Didn t Used to Know About RACF (A Technical Update for IT Auditors) Stuart Henderson The Henderson Group (301) 229-7187 1 Here Are 21 Things Auditors Should Know About RACF One Person s Opinion,

More information

Agenda. z/os Ethical Hacking Vulnerability Scanning & Pen Testing. Mark Wilson RSM Partners. Session Number: 12275. l Disclaimer.

Agenda. z/os Ethical Hacking Vulnerability Scanning & Pen Testing. Mark Wilson RSM Partners. Session Number: 12275. l Disclaimer. z/os Ethical Hacking Vulnerability Scanning & Pen Testing Mark Wilson RSM Partners Session Number: 12275 Agenda l Disclaimer l Introduction l Objectives l Mainframe Hacking Fact or Fiction? l Penetration

More information

New Security Options in DB2 for z/os Release 9 and 10

New Security Options in DB2 for z/os Release 9 and 10 New Security Options in DB2 for z/os Release 9 and 10 IBM has added several security improvements for DB2 (IBM s mainframe strategic database software) in these releases. Both Data Security Officers and

More information

CHAPTER 15: Operating Systems: An Overview

CHAPTER 15: Operating Systems: An Overview CHAPTER 15: Operating Systems: An Overview The Architecture of Computer Hardware, Systems Software & Networking: An Information Technology Approach 4th Edition, Irv Englander John Wiley and Sons 2010 PowerPoint

More information

Security Service tools user IDs and passwords

Security Service tools user IDs and passwords System i Security Service tools user IDs and passwords Version 5 Release 4 System i Security Service tools user IDs and passwords Version 5 Release 4 Note Before using this information and the product

More information

Introduction. What is an Operating System?

Introduction. What is an Operating System? Introduction What is an Operating System? 1 What is an Operating System? 2 Why is an Operating System Needed? 3 How Did They Develop? Historical Approach Affect of Architecture 4 Efficient Utilization

More information

CA JCLCheck Workload Automation

CA JCLCheck Workload Automation PRODUCT SHEET CA JCLCheck Workload Automation CA JCLCheck Workload Automation CA JCLCheck Workload Automation (CA JCLCheck WA) validates z/os JCL before it is submitted for execution. CA JCLCheck WA helps

More information

Operating Systems 4 th Class

Operating Systems 4 th Class Operating Systems 4 th Class Lecture 1 Operating Systems Operating systems are essential part of any computer system. Therefore, a course in operating systems is an essential part of any computer science

More information

z/os System Integrity: How z/os Software Enables You to Protect Your Assets

z/os System Integrity: How z/os Software Enables You to Protect Your Assets z/os System Integrity: How z/os Software Enables You to Protect Your Assets Scott Fagen Distinguished Engineer Chief Architect: z Systems and Workload Automation CA Technologies [email protected] Insert

More information

Outline: Operating Systems

Outline: Operating Systems Outline: Operating Systems What is an OS OS Functions Multitasking Virtual Memory File Systems Window systems PC Operating System Wars: Windows vs. Linux 1 Operating System provides a way to boot (start)

More information

Windows Operating Systems. Basic Security

Windows Operating Systems. Basic Security Windows Operating Systems Basic Security Objectives Explain Windows Operating System (OS) common configurations Recognize OS related threats Apply major steps in securing the OS Windows Operating System

More information

Session 2826 February 2001. Stop those Unnecessary IPLS: The Dynamic OS/390 Functions

Session 2826 February 2001. Stop those Unnecessary IPLS: The Dynamic OS/390 Functions Stop those Unnecessary IPLS: The Dynamic OS/390 Functions [email protected] March 6, 2002 Session 2859 1 Trademarks and Copyrights Trademarks and Registered trademarks used in this presentation

More information

The Comprehensive Guide to PCI Security Standards Compliance

The Comprehensive Guide to PCI Security Standards Compliance The Comprehensive Guide to PCI Security Standards Compliance Achieving PCI DSS compliance is a process. There are many systems and countless moving parts that all need to come together to keep user payment

More information

CA Top Secret r15 for z/os

CA Top Secret r15 for z/os PRODUCT SHEET: CA TOP SECRET FOR z/os we can CA Top Secret r15 for z/os CA Top Secret for z/os (CA Top Secret ) provides innovative, comprehensive security for your business transaction environments, including

More information

Pcounter Mobile Guide

Pcounter Mobile Guide Pcounter Mobile Guide Pcounter Mobile Guide 2012.06.22 Page 1 of 19 1. Overview... 3 2. Pre-requisites and Requirements... 4 2.1 Gateway server requirements... 4 2.2 Mobile device requirements... 4 2.3

More information

Operating Systems. Lecture 03. February 11, 2013

Operating Systems. Lecture 03. February 11, 2013 Operating Systems Lecture 03 February 11, 2013 Goals for Today Interrupts, traps and signals Hardware Protection System Calls Interrupts, Traps, and Signals The occurrence of an event is usually signaled

More information

Exception and Interrupt Handling in ARM

Exception and Interrupt Handling in ARM Exception and Interrupt Handling in ARM Architectures and Design Methods for Embedded Systems Summer Semester 2006 Author: Ahmed Fathy Mohammed Abdelrazek Advisor: Dominik Lücke Abstract We discuss exceptions

More information

IBM InfoSphere Guardium for DB2 on z/os Technical Deep Dive

IBM InfoSphere Guardium for DB2 on z/os Technical Deep Dive IBM InfoSphere Guardium for DB2 on z/os Technical Deep Dive One of a series of InfoSphere Guardium Technical Talks Ernie Mancill Executive IT Specialist Logistics This tech talk is being recorded. If you

More information

Review from last time. CS 537 Lecture 3 OS Structure. OS structure. What you should learn from this lecture

Review from last time. CS 537 Lecture 3 OS Structure. OS structure. What you should learn from this lecture Review from last time CS 537 Lecture 3 OS Structure What HW structures are used by the OS? What is a system call? Michael Swift Remzi Arpaci-Dussea, Michael Swift 1 Remzi Arpaci-Dussea, Michael Swift 2

More information

Introduction to the new mainframe Chapter 10 Topics in z/os system programming

Introduction to the new mainframe Chapter 10 Topics in z/os system programming Chapter 10 Topics in z/os system programming Objectives In this chapter you will learn to: Discuss the responsibilities of a z/os system programmer Explain system libraries, their use, and methods for

More information

Chapter 1 Computer System Overview

Chapter 1 Computer System Overview Operating Systems: Internals and Design Principles Chapter 1 Computer System Overview Eighth Edition By William Stallings Operating System Exploits the hardware resources of one or more processors Provides

More information

Security Overview of the Integrity Virtual Machines Architecture

Security Overview of the Integrity Virtual Machines Architecture Security Overview of the Integrity Virtual Machines Architecture Introduction... 2 Integrity Virtual Machines Architecture... 2 Virtual Machine Host System... 2 Virtual Machine Control... 2 Scheduling

More information

CA Deliver r11.7. Business value. Product overview. Delivery approach. agility made possible

CA Deliver r11.7. Business value. Product overview. Delivery approach. agility made possible PRODUCT SHEET CA Deliver agility made possible CA Deliver r11.7 CA Deliver is an online report management system that provides you with tools to manage and reduce the cost of report distribution. Able

More information

Managing your Domino Clusters

Managing your Domino Clusters Managing your Domino Clusters Kathleen McGivney President and chief technologist, Sakura Consulting www.sakuraconsulting.com Paul Mooney Senior Technical Architect, Bluewave Technology www.bluewave.ie

More information

Objectives. Chapter 2: Operating-System Structures. Operating System Services (Cont.) Operating System Services. Operating System Services (Cont.

Objectives. Chapter 2: Operating-System Structures. Operating System Services (Cont.) Operating System Services. Operating System Services (Cont. Objectives To describe the services an operating system provides to users, processes, and other systems To discuss the various ways of structuring an operating system Chapter 2: Operating-System Structures

More information

JD Edwards World. Database Audit Manager Release A9.3 E21957-02

JD Edwards World. Database Audit Manager Release A9.3 E21957-02 JD Edwards World Database Audit Manager Release A9.3 E21957-02 April 2013 JD Edwards World Database Audit Manager, Release A9.3 E21957-02 Copyright 2013, Oracle and/or its affiliates. All rights reserved.

More information

PRACTICAL TIPS FOR Z/OS VULNERABILITY SCANNING & PROACTIVE SECURITY MANAGEMENT

PRACTICAL TIPS FOR Z/OS VULNERABILITY SCANNING & PROACTIVE SECURITY MANAGEMENT 1 PRACTICAL TIPS FOR Z/OS VULNERABILITY SCANNING & PROACTIVE SECURITY MANAGEMENT Key Resources, Inc. [email protected] (312) KRI-0007 www.kr-in.com 2 Ray Overby SKK - ACF2 Developer (1981-1988) Key

More information

Audit Trail Administration

Audit Trail Administration Audit Trail Administration 0890431-030 August 2003 Copyright 2003 by Concurrent Computer Corporation. All rights reserved. This publication or any part thereof is intended for use with Concurrent Computer

More information

Second Edition (May 1984)

Second Edition (May 1984) 5C28-1342-1 File No. 5370-40 Program Product Resource Access Control Facility (RACF) Auditor's Guide Program Number 5740-XXH Version 1, Release 6 ---- - ----- - - - --- -- ------ -. - Second Edition (May

More information

CorreLog Alignment to PCI Security Standards Compliance

CorreLog Alignment to PCI Security Standards Compliance CorreLog Alignment to PCI Security Standards Compliance Achieving PCI DSS compliance is a process. There are many systems and countless moving parts that all need to come together to keep user payment

More information

System Virtual Machines

System Virtual Machines System Virtual Machines Introduction Key concepts Resource virtualization processors memory I/O devices Performance issues Applications 1 Introduction System virtual machine capable of supporting multiple

More information

VMware Server 2.0 Essentials. Virtualization Deployment and Management

VMware Server 2.0 Essentials. Virtualization Deployment and Management VMware Server 2.0 Essentials Virtualization Deployment and Management . This PDF is provided for personal use only. Unauthorized use, reproduction and/or distribution strictly prohibited. All rights reserved.

More information

CHAPTER 2 DATABASE MANAGEMENT SYSTEM AND SECURITY

CHAPTER 2 DATABASE MANAGEMENT SYSTEM AND SECURITY CHAPTER 2 DATABASE MANAGEMENT SYSTEM AND SECURITY 2.1 Introduction In this chapter, I am going to introduce Database Management Systems (DBMS) and the Structured Query Language (SQL), its syntax and usage.

More information

Information Security Services

Information Security Services Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual

More information

CS161: Operating Systems

CS161: Operating Systems CS161: Operating Systems Matt Welsh [email protected] Lecture 2: OS Structure and System Calls February 6, 2007 1 Lecture Overview Protection Boundaries and Privilege Levels What makes the kernel different

More information

Operating System Software

Operating System Software Operating System Software Lecture 7 The operating system Defines our computing experience. First software we see when we turn on the computer, and the last software we see when the computer is turned off.

More information

Lesson Objectives. To provide a grand tour of the major operating systems components To provide coverage of basic computer system organization

Lesson Objectives. To provide a grand tour of the major operating systems components To provide coverage of basic computer system organization Lesson Objectives To provide a grand tour of the major operating systems components To provide coverage of basic computer system organization AE3B33OSD Lesson 1 / Page 2 What is an Operating System? A

More information

Virtualization Technology. Zhiming Shen

Virtualization Technology. Zhiming Shen Virtualization Technology Zhiming Shen Virtualization: rejuvenation 1960 s: first track of virtualization Time and resource sharing on expensive mainframes IBM VM/370 Late 1970 s and early 1980 s: became

More information

USM IT Security Council Guide for Security Event Logging. Version 1.1

USM IT Security Council Guide for Security Event Logging. Version 1.1 USM IT Security Council Guide for Security Event Logging Version 1.1 23 November 2010 1. General As outlined in the USM Security Guidelines, sections IV.3 and IV.4: IV.3. Institutions must maintain appropriate

More information

Operating Systems Overview

Operating Systems Overview Operating Systems Overview No single definition, but many perspectives: Role in an overall system: Intermediary between computer hardware and everything else User view: Provides an environment, preferably

More information

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

2. From a control perspective, the PRIMARY objective of classifying information assets is to: MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected

More information

How do Users and Processes interact with the Operating System? Services for Processes. OS Structure with Services. Services for the OS Itself

How do Users and Processes interact with the Operating System? Services for Processes. OS Structure with Services. Services for the OS Itself How do Users and Processes interact with the Operating System? Users interact indirectly through a collection of system programs that make up the operating system interface. The interface could be: A GUI,

More information

Example of Standard API

Example of Standard API 16 Example of Standard API System Call Implementation Typically, a number associated with each system call System call interface maintains a table indexed according to these numbers The system call interface

More information

Scheduling in SAS 9.3

Scheduling in SAS 9.3 Scheduling in SAS 9.3 SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc 2011. Scheduling in SAS 9.3. Cary, NC: SAS Institute Inc. Scheduling in SAS 9.3

More information

Systems Software. Introduction to Information System Components. Chapter 1 Part 2 of 4 CA M S Mehta, FCA

Systems Software. Introduction to Information System Components. Chapter 1 Part 2 of 4 CA M S Mehta, FCA Systems Software Introduction to Information System Components Chapter 1 Part 2 of 4 CA M S Mehta, FCA 1 Systems Software Learning Objects Task Statements 1.1 Identify deployment of different components

More information

PREPARED BY: AUDIT PROGRAM Author: Lance M. Turcato. APPROVED BY: Logical Security Operating Systems - Generic. Audit Date:

PREPARED BY: AUDIT PROGRAM Author: Lance M. Turcato. APPROVED BY: Logical Security Operating Systems - Generic. Audit Date: A SYSTEMS UNDERSTANDING A 1.0 Organization Objective: To ensure that the audit team has a clear understanding of the delineation of responsibilities for system administration and maintenance. A 1.1 Determine

More information

CA Auditor for z/os. Technical Reference. r12. Second Edition

CA Auditor for z/os. Technical Reference. r12. Second Edition CA Auditor for z/os Technical Reference r12 Second Edition This documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

SHARPCLOUD SECURITY STATEMENT

SHARPCLOUD SECURITY STATEMENT SHARPCLOUD SECURITY STATEMENT Summary Provides details of the SharpCloud Security Architecture Authors: Russell Johnson and Andrew Sinclair v1.8 (December 2014) Contents Overview... 2 1. The SharpCloud

More information

Fault Tolerant Servers: The Choice for Continuous Availability on Microsoft Windows Server Platform

Fault Tolerant Servers: The Choice for Continuous Availability on Microsoft Windows Server Platform Fault Tolerant Servers: The Choice for Continuous Availability on Microsoft Windows Server Platform Why clustering and redundancy might not be enough This paper discusses today s options for achieving

More information

Chapter 3 Operating-System Structures

Chapter 3 Operating-System Structures Contents 1. Introduction 2. Computer-System Structures 3. Operating-System Structures 4. Processes 5. Threads 6. CPU Scheduling 7. Process Synchronization 8. Deadlocks 9. Memory Management 10. Virtual

More information

Fault Tolerant Servers: The Choice for Continuous Availability

Fault Tolerant Servers: The Choice for Continuous Availability Fault Tolerant Servers: The Choice for Continuous Availability This paper discusses today s options for achieving continuous availability and how NEC s Express5800/ft servers can provide every company

More information

Page 1 of 5. IS 335: Information Technology in Business Lecture Outline Operating Systems

Page 1 of 5. IS 335: Information Technology in Business Lecture Outline Operating Systems Lecture Outline Operating Systems Objectives Describe the functions and layers of an operating system List the resources allocated by the operating system and describe the allocation process Explain how

More information

Analyzing IBM i Performance Metrics

Analyzing IBM i Performance Metrics WHITE PAPER Analyzing IBM i Performance Metrics The IBM i operating system is very good at supplying system administrators with built-in tools for security, database management, auditing, and journaling.

More information

Lexmark Printers and Multifunction Products: Hard Disk and Non-Volatile Memory Guide

Lexmark Printers and Multifunction Products: Hard Disk and Non-Volatile Memory Guide Lexmark Printers and Multifunction Products: Hard Disk and Non-Volatile Memory Guide This guide applies to the following Lexmark devices: Printers C780 C782 C935 T640 T642 T644 Multifunction Products X646

More information

CPS221 Lecture: Operating System Structure; Virtual Machines

CPS221 Lecture: Operating System Structure; Virtual Machines Objectives CPS221 Lecture: Operating System Structure; Virtual Machines 1. To discuss various ways of structuring the operating system proper 2. To discuss virtual machines Materials: 1. Projectable of

More information

RACF & Payment Card Industry (PCI) Data Security Standards RUGONE May 2012

RACF & Payment Card Industry (PCI) Data Security Standards RUGONE May 2012 RACF & Payment Card Industry (PCI) Data Security Standards Robert S. Hansel Lead RACF Consultant [email protected] 617 969 9050 Robert S. Hansel Robert S. Hansel is Lead RACF Specialist and founder

More information

Mail 2 ZOS FTPSweeper

Mail 2 ZOS FTPSweeper Mail 2 ZOS FTPSweeper z/os or OS/390 Release 1.0 February 12, 2006 Copyright and Ownership: Mail2ZOS and FTPSweeper are proprietary products to be used only according to the terms and conditions of sale,

More information

GFI White Paper PCI-DSS compliance and GFI Software products

GFI White Paper PCI-DSS compliance and GFI Software products White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption

More information

Using PowerBroker Identity Services to Comply with the PCI DSS Security Standard

Using PowerBroker Identity Services to Comply with the PCI DSS Security Standard White Paper Using PowerBroker Identity Services to Comply with the PCI DSS Security Standard Abstract This document describes how PowerBroker Identity Services Enterprise and Microsoft Active Directory

More information

Intel RAID Controller Premium Feature Key Training

Intel RAID Controller Premium Feature Key Training Intel RAID Controller Premium Feature Key Training AXXRPFKSNSH Snapshot Recovery AXXRPFKDE Self Encrypting Drive (SED) AXXRPFKSSD SSD Cache with Fastpath Note: Graphics for this training is based on RAID

More information

Origins of Operating Systems OS/360. Martin Grund HPI

Origins of Operating Systems OS/360. Martin Grund HPI Origins of Operating Systems OS/360 HPI Table of Contents IBM System 360 Functional Structure of OS/360 Virtual Machine Time Sharing 2 Welcome to Big Blue 3 IBM System 360 In 1964 IBM announced the IBM-360

More information

CMSC 421, Operating Systems. Fall 2008. Security. URL: http://www.csee.umbc.edu/~kalpakis/courses/421. Dr. Kalpakis

CMSC 421, Operating Systems. Fall 2008. Security. URL: http://www.csee.umbc.edu/~kalpakis/courses/421. Dr. Kalpakis CMSC 421, Operating Systems. Fall 2008 Security Dr. Kalpakis URL: http://www.csee.umbc.edu/~kalpakis/courses/421 Outline The Security Problem Authentication Program Threats System Threats Securing Systems

More information

Full and Para Virtualization

Full and Para Virtualization Full and Para Virtualization Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF x86 Hardware Virtualization The x86 architecture offers four levels

More information

CA TPX Session Management r5.3

CA TPX Session Management r5.3 PRODUCT SHEET CA TPX Session Management CA TPX Session Management r5.3 CA TPX Session Management (CA TPX) helps you manage user menus for accessing VTAM applications on the mainframe while offering end

More information

FortiOS Handbook - Hardening your FortiGate VERSION 5.2.3

FortiOS Handbook - Hardening your FortiGate VERSION 5.2.3 FortiOS Handbook - Hardening your FortiGate VERSION 5.2.3 FORTINET DOCUMENT LIBRARY http://docs.fortinet.com FORTINET VIDEO GUIDE http://video.fortinet.com FORTINET BLOG https://blog.fortinet.com CUSTOMER

More information

High performance ETL Benchmark

High performance ETL Benchmark High performance ETL Benchmark Author: Dhananjay Patil Organization: Evaltech, Inc. Evaltech Research Group, Data Warehousing Practice. Date: 07/02/04 Email: [email protected] Abstract: The IBM server iseries

More information

COS 318: Operating Systems. Virtual Machine Monitors

COS 318: Operating Systems. Virtual Machine Monitors COS 318: Operating Systems Virtual Machine Monitors Kai Li and Andy Bavier Computer Science Department Princeton University http://www.cs.princeton.edu/courses/archive/fall13/cos318/ Introduction u Have

More information

z/os Performance Monitoring Tools Shoot-Out: ASG, BMC, CA, Rocket

z/os Performance Monitoring Tools Shoot-Out: ASG, BMC, CA, Rocket z/os Performance Monitoring Tools Shoot-Out: ASG, BMC, CA, Rocket Gary Henderson ASG (Allen Systems Group) 1 March 2011, 9:30 AM-10:30 AM Session Number 8695 Installation and Maintenance Installation and

More information

CA Dispatch. Best Practices Guide. Release 11.7

CA Dispatch. Best Practices Guide. Release 11.7 CA Dispatch Best Practices Guide Release 11.7 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is for your

More information

Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75

Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75 Plain English Guide To Common Criteria Requirements In The Field Device Protection Profile Version 0.75 Prepared For: Process Control Security Requirements Forum (PCSRF) Prepared By: Digital Bond, Inc.

More information

Big Data Storage in the Cloud

Big Data Storage in the Cloud Big Data Storage in the Cloud Russell Witt Scott Arnett CA Technologies Tuesday, March 11 Session Number 15288 Tuesday, March 11Tuesday, March 11 Abstract Need to reduce the cost of managing storage while

More information

An Introduction to the ARM 7 Architecture

An Introduction to the ARM 7 Architecture An Introduction to the ARM 7 Architecture Trevor Martin CEng, MIEE Technical Director This article gives an overview of the ARM 7 architecture and a description of its major features for a developer new

More information

Central Agency for Information Technology

Central Agency for Information Technology Central Agency for Information Technology Kuwait National IT Governance Framework Information Security Agenda 1 Manage security policy 2 Information security management system procedure Agenda 3 Manage

More information

Chapter 3: Operating-System Structures. Common System Components

Chapter 3: Operating-System Structures. Common System Components Chapter 3: Operating-System Structures System Components Operating System Services System Calls System Programs System Structure Virtual Machines System Design and Implementation System Generation 3.1

More information

SAN Conceptual and Design Basics

SAN Conceptual and Design Basics TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer

More information

Virtualization. Explain how today s virtualization movement is actually a reinvention

Virtualization. Explain how today s virtualization movement is actually a reinvention Virtualization Learning Objectives Explain how today s virtualization movement is actually a reinvention of the past. Explain how virtualization works. Discuss the technical challenges to virtualization.

More information

Memory Management Outline. Background Swapping Contiguous Memory Allocation Paging Segmentation Segmented Paging

Memory Management Outline. Background Swapping Contiguous Memory Allocation Paging Segmentation Segmented Paging Memory Management Outline Background Swapping Contiguous Memory Allocation Paging Segmentation Segmented Paging 1 Background Memory is a large array of bytes memory and registers are only storage CPU can

More information

The Lagopus SDN Software Switch. 3.1 SDN and OpenFlow. 3. Cloud Computing Technology

The Lagopus SDN Software Switch. 3.1 SDN and OpenFlow. 3. Cloud Computing Technology 3. The Lagopus SDN Software Switch Here we explain the capabilities of the new Lagopus software switch in detail, starting with the basics of SDN and OpenFlow. 3.1 SDN and OpenFlow Those engaged in network-related

More information

SYSTEM ecos Embedded Configurable Operating System

SYSTEM ecos Embedded Configurable Operating System BELONGS TO THE CYGNUS SOLUTIONS founded about 1989 initiative connected with an idea of free software ( commercial support for the free software ). Recently merged with RedHat. CYGNUS was also the original

More information

Information Security Policy. Policy and Procedures

Information Security Policy. Policy and Procedures Information Security Policy Policy and Procedures Issue Date February 2013 Revision Date February 2014 Responsibility/ Main Point of Contact Neil Smedley Approved by/date Associated Documents Acceptable

More information