21 Things You Didn t Used to Know About RACF



Similar documents
How to Secure Mainframe FTP

New Security Options in DB2 for z/os Release 9 and 10

An Often Overlooked Security Hole in Enterprise Extender and Mainframe Networks By Stu Henderson and Peter Hager

z/os VULNERABILITY SCANNING AND MANAGEMENT Key Resources, Inc. (312) KRI

RACF & Payment Card Industry (PCI) Data Security Standards RUGONE May 2012

Agenda. z/os Ethical Hacking Vulnerability Scanning & Pen Testing. Mark Wilson RSM Partners. Session Number: l Disclaimer.

Mark Wilson Session Details: The Introduction

Utility Mainframe System Administration Training Curriculum

NY/TB RUG: The Mainframe isn t Dead: Call the Doctor not the Undertaker with Real-time Enterprise Alert Correlation

Second Edition (May 1984)

PREPARED BY: AUDIT PROGRAM Author: Lance M. Turcato. APPROVED BY: Logical Security Operating Systems - Generic. Audit Date:

Top 10 Tips for z/os Network Performance Monitoring with OMEGAMON. Ernie Gilman IBM. August 10, 2011: 1:30 PM-2:30 PM.

z/os Curriculum Job Control Language (JCL) Curriculum JES Curriculum WebSphere Curriculum TSO/ISPF for z/os Curriculum

Enterprise Security CPA for IBM MF

RACF PERFORMANCE TUNING

Top 10 Tips for z/os Network Performance Monitoring with OMEGAMON Ernie Gilman

CA Top Secret r15 for z/os

How To Use The Microsoft Platform Server On Windows (Windows) And Windows 7 (Windows 7) (Windows 8) (For Windows) (Powerbook) (Amd64) (Operations) (Orchestra

CICS Transactions Measurement with no Pain

CA Deliver r11.7. Business value. Product overview. Delivery approach. agility made possible

Capitalware's Commercial, Licensed As Free & Open Source Products Explained

PCI DSS, z/os and Keeping You from Becoming a News Headline

OS/2: TELNET Access Method

DCH File Transfer Application User Manual

Enterprise Security: Building On All Your Assets

PRACTICAL TIPS FOR Z/OS VULNERABILITY SCANNING & PROACTIVE SECURITY MANAGEMENT

Someone may be manipulating information in your organization. - and you may never know about it!

SSH Secure Client (Telnet & SFTP) Installing & Using SSH Secure Shell for Windows Operation Systems


Introduction to Printing from z/os

New SMTP client for sending Internet mail

WS_FTP Server. User s Guide. Software Version 3.1. Ipswitch, Inc.

Enterprise Security Interests Require SSL with telnet server from outside the LAN

Splunk/Ironstream and z/os IT Ops

Setup Instructions for Secure Hummingbird FTP

Communications Access Methods for SAS/CONNECT 9.4 and SAS/SHARE 9.4 Second Edition

z/os Firewall Technology Overview

Nixu SNS Security White Paper May 2007 Version 1.2

Achieving PCI COMPLIANCE with the 2020 Audit & Control Suite.

RFG Secure FTP. Web Interface

Enforcive /Cross-Platform Audit

Java on z/os. Agenda. Java runtime environments on z/os. Java SDK 5 and 6. Java System Resource Integration. Java Backend Integration

CA TPX Session Management r5.3

Compiler Forecast: Cloudy with. Cloud Computing for your z/os compilers

Introduction to Mainframe (z/os) Network Management

Implementing Secure Sockets Layer on iseries

Medicare Managed Care Manual

Beyond Best Practices: The DISA STIGs

TIBCO MFT Platform Server for Windows User Guide. Software Release March 2012

Change is Coming: z/os Mail Overview and Futures

Security Maintenance Practices. IT 4823 Information Security Administration. Patches, Fixes, and Revisions. Hardening Operating Systems

DEDUCTION PROGRAM HANDBOOK

Access Control and Audit Trail Software

IBM i Version 7.2. Security Service Tools

FTP Service Reference

Tivoli Access Manager Agent for Windows Installation Guide

Security Service tools user IDs and passwords

OS/390 Firewall Technology Overview

Network setup and troubleshooting

Setting Up Database Security with Access 97

Distributed File Systems Part I. Issues in Centralized File Systems

LES LOGICIELS MAINFRAME

fåíéêåéí=péêîéê=^çãáåáëíê~íçêûë=dìáçé

Communications Access Methods for SAS/CONNECT 9.3 and SAS/SHARE 9.3 Second Edition

User's Guide. Product Version: Publication Date: 7/25/2011

CA Auditor for z/os. System Review Checklist. r12. Second Edition

TN3270 Security Enhancements

Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2

CA XCOM Data Transport for z/os

The Comprehensive Guide to PCI Security Standards Compliance

CMSC 421, Operating Systems. Fall Security. URL: Dr. Kalpakis

GETTING STARTED GUIDE

CTS2134 Introduction to Networking. Module Network Security

Introduction to the new mainframe Chapter 12 - Network Communications on z/os

CorreLog Alignment to PCI Security Standards Compliance

How To Login To The Mft Internet Server (Mft) On A Pc Or Macbook Or Macintosh (Macintosh) With A Password Protected (Macbook) Or Ipad (Macro) (For Macintosh) (Macros

CA NetMaster Network Management for TCP/IP

HP IMC Firewall Manager

IBM InfoSphere Guardium for DB2 on z/os Technical Deep Dive

Talk-101 User Guides Web Content Filter Administration

Security zsecure Admin and Audit for RACF Version Getting Started GI

ESM s management across multi-platforms eliminates the need for various account managers.

Retailman POS Multi-location Setup

CA Chorus Software Manager

Nalini Elkins' TCP/IP Performance Management, Security, Tuning, and Troubleshooting on z/os

CA Auditor for z/os. Technical Reference. r12. Second Edition

Jim2 ebusiness Framework Installation Notes

Medical Services Administration Bureau of Medicaid Financial Services. LTC File Transfer Application. User Manual

Synthetic Application Monitoring

UPSTREAM for Linux on System z

Top 10 Tips for z/os Network Performance Monitoring with OMEGAMON Session 11899

Backup and Recovery Procedures

Using the z/os SMB Server. to access z/os data from Windows. -- Hands-On Lab Session

ACCESSING PAYROLL REPORTS USING RMDS

IMS Buzz - Mardi 10 Avril IMS Explorer for Dev Presentation & Demo

Host Hardening. OS Vulnerability test. CERT Report on systems vulnerabilities. (March 21, 2011)

Controlling Remote Access to IBM i

Crypto and Disaster Recovery. Greg Boyd

Transcription:

21 Things You Didn t Used to Know About RACF (A Technical Update for IT Auditors) Stuart Henderson The Henderson Group (301) 229-7187 1 Here Are 21 Things Auditors Should Know About RACF One Person s Opinion, But You Need to be Aware of the Issues in Any Case And of Course, It s Easier When You Present Your Findings in the Light of the Specific Business Risk and Expected Cost to Reduce the Risk. 2 1

RACF is, of Course IBM s Resource Access Control Facility, the Software on IBM Mainframe Computers with the MVS Operating System That Checks Out Userids and Passwords, and Controls Who Can Access What Datasets (Files) and Resources. Market Leading Software Which Competes with ACF2 and TopSecret, Both from Computer Associates. 3 1) RACF Now Supports Mixed Case Passwords You Can Force Mixed Case with SETR To allow upper and lower case passwords for userids: SETR PASSWORD(MIXEDCASE) and to undo it: SETR PASSWORD(NOMIXEDCASE) (Don't turn this one on until you are sure you want it. It's very hard to turn it off after many users have entered passwords with lower case characters.) 4 2

1A) RACF Now Supports Mixed Case Passwords To set new rules for passwords to accept upper and lower case letters in passwords: SETR PASSWORD(RULE5 (LENGTH(6:8) ccc (1:8))) where ccc is one of the new options: MIXEDCONSONANT, MIXEDVOWEL, or MIXEDNUM. To set a new minimum password change interval (for example, one day), issue: SETR PASSWORD(MINCHANGE(1)) 5 1B) RACF Now Supports Mixed Case Passwords Of course, You Shouldn t Activate This Until All Programs with Signon Screens Are Ready, and Users Are Properly Trained For More Info Please See Issue 67 of the RACF User News at: www.stuhenderson.com/xrugntxt.htm 6 3

2) RACF Now Supports Long Password Phrases as Well as Passwords Here is the Syntax to Add a Password Phrase to a User Record: ALU USER02 + PHRASE + ( July14IsBastilleDayLikeJuly4, ButInFrance ) Password Phrases Can Have Length of 14-100 Characters. Use Exit to Make This 9-100. 7 2A) RACF Now Supports Password Phrases as Well as Passwords Can t Contain the Userid (uppercase or lowercase, or mixed ) Must contain at least 2 alphabetic characters (A Z, a z) at least 2 non-alphabetic characters (numerics, punctuation, or special characters) not more than 2 consecutive identical characters that are identical For More Info Please See Issue 69 of the RACF User News at: www.stuhenderson.com/xrugntxt.htm 8 4

3) RACF s Erase On Scratch Function No Longer Has Performance Problems New Hardware Features in Disk Drives, Plus Electronic Caching in Control Units Have Solved the Old Performance Problem. RACF Lets You Turn On EOS One Dataset at a Time. 9 4) You Need to Audit RACF with Tape Management Software Problems Include: 17 Character DSNAME problem Residual Data Bypass Label Processing PROTECTALL with Foreign Tapes 10 5

4A) You Need to Audit RACF with Tape Management Software New Parmlib Options in Member DEVSUPxx Make This Much Easier: TAPEAUTHDSN TAPEAUTHFC1 TAPEAUTHRC4 TAPEAUTHRC8 With the TMS, These Let You Turn On PROTECTALL, Protect Tapes, and Allow Foreign Tapes, and Control Multi-File Tapes 11 4B) OPEN Makes Two Checks for SL Tapes VOL1 123456 HDR1 OLL.FILE.G0014V00 //DD1 DD DSN=PROD.PAYROLL.FILE.G0014V00, //DD2 DD DSN=STU.XX.OLL.FILE.G0014V00, 1) Compare DSNAME in Label Against DD Card 2) Call RACF with RACHECK 12 6

4C) You Need to Audit RACF with Tape Management Software And While You re At It, You Might Address Tape Dataset Encryption, Key Management, and the New Encrypting Tape Drives. For More Info, Please See the Article at http://www.stuhenderson.com/tapesec1.pdf 13 5) The Program Named AMASPZAP No Longer Needs to Be Protected Despite What Some Audit Checklists Say. IBM has Rewritten It Completely to Remove the Security Problem How Should the RACF Administrator Determine Which Programs to Protect? 14 7

5A) The Program Named AMASPZAP No Longer Needs to Be Protected For More Info, Check This IBM Manual in the Chapter on SPZAP in the Section Called Operating Considerations: Manual Number: GA22-7589-10 z/os V1R8.0 MVS Diagnosis Tools and Service Aids You Can Download it For Free From: http://publibz.boulder.ibm.com/epubs/pdf/iea2v170.pdf 15 6) Two Resource Classes Tell You Differently Whether They Are Active For the PROGRAM Class, Look at the First Line of SETR LIST for Some Version of: WHEN(PROGRAM) Tells You That the PROGRAM Class is Active. 16 8

6A) Two Resource Classes Tell You Differently Whether They Are Active For the GLOBAL Class, Check the DSMON Global Access Table Report 17 7) IBM Gives Us UNIX Under the Control of MVS (Called USS) It s Hard to Turn It Off. It Uses RACF for Security. It s the Most Secure, Most Standard, Most Reliable, Most Scalable UNIX You ll Find Anywhere. 18 9

7A) IBM Gives Us UNIX Under Control of MVS for Free (Called USS) You Should Address It in a Separate Audit. It Replaces /etc/passwd with RACF 19 8) RACF Secures the Free TCP/IP IBM Gives Us with MVS and USS You Should Address It in a Separate Audit. Get a Copy of the TCP/IP Control File for Your Work Papers You Can for Example Use RACF to Control Access to Ports and to IP Addresses. 20 10

8A) RACF Secures the Free TCP/IP IBM Gives Us with MVS and USS Get to Know the SERVAUTH Resource Class in RACF It Lets You Control Access to IP Addresses, Ports, and Other Network Resources in RACF The Policy Agent Software Provides Firewall-Like Services, Such as Packet Filtering and Intrusion Detection 21 9) RACF Secures the TCP/IP Daemons Such as FTP, Telnet, etc. Should Be Addressed in a Separate Audit Get the Control File for Each Daemon In Scope To Learn What Daemons Are Active, Issue the TSO Command NETSTAT. (It s Like the NETSTAT You Know from UNIX and Windows.) 22 11

10) FTP on the Mainframe Needs Extra Attention Because: It Can Be Used to Upload and Download both USS Files and MVS Datasets. It Can Access Print Files on the Spool It Can Talk To DB2 It Can Submit Batch Jobs to JES. (The RACF Switch BATCHALLRACF Becomes More Important Now.) 23 11) Telnet on the Mainframe Needs Extra Attention Because: It Can Be Used to Sign Onto Any Applid (like CICS or TSO), Not Just to USS). It Opens the Mainframe World to the Internet 24 12

11B) Telnet on the Mainframe Needs Extra Attention Because: It Increases the Need to Make Sure That Every Applid Calls RACF to Check Out the Userid and Password. Its Control File Can Restrict What Applids You Can Telnet To (See ALLOWAPPL) The Control File Can Also Be Used to Provide SSL Encryption with TCP/IP 25 12) Mainframes Software (CICS, DB2, MQ, Others) Talk Over the Internet Guess what: Separate Audits Each of These (CICS etc) Has a Control File That Can Specify SSL Encryption Over the Internet 26 13

13) RACF Secures the Mainframe Web Server (httpd) Comparable to Apache on UNIX or IIS on Windows Can Log Internet Users on Without a Password Should be a Separate Audit Control File Can Specify SSL Encryption Over the Internet and How Users Are ID d 27 14) RACF Userids Can Have the RESTRICTED Attribute This Prevents the Userid From Gaining Access to Data or a Resource by Means of the UACC, or the Global Access Table or ID(*) Permission Designed for Userids Logged on with the Web Server to Limit Their Access to Just What They Are Explicitly Allowed 28 14

15) RACF Userids Can Have the Protected Attribute Which Means They Have No Password and Can Only Be Used with Automatic Logons Designed for Use with All Started Tasks, All Production Batch Jobs, and Preset Terminal Security in CICS 29 16) SNA is Here to Stay, And Needs to Be Secured Ask The VTAM System Programmer the Name of Your APPN Network, the Names of the Networks It Connects to, And the Names of the Networks They Connect To Many VTAM Parameters Involved. See SYS1.VTAMLST 30 15

16A) SNA is Here to Stay, And Needs to Be Secured RACF Resource Classes: APPCLU and VTAMAPPL A Separate Audit of Course For More Info, Please See www.net-q.com 31 16) RACF Should Be Used to Protect NJE and RJE (NJE is Network Job Entry; RJE is Remote Job Entry. Both Allow Batch Jobs, Printouts, and Operator Commands to Be Sent Over Phone Lines to Your Mainframe) Paths Into the System Protect with NODES, WRITER, FACILITY, and JESINPUT Resource Classes and BATCHALLRACF 32 16

16A) RACF Should Be Used to Protect NJE and RJE Other Organizations Can Submit Batch Jobs, Operator Commands, and Printouts Over NJE or RJE. Learn Names and Locations from JES System Programmer 33 17) OPERCMDS Resource Class Restricts Operator Commands MVS, JES, and Other Operator Commands Commands Can Be Entered at Consoles, But Also in Batch Jobs, in Parmlibs, From Programs, TSO, NJE, and RJE 34 17

18) The JESSPOOL Resource Class Protects Data in Printouts Data Can Otherwise Be Browsed by Unauthorized Users from Many Different Programs Such as SDSF and FTP SDSF Functions Can Be Further Restricted with the SDSF Resource Class in RACF 35 19) The VTAMAPPL Resource Class Protects VTAM Applids Risk of Some User Writing a Program That Spoofs an Applid, Uses It to Harvest Userids and Passwords Easy to Implement (An applid is of course a program like CICS or TSO that lets a user talk to it from a terminal, that is: a program with a signon screen) 36 18

20) Some Shops Have Two, One or Even Zero OPERATIONS Userids (Excepting of Course IBMUSER, Which Should Be Revoked) Use of FACILITY Class Rules with Names Starting STGADMIN. DASDVOL Resource Class Firecall Userids 37 20A) Some Shops Have Two, One or Even Zero OPERATIONS Userids In Google, Type the Keywords RACF, Stinkin, and OPERATIONS to find presentations showing how. Less Need for OPERATIONS When IPLs Occur Only Once Every Few Months How Would You Handle an Audit with 17 OPERATIONS Userids? 38 19

20B) Some Shops Have Two, One or Even Zero OPERATIONS Userids Of Course, There is No Correct Number of OPERATIONS Userids. So an Auditor Would Look to See Who is Responsible for Approving Who Gets OPERATIONS (and SPECIAL), How It Is Documented, and How the Approval Forms Match the RACF Rules: How is the Decision Made and Who is Responsible 39 21) Senseless to Ask RACF Admin to Review the Violations Report What Should He Do with a Violation? He Has No Authority to Change Others Behavior Not Fair to Make Him Responsible When He Doesn t Have the Authority to Do Anything About It. A Recommendation That Irritates Auditees, Since It Takes Time and Effort, But Makes No Difference More Important to Look for Trends, Patterns, Clusters 40 20

21A)Senseless to Ask RACF Admin to Review the Violations Report You Can t Manage It If You Don t Measure It Trend Over Time of Invalid Passwords Per Day, Other Measures 41 22) Next Release of RACF and z/os (1.11) Has Important New Features Digital Signatures and Verification of Program Modules to Identify Unauthorized Modifications (Effect on Change Control Audits) More Health Checker Checks New Identity Propagation Function to Associate Distributed Identities with RACF Userids 42 21

We Hope This Has Added to Your RACF Audit Knowledge I Welcome Your Comments, Questions, Suggestions: (301) 229-7187 stu@stuhenderson.com The Best Auditing is a Form Of Consulting 43 22