10195 Crypto And Disaster Recovery



Similar documents
Crypto and Disaster Recovery. Greg Boyd

IBM Systems and Technology Group Technical Conference

The Consolidation Process

CS z/os Application Enhancements: Introduction to Advanced Encryption Standards (AES)

Arwed Tschoeke, Systems Architect IBM Systems and Technology Group

z/os Cryptographic Services - ICSF Best Practices

Backups in the Cloud Ron McCracken IBM Business Environment

Monitoring Linux Guests and Processes with Linux Tools

Understanding Digital Certificates on z/os Vanguard Las Vegas, NV Session AST3 June 26th 2012

SuSE Linux High Availability Extensions Hands-on Workshop

IBM Systems Director Navigator for i5/os New Web console for i5, Fast, Easy, Ready

Managed Services - A Paradigm for Cloud- Based Business Continuity

SHARE in Pittsburgh Session 15591

CS z/os Network Security Configuration Assistant GUI

z/os Basics: z/os UNIX Shared File System environment and how it works

Accelerate with ATS DS8000 Hardware Management Console (HMC) Best practices and Remote Support Configuration September 23rd, 2014.

Session Title: Cloud Computing 101 What every z Person must know

IBM Tivoli Web Response Monitor

Digital Certificates Demystified

IBM Tivoli Storage FlashCopy Manager Overview Wolfgang Hitzler Technical Sales IBM Tivoli Storage Management

Cloud Computing with xcat on z/vm 6.3

Tools for Managing Big Data Analytics on z/os

IBM Crypto Server Management General Information Manual

Performance and scalability of a large OLTP workload

Integrated and reliable the heart of your iseries system. i5/os the next generation iseries operating system

System z Batch Network Analyzer Tool (zbna) - Because Batch is Back!

Lisa Gundy IBM Corporation. Wednesday, March 12, 2014: 11:00 AM 12:00 PM Session 15077

Encryption Facility for z/os Version 1.10

The zevent Mobile Application

Implementing Tivoli Storage Manager on Linux on System z

IBM WebSphere Data Interchange V3.3

How-to Access RACF From Distributed Platforms

DB2 Database Demonstration Program Version 9.7 Installation and Quick Reference Guide

Featuring: GUI screen designer to edit DDS source for 5250 Display Files

PKI Services: The Best Kept Secret in z/os

Aktuelles aus z/vm, z/vse, Linux on System z

Migrating LAMP stack from x86 to Power using the Server Consolidation Tool

z/osmf Software Deployment Application- User Experience Enhancement Update

z/os Basics: z/os UNIX Shared File System environment and how it works

Understanding Digital Certificates on z/os Share Anaheim, CA Session 8349 March 2nd 2011

Deploying a private database cloud on z Systems

How To Write An Architecture For An Bm Security Framework

Creating a Cloud Backup Service. Deon George

UPSTREAM for Linux on System z

Forecasting Performance Metrics using the IBM Tivoli Performance Analyzer

Rapid Data Backup and Restore Using NFS on IBM ProtecTIER TS7620 Deduplication Appliance Express IBM Redbooks Solution Guide

How to Deliver Measurable Business Value with the Enterprise CMDB

Positioning the Roadmap for POWER5 iseries and pseries

z/tpf FTP Client Support

IBM Application Hosting EDI Services Expedite software adds Secure Sockets Layer TCP/IP support

SMP/E V3.5 Hands-on Lab: Learning to use SMP/E FIXCATs

Rational Developer for IBM i (RDi) Introduction to RDi

Getting Started With WebSphere Liberty Profile on z/os

TSM (Tivoli Storage Manager) Backup and Recovery. Richard Whybrow Hertz Australia System Network Administrator

z/os V1R11 Communications Server system management and monitoring

Java auf IBM z13 Ein Performance Update

Sharing Secrets Using Encryption Facility

R/3 and J2EE Setup for Digital Signature on Form 16 in HR Systems

FICON Extended Distance Solution (FEDS)

IBM Replication Solutions for Business Continuity Part 1 of 2 TotalStorage Productivity Center for Replication (TPC-R) FlashCopy Manager/PPRC Manager

IBM Lotus Enterprise Integrator (LEI) for Domino. Version August 17, 2010

Active Directory Synchronization with Lotus ADSync

Backup Solutions with Linux on System z and z/vm. Wilhelm Mild IT Architect IBM Germany mildw@de.ibm.com 2011 IBM Corporation

Management with IBM Director

Database lifecycle management

Total Cost of Ownership (TCO): Comparing System z and Distributed Platforms

IBM Software Group. Lotus Domino 6.5 Server Enablement

Secure MobiLink Synchronization using Microsoft IIS and the MobiLink Redirector

What s the best disk storage for my i5/os workload?

WebSphere Process Server v6.2 WebSphere Enterprise Service Bus v6.2 WebSphere Integration Developer v6.2

z/os V1R11 Communications Server System management and monitoring Network management interface enhancements

z/os Firewall Technology Overview

New SMTP client for sending Internet mail

Tivoli Security Compliance Manager. Version 5.1 April, Collector and Message Reference Addendum

Making z/vm and Linux Guests Production Ready Best Practices

Integration of SAP Netweaver User Management with LDAP

z/os 1.12 zfs Shared File System Update

SAP Service Tools for Performance Analysis

Redbooks Paper. Local versus Remote Database Access: A Performance Test. Victor Chao Leticia Cruz Nin Lei

How To Write An Ets Request For Proposal (Rfp)

High Availability for Linux on IBM System z Servers

Performance of a webapp.secure Environment

Budget Control by Cost Center

How To Understand And Understand The Basic Principles Of An Ansper System

DataPower z/os crypto integration

SAP Central Process Scheduling (CPS) 8.0 by Redwood

Java Application Performance Analysis and Tuning on IBM System i

How To Use Attix5 Pro For A Fraction Of The Cost Of A Backup

RUN BETTER Become a Best-Run Business with Remote Support Platform for SAP Business One

Getting Started with Digital Certificates Part II (RACDCERT)

Oracle on System z Linux- High Availability Options Session ID 252

How to Configure Access Control for Exchange using PowerShell Cmdlets A Step-by-Step guide

USDL XG WP3 SAP use case. Kay Kadner

DB2 Database Demonstration Program Version 10.5 Installation and Quick Reference Guide

Transcription:

Crypto And Disaster Recovery Greg Boyd (boydg@us.ibm.com) Atlanta, GA Permission is granted to SHARE to publish this presentation in the SHARE Proceedings. IBM retains its right to distribute copies of this presentation to whomever it chooses.

Agenda Clear key / Secure key / Protected key Hardware CCF/CPACF/PCI Usage Domains Implications of Different Architectures How are you (What products are) using the crypto infrastructure? Restoring the DR environment Encrypting tape drives Encryption Facility Master Keys TKE Page 2

Clear Key Processing Encryption Request User Clear Key Value Data to be Encrypted/Decrypted Encryption/Decryption Services Key Repository Process Encryption Request Encrypt/Decrypt User Data with User Clear Key Page 3

Secure Key Processing Encryption Request Enciphered User Secure Key Value Data to be Encrypted/Decrypted Secure, Tamper-Resistant Device Key Repository Master Key Recover User Secure Key Decrypt Enciphered/User Key with Master Key Process Encryption Request Encrypt/Decrypt User Data with Deciphered User Key Page 4

CPACF Protected Key - Key Wrapping CPACF Wrapped key cached in ICSF address space in. Source key is stored in CKDS as a CCA MK wrapped key. CPACF Wrapped Key CPACF Wrapped Key ICSF ICSF System z System z Millicode Millicode Secure Key Cleartext Key CPACF CPACF CPACF Wrapping Key Secure Key (Default DATA key) Software Hardware Secure Key Cleartext Key CKDS Crypto Express3 CCA Master Key CPACF Wrapping key resides in protected HSA storage and is not visible or operating system. Create a key ABCD, store as secure key (i.e. encrypted under Master Key, MK) E MK (x ABCD ) => x 4A!2 Execute CSNBSYE (clear key API) with that key and text to be encrypted of MY MSG ICSF will pass key value x 4A!2 to CEX3, recover original key value, then wrap it using wrapping key D MK (x 4A!2 ) => x ABCD E WK (x ABCD ) => x *94E ICSF will pass wrapped key value to CPACF, along with message to be encrypted In CPACF, unwrap key and perform encryption D wk (x *94E ) => x ABCD E x ABCD ( MY MSG ) => ciphertext of x 81FF18019717D183 Page 5

Clear Key / Secure Key / Protected Key Clear Key key may be in the clear, at least briefly, somewhere in the environment Secure Key key value does not exist in the clear outside of the HSM (secure, tamper-resistant boundary of the card) Protected Key key value does not exist outside of physical hardware, although the hardware may not be tamper-resistant TechDoc WP100647 A Clear Key / Secure Key / Protected Key Primer Page 6

System z Clear Key Cryptographic Hardware z890/z990, z9 (EC & BC), z10 (EC (GA3) & BC (GA2)), z196/z114 CP Assist for Cryptographic Function (CPACF) DES (56-, 112-, 168-bit), new chaining options AES (128-, -192, 256-bit), new chaining options SHA-1, SHA-256, SHA-512 (SHA-2) PRNG Protected Key TechDoc WP100810 A Synopsis of System z Crypto Hardware FC #3863 Page 7

System z Secure Key Crypto Hardware PCIXCC/PCICA Crypto Express2 (CEX2) / Crypto Express2-1P (CEX2-1P) Crypto Express3 (CEX3) / Crypto Express3-1P (CEX3-1P) Secure Key DES/TDES Secure Key AES Financial (PIN) Functions** Key Generate/Key Management** Random Number Generate / Generate Long SSL Handshakes (2048-, 4096- bit keys) Protected Key Support ECC (z196/z114 only) TechDoc WP100810 A Synopsis of System z Crypto Hardware ** Add l functionality on later machines Page 8

Must Production Hardware = DR Hardware? Platform Page 9 Microcode installed LPAR Activation Profilez z/os Toleration Support ICSF Version Native instructions Crypto Function Equivalent Function Crypto Products/Apps that can adapt System SSL the App that Adapts! Performance Expectations z800?=? z196 Secure key on production site will require secure key HW at DR site Clear key on production site may require clear key HW at DR site

LPAR Activation Profile From CPC Operational Customization, click on View LPAR Cryptographic Controls Page 10

Usage Domains Options => DOMAIN=n LPAR & Domain LP1 UD1 DES Master Key ABC (MKVP=E957) PKA Master Key XYZ (Hash=DD20) AES MK ECC MK CKDS14 MKVP E957 PKDS14 Hash DD20 LP2 UD2 LP3 LP4 UD4 LP2KEY (MKVP=AB51) ABC (MKVP=E957) PKAMST (Hash=5D01) XYZ (Hash=DD20) CKDS 2 MKVP AB51 PKDS 2 Hash 5D01 LP5 LP15 UD9 LP15KY (MKVP=15D7) AKEY (MKVP=93A2) CKDS 15 MKVP 15D7 PKDS 15 Hash 93A2 Page 11

Crypto Support in the VM Directory CRYPTO authorizes guest machine to use crypto APVIRTual provides access to clear key devices (PCICA, CEX2A, CEX3A) for Linux and VSE Guests APDEDicated ap, ap assigns specific secure key devices DOMAIN n assigns a domain(s) to the guest CSU 0,1,* assigns zero, one or both CCFs KEYENTRY PCCF functions SPECIAL Enable Special Secure Mode MODIFY provides access to a TKE from this guest OPTION CRYMeasure authorizes access to crypto measurement data on the crypto hardware Page 12

System Keys Where was the CKDS Initialized? CKDS System keys are not required in a PCIXCC/CEX2C environment NOCV-enablement keys ANSI System keys Extended System keys (ESYS) IDCAMS => PRINT INDATASET( ckds dsn ) COUNT(20) TechDoc PRS1953 Utility to allow migration from a CPACF/PCI based CKDS back to a CCF (9672/z800/z900) system Page 13

Where was the PKDS Initiailized? CCF => Signature Master Key (SMK) & Key Management Master Key (KMMK) PCICC/PCIXCC/CEX2C => Asymmetric Master Key (ASYM-MK) The PKDS Header Record contains the hash pattern of the KMMK at +108 and the hash pattern of the SMK at +124 See ICSF Admin Guide Steps for setting the SMK equal to the KMMK Page 14

Consider your crypto users DB2 BIF Data Encryption Tool for IMS and DB2 System SSL Encryption Facility Encryption Key Manager (EKM) OEM products Applications TEST! Page 15

Master Keys on the DR System Hot-site (DASD mirroring) CKDS/PKDS are mirrored, master key changes are made on the production system and DR system Warm/Cold-site (Tapes restored) System Volumes Encrypted - If the keys are stored on the z/os system, then the driver system that restores the tapes, must have access to those keys Application Data Encrypted DR system may be used to recover data Page 16

Recovering Master Keys Master Keys Passphrase Initialization, PPINIT (Master Key Only) ISPF Panels for ICSF (Master Key Only) Trusted Key Entry Workstation Master keys are installed into secure hardware Once loaded, no way to retrieve them! Master keys must be available to the DR hardware Use the MKVP (SYM-MK/CKDS) and the Hash Pattern (ASYM- MK/PKDS) to ensure you re loading the right keys Weak keys cannot be loaded in a PCICC/PCIXCC/CEX2C (see the Admin Guide) Page 17

Restoring the DR environment Encrypted Tape Drives If your backups are encrypted where is your key repository? IBM Security Key LifeCycle Manager (ISKLM) under Unix System Services (USS) and key repository using RACF, or ICSF or RACF and ICSF Plus key security provided by RACF, ICSF and secure key hardware Minus must make the RSA keys available on the driver system, where the tapes are restored z/os ICSF, RACF, or RACF/ICSF uss I S K L M If the RSA keys are stored in ICSF, then the PKDS must be available to the driver system, which means the driver system must have secure hardware and the associated ASYM-MK must be loaded Page 18

Restoring Tapes Encrypted Tape Drives (cont.) If your backups are encrypted where is your key repository? ISKLM on a remote system (z/os or not) Plus driver system can connect to the production ISKLM and key repository Minus key protection provided by the non-z/os platform z/os Java isklm keystore Page 19

Restoring tapes Encryption Facility Password option the password must be provided to the restore job on the driver system RSA Option RSA keys in the PKDS must be available on the driver system, along with the ASYM-MK that is associated with that PKDS AND Specific hardware may be required microcode must be installed CLRAES potential performance issues if the driver system doesn t provide AES hardware ENCTDES driver system must have secure hardware RSA Keys > 1048-bits in length require PCICC, PCIXCC or CEX2C Page 20

Restoring tapes OEM Products Where is the key repository? If it uses the CKDS or PKDS, then the CKDS and/or PKDS must be available on the driver system Page 21

TKE Trusted Key Entry Workstation Secure Crypto HW z/os ICSF Trusted Key Entry TCP/IP Cmd[e DHK (key part value)]signed An PKDS CKDS Crypto Card CKDS Page 22

TKE Configuration for Backup and Recovery TKE Workstation Crypto Adapter Profiles Roles Host Crypto Adapter User/Authority Roles Page 23

Using a TKE to manage the DR site DR IBM System z9 EC/BC Crypto Express 2 IBM System z10 EC/BC Crypto Express / Crypto Express3 TKE V7.x Z114 Crypto Express3 Production z196 Crypto Express3 Page 24

Using a TKE to manage the DR site DR IBM System z9 EC/BC Crypto Express 2 IBM System z10 EC/BC Crypto Express / Crypto Express3 TKE V7.x DR TKE V7.x Z114 Crypto Express3 Production z196 Crypto Express3 Page 25

TKE Migration Wizard Wizard is the implementation of a secure protocol for collecting, saving, and installing data from one cryptographic adapter to another. Data includes Key Material! Page 26

TKE Backup/Recovery for Host Files TKECM Crypto Module Data set defined to the Host Transaction Program Contains info about TKE application windows Crypto module notebooks (descriptions, domain descriptions, authority information) Backup for recovery purposes, but may need to be recreated at a DR site if the crypto modules and configuration are not identical Host Configuration IP Addresses must be configured properly Page 27

TKE Backup/Recovery for Workstation Files Backup Critical Console Data intended for protecting from a failed harddrive, applicable for DR IF the TKEs are identical Backup Utility (TKE Prior to V5) TKE File Management Utility (TKE V5 and later) Page 28

Workstation Files host.dat definitions for host sessions and related data, includes CMID and public modulus for each crypto module group.dat group definitions *.rol & *.pro smart card and passphrase roles and profiles Changes to the defaults and New ones, unique to the customer desstore.dat & desstore.ndx pkastore.dat & pkastore.ndx Page 29

TKE Backup/Recovery of Keys Keys Master Keys Operational Keys Signature Keys Storage Smart Card Floppy Keystore Print Page 30

One final note After a DR exercise or the real thing Clear your master keys at the DR site OR - Change your master keys Page 31

IBM Pubs ICSF Overview, SA22-7519 ICSF Administrator s Guide, SA22-7521 ICSF Application Programmer s Guide, SA22-7522 ICSF System Programmer s Guide, SA22-7520 Page 32

IBM Resources (on the web) ATS TechDocs Web Site www.ibm.com/support/techdocs (Search All Documents for keyword of Crypto ) WP100647 A Clear Key / Secure Key / Protected Key Primer WP100810 A Synopsis of Systme z Crypto Hardware WP100700 Encryption Facility for z/os Performance and Sizing Redbooks www.redbooks.ibm.com on Crypto System z Crypto and TKE Update, SG24-7848 IBM zenterprise System Technical Introduction, SG24-7832 IBM zenterprise System Technical Guide, SG24-7833 IBM zenterprise 196 Configuration Setup, SG24-7834 How to Setup TKE for Disaster Recovery in Hot Topics Aug. 2007 Issue 17 http://publibz.boulder.ibm.com/epubs/pdf/e0z2n180.pdf Page 33

Questions? Page 34

Trademarks The following are trademarks of the International Business Machines Corporation in the United States and/or other countries. For a complete list of IBM Trademarks, see www.ibm.com/legal/copytrade.shtml: AS/400, DBE, e-business logo, ESCON, eserver, FICON, IBM, IBM Logo, iseries, MVS, OS/390, pseries, RS/6000, S/390, VM/ESA, VSE/ESA, Websphere, xseries, z/os, zseries, z/vm The following are trademarks or registered trademarks of other companies Lotus, Notes, and Domino are trademarks or registered trademarks of Lotus Development Corporation Java and all Java-related trademarks and logos are trademarks of Sun Microsystems, Inc., in the United States and other countries LINUX is a registered trademark of Linux Torvalds UNIX is a registered trademark of The Open Group in the United States and other countries. Microsoft, Windows and Windows NT are registered trademarks of Microsoft Corporation. SET and Secure Electronic Transaction are trademarks owned by SET Secure Electronic Transaction LLC. Intel is a registered trademark of Intel Corporation * All other products may be trademarks or registered trademarks of their respective companies. NOTES: Performance is in Internal Throughput Rate (ITR) ratio based on measurements and projections using standard IBM benchmarks in a controlled environment. The actual throughput that any user will experience will vary depending upon considerations such as the amount of multiprogramming in the user's job stream, the I/O configuration, the storage configuration, and the workload processed. Therefore, no assurance can be given that an individual user will achieve throughput improvements equivalent to the performance ratios stated here. IBM hardware products are manufactured from new parts, or new and serviceable used parts. Regardless, our warranty terms apply. All customer examples cited or described in this presentation are presented as illustrations of the manner in which some customers have used IBM products and the results they may have achieved. Actual environmental costs and performance characteristics will vary depending on individual customer configurations and conditions. This publication was produced in the United States. IBM may not offer the products, services or features discussed in this document in other countries, and the information may be subject to change without notice. Consult your local IBM business contact for information on the product or services available in your area. All statements regarding IBM's future direction and intent are subject to change or withdrawal without notice, and represent goals and objectives only. Information about non-ibm products is obtained from the manufacturers of those products or their published announcements. IBM has not tested those products and cannot confirm the performance, compatibility, or any other claims related to non-ibm products. Questions on the capabilities of non-ibm products should be addressed to the suppliers of those products. Prices subject to change without notice. Contact your IBM representative or Business Partner for the most current pricing in your geography. References in this document to IBM products or services do not imply that IBM intends to make them available in every country. Any proposed use of claims in this presentation outside of the United States must be reviewed by local IBM country counsel prior to such use. The information could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these changes will be incorporated in new editions of the publication. IBM may make improvements and/or changes in the product(s) and/or the program(s) described in this publication at any time without notice. Any references in this information to non-ibm Web sites are provided for convenience only and do not in any manner serve as an endorsement of those Web sites. The materials at those Web sites are not part of the materials for this IBM product and use of those Web sites is at your own risk. Page 35