SlideShare uma empresa Scribd logo
1 de 74
Baixar para ler offline
Ten Things You Should not Forget in
Mainframe Security
Pete Garza
Mainframe
Zions Bank
Senior Information Security Architect
MFX47S
#CAWorld
2 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Terms of this Presentation
© 2015 All rights reserved. All trademarks referenced herein belong to their respective companies. The presentation provided at CA World
2015 is intended for information purposes only and does not form any type of warranty. Some of the specific slides with customer references
relate to customer's specific use and experience of CA products and solutions so actual results may vary.
For Informational Purposes Only
3 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Abstract
Given the current state of security and breaches
in the news every day, you won’t want to miss
this session. We will cover the top 10 areas that
you should be reviewing as a security
practitioner that most organizations overlook.
With the knowledge taken from this session,
you will be able to better educate your staff and
auditors about how to take security to the next
level for your business and protect z/OS®.
Pete Garza -
Sr. Information
Security
Architect
4 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Agenda
ARE YOU SECURE? WHERE DO YOU START?
ENTERPRISE SECURITY MANAGER (ESM)
STATIC IDS / PASSTICKETS / OSMF / CICS
SHOULD I BE CONCERNED WHEN AN EXTERNAL MF SECURITY AUDIT IS DONE
CONFIGURATION BEST PRACTICES
DRP THINGS TO WORRY ABOUT
1
2
3
4
5
6
5 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
How Secure is Your Mainframe
 VM secure platform for virtual environments and workloads
 Security is built into every level of the System z structure
– Processor - Hypervisor- Operating system – Communications – Storage - Applications
 Security features designed specifically to help users
– Comply with security related regulatory requirements
– Identity and access management
– Hardware and software encryption
– Communication security capabilities
– Extensive logging and reporting of security events
– Security certifications based on Common Criteria and FIPS 140
6 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
How Secure is Your Mainframe
 Mainframes are extremely secure, there is still a variety of attack vectors that can
result in a breach.
 There can be too much trust in mainframe security
– Historically, risk may seem low but the recent increase in mainframe connectivity means
mainframes need the same attention to security as any other device on the network
– However, between the above trust and scarcity of qualified mainframe security resources
 There is typically an underinvestment in mainframe security.
 There needs to be a common, enterprise-wide approach to security
– Security groups and z/OS teams need to work together in pursuing this common
approach
7 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
How Secure is Your MF
 Most reported attacks point to exploits of misconfigurations and a large
percentage are initiated by inside
 The security policy may be sound but implementation does not match the policy
 Distributed decision following its policy can result in contradicting access policy
e.g. Open access to resources
– Inadequate Policy
 e.g. Legacy practices and standards mainframe
– Misconfiguration can be predictable
– Unix System Services often is not secured
8 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Where do I
start?
9 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Process Definition
Take a Look at
10 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
 Teachability
 Repeatability
 Measurability
 Manageability
 Fire-prevention versus fire-fighting
 Ending dependency on superstars
 Achieving CMM Level 3
 High rate of return
Benefits of Documenting Processes
11 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Guidelines - Managerial parameters concerning either processes
(intended objectives) or products (desired attributes).
Definition of Guidelines
12 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Definition of a Process
 This includes:
• Efforts of people
• Equipment guided by guidelines
• Standards
• Procedures
Process - The work effort that produces a product.
13 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Process Life Cycle: Define the Process
 Does the process satisfy its stated requirements/goals?
 Are the entry points of the process understandable and reasonable?
 Are the deliverables of the process clearly stated?
 Does the process point to or include a description of each deliverable’s purpose, form and content?
 Is the flow complete, logical and consistent with the task descriptions?
 Are the task descriptions complete, logical, and consistent with the flow for the process?
 Does the process clearly indicate potential exceptions; does it provide guidance for how to handle them?
 Do the recommendations clearly indicate the methods of performing each task?
 Is the RACI expressed in the process consistent with the process flow and task descriptions?
 Are the exit criteria for the process properly defined and understandable?
Process Acceptance Checklist Yes or No
14 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
 List your security processes and identify missing processes
 Setup meetings to discuss current and missing process
 By setting up meetings you should be able to identify gaps
 Define process owners and scope
 Prioritize
 Create a Security Central Repository
Next Steps
15 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
MF Security Project Process Flow
Example of how MF security should be involved supporting projects
16 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Where do I start?
 CA ACF2 (or CA Top Secret or IBM RACF)
– CA ACF2 Daily Reports
– CA ACF2 Clean up Weekly report
– Weekly Show commands reports
– Follow ups
 Nightly Security
– Nightly problems production control/scheduling
– Nightly problems test/development
At the beginning…
17 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Enterprise Security Manager (ESM)
 Daily reports
– System entry – ACFRPTPW
– Restricted ID – ACFRPTJL
– Dataset Rules –ACFRPTDS
– Resource rules – ACFRPTRV
– Logonid Modification - ACFRPTLL
– Rule change log – ACFRPTRL
– Resource change log – ACFRPTEL
CA ACF2 REPORTING - Know what they are saying
18 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Enterprise Security Manager (ESM)
 Daily reports process
– Audit Daily report process
 Document process
 Demonstrate process
 Log process
– Auditors review most often
 User cleanup upon termination process
 Justification for rule and resource modification
– DATA field in rules point to ticket
CA ACF2 REPORTING
19 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Enterprise
Security
Manager
(ESM)
20 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Many of todays system hacks are internal
Denial of service starts at system entry
A Journey In Information Security
Why do we do this?
21 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Three VSAM key-sequenced datasets
Logonid 1024 bytes
Access rules 4K records
InfoStorage 4K records
SMF recording 230 record #
Backup controls
Recovery ability
CA ACF2 Control Databases
22 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
LPAR
Application
CICS Region
Validation 1
Validation ?
System Entry
23 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Logonid InfoStorage
UADS
z/OS
Operating System
CA-ACF2
CA-ACF2
CA-ACF2
CA-ACF2
Behind the Scenes
24 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
TSO
Batch
One ID verse many
Started Tasks (STC)
Know what they do
CICS
How many regions
MRO
FTP
Where is System Entry Processing Done?
25 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Supplied by user:
Logonid
Password
Source
Date and time
Access Privileges
Logonid DB
z/OS Security
Controls
System Entry Validation Process
26 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
CA-ACF2
Access Rules:
Option ===> TSO ACF
--------------------
ACF
SET NORULES
Controlled Sharing of Resources
27 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
The Auditors
are coming –
Should I be
concerned?
28 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Should I Be Concerned
 Be prepared
 Common requests
– Security Policy
– Security Standards
– Display of current options selected
 Show ACF2
– ACFFDR
– Change Control policy
– APF list
– Various CA ACF2 reports
When a MF Audit is done
29 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Should I Be Concerned
 CA Auditor will lessen the concern
 CA Auditor is a good tool with more than just auditing
 Create procedures to audit your physical IT environment.
 External review every two years
 Helps maintain z/OS integrity through timely identification of z/OS
customization and modifications
 Helps verify internal compliance to change control procedures
 Helps users learn z/OS
You should constantly audit your mainframe z/OS system
30 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
CA Auditor Design Philosophy
 Functionality was a critical issue in designing
 Addresses the needs of a wide range of data processing
personnel with varied technical backgrounds
 Provides uncompromised accuracy of information
 Sets new levels of ease of use
 Is virtually self-installing and easy to maintain
 Does not impact system performance
31 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
CA Auditor Audience
 Auditors
 Programming managers
 Data security managers
 Quality assurance personnel
 Data center managers
 Technical support and systems personnel
32 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
-------------- CA-Examine Auditing - MANAGEMENT INFORMATION ----------- OPTION
===>
1 OVERVIEW - Display z/OS or OS/390 version, level, IPL date, etc.
2 HARDWARE - See and scan hardware configuration
3 ERRORS - Show hardware error rate for disk and tape
4 CONSOLE - Display information about operator consoles
5 SMF - Analyze and search the System Management Facility
CA Auditor
Management Information Menu
33 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
-- CA-Examine Auditing - z/OS and OS/390 SYSTEM INSTALLATION CHOICES ---
OPTION ===>
1 PARMLIB - Analyze z/OS and OS/390 parameter library
2 APF - Analyze Authorized Program Facility
3 SMP - Analyze z/OS and OS/390 libraries using SMP/E
4 KEY - Show key z/OS and OS/390 libraries
5 TSO - Analyze TSO user attribute file (UADS)
6 CATALOGS - List z/OS and OS/390 system catalogs
z/OS and OS/390 System Installation Choices Menu
Screens that you can use to examine z/OS and OS/390 installation options
34 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
------ CA-Examine Auditing - z/OS AND OS/390 TECHNICAL INFORMATION ----- OPTION ===>
1 SUBSYSTEMS - Display information about z/OS and OS/390 subsystems
2 APPENDAGES - User Input/output appendage display and status review
3 EXITS - z/OS and OS/390 system exit display and status review
4 LPA - Link Pack Area display and library search
5 FLPA/MLPA - Detailed FLPA, MLPA, and selected PLPA Analysis
6 PPT - Program Properties Table analysis and library search
7 SVC - Supervisor call analysis display
z/OS and OS/390 Technical Information Menu
35 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Configuration
Best Practices
36 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
ACF Field Definition Record
 ACFFDR
– Supervisor Call (SVC) numbers
– Definition on VSAM files (acf2 DB’s)
– SMF recording number
– Product and site defined fields
 CFDE’s macros
 Logonid dsect
37 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Configuration Best Practices
 A configured ACFFDR module should have multiple instances of the @DDSN macro
with each instance defining a different group of security files.
 Specifying two @DDSN groups
– One named PRIMARY,
– A second named ALT
 Switch Command
– Aid in applying maintenance to your Primary
– F ACF2,SWITCH
– OPTS GSO record
 SWTCHKEY(key) eight byte character field upper case
ACFFDR Database Specification
38 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Configuration Best Practices
 Command Propagation Facility (CPF) and password synchronization
– Mirror CA ACF2 commands
 Business Value:
– CPF and password synchronization simplifies administrative processing by
keeping security record contents synchronized across multiple systems.
 Additional Considerations:
– Use the CPF password synchronization feature to share updates to passwords
and password suspensions among two or more distributed CA ACF2 systems.
Logical CA ACF2 Database Sharing with CPF
39 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Configuration Best Practices
 Security System Interface
– Loaded and activated via CA Cleanup main task.
 The Interface:
– Represents a small extension to the normal security check process and
executes as each security check completes
 Is passive and performs monitoring only
– Contains abend protection that immediately ends CA Cleanup
monitoring in the event of any problem
– Produces no measurable overhead
– Is loaded in common memory so all users can execute it
CA CLEANUP for ACF2
40 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Configuration Best Practices
 Report and Command Generator Authority
 A batch utility program:
– Produces reports showing unreferenced (or referenced) security file
entries.
– Creates the command files to perform security file cleanup.
– Optionally creates a file of cleanup commands.
– Optionally creates a file to back out change if executed
– A report summary for an UNREF report.
CA CLEANUP for ACF2
41 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
DRP’s
42 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
DRP’s
 Check for CA ACF2 errors messages when the system is coming up
 Verify access to CA ACF2 system in the DR environment
 Compare CA ACF2 active status with the active status of the DR CA ACF2 system Mode(ABORT)
 List the release level of the DR CA ACF2 system and ensure that it is equal to the current production CA
ACF2 used.
 Ensure that the security configuration parameters for all Lpars are equal
– Create a list on each LPAR to ensure that the configuration settings are correct.
 Test options by comparing them to the previous day/month setting
 Ensure availability of CA ACF2 Reporting
 Ensure that you can create / delete / modify CA ACF2 records
43 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
DRP’s
ACF79001 ACFFDR COULD NOT BE FOUND - ACF2 TERMINATING
Reason:
The CA ACF2 Field Definition Record (ACFFDR) is required for CA ACF2 processing. You
must define the ACFFDR field definition module in a linklist data set. An error occurred
in the CA ACF2 installation process.
Action:
Notify your CA ACF2 maintenance personnel of this error.
Check for CA ACF2 errors messages when the system is coming up ACF79 Main Task message
44 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
DRP’s
ACF79002 ACFINT COULD NOT BE FOUND - ACF2 TERMINATING
Reason:
The CA ACF2 initialization routine cannot find the CA ACF2 rule interpreter. The CA
ACF2 rule interpreter is required for CA ACF2 processing. An error occurred in the CA
ACF2 installation process.
Action:
Notify your CA ACF2 maintenance personnel of this error.
Check for CA ACF2 errors messages when the system is coming up ACF79 Main Task message
45 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
DRP’s
ACF79018 UNABLE TO LOCATE ACF2 CVT POINTER IN SSVT
Reason:
The CA ACF2 initialization task cannot locate the anchor word for the CA ACF2 CVT. An
error occurred while installing the CA ACF2 CVT locator routine ACF$GCVT (CSECT
$ACFGCVT).
Action:
Contact CA ACF2 Technical Support.
Check for CA ACF2 errors messages when the system is coming up ACF79 Main Task message
46 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
DRP’s
 Verify access to CA ACF2 system in the DR environment
– Just try and logon
 Not running in the same mode as production will bring the
system up, but puts your company as risk
– Compare CA ACF2 active status with the active status of the DR CA
ACF2 system. Mode(ABORT)
 Proper DR testing will ensure
– Include things like loss of database
– Recover a CICS region
 SHOW ALL or SHOW ACF
47 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Review use
of Static ID’s
48 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Static ID’s
 All Mainframe address spaces require Logonids
– Users – user password managed by user
– Applications – static id and static password
– Production jobs – static id and no password
 Work loads on the MF accountability lost when not associated to end user. This makes
resolving problems difficult
 The user already has been authenticated on the system making the request
– Duplicated authentication
 Create the id as part of network access (automate
– Make all requests with a single ID
 Pass the ID and use passtickets
– Passtickets with Application ID with passwords
The Concerns
49 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
User
logon
Application Id
or
JAVA
Generate Passticket
User logonid
Application ID
A
P
PA
P
PA
P
PA
P
P
CI
C
S
W
E
B
S
E
R
V
IC
E
S
C
I
C
S
Static ID Flow
50 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
How to Review a New Static ID Request
51 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Passtickets,
XREF,
Resource
Rules
52 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Passtickets
53 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Passtickets
Building records
You can build via batch – ACFBATCH
TSO using ACF2 command
SET PROFILE(PTKTDATA) DIVISION(SSIGNON)
INSERT cicswebservice.appid sskey(1234567812345678) mult-use
INSERT cicswebservice.appid.userlid sskey(8765432187654321) mult-use
F ACF2,REBUILD(PTK),CLASS(P)
Building Records - PTKDATA
54 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Passtickets
Building records
You can build via batch – ACFBATCH
TSO using ACF2 command
SET XREF(RGP) SYSID(****)
INSERT APPIDRGP INCLUDE(CCCC CCCC CCCC CCCC) RESOURCE TYPE(CKC)
F ACF2,NEWXREF,TYPE(RGP)
Building Records – Resource Group
55 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Passtickets
Building records
You can build via batch – ACFBATCH
TSO using ACF2 command
SET RESOURCE(CKC)
COMPILE *
$KEY(APPIDRGP) TYPE(CKC) ROLESET
USER(APPID) ALLOW
STORE
Building Records – Resource Rule
56 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
OSMF How
do I put in
the Security?
57 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Convert into CA ACF2 Commands
/* Create the z/OSMF Administrators group */
Call RacfCmd "ADDGROUP IZUADMIN OMVS(GID(9003))"
/* Create the z/OSMF Users group */
Call RacfCmd "ADDGROUP IZUUSER OMVS(GID(9004))"
/* Create the z/OSMF Administrator UserID */
/* The home directory is created in the -prime step. If automount managed, pre-create it before the -prime step */
Call RacfCmd "ADDUSER ZOSMFAD DFLTGRP(IZUADMIN) OMVS(UID(9001) HOME(/u/zosmfad)
PROGRAM(/bin/sh)) NOPASSWORD NOOIDCARD "
Call RacfCmd "ALU ZOSMFAD TSO(PROC(IKJTDA) ACCTNUM(TSO) SIZE(2096128))
OMVS(ASSIZEMAX(2147483647) MEMLIMIT(2G))"
/* Assign a password to the Administrator UserID before using it */
/* This is an example only - it is not recommended to insert passwords in this file */
/* Call RacfCmd "ALU ZOSMFAD PASSWORD(InsertAValidPassword) NOEXPIRED" */
/* Connect the z/OSMF Administrator UserID to the WebSphere Application Server Administrators Group */
Call RacfCmd "CONNECT ZOSMFAD GROUP(WSCFG1)"
58 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
59 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
What is the ACF2 setup for z/OSMF?
Products
o CA ACF2 for z/OS & CA ACF2 Option for DB2
Releases - CA ACF2 for z/OS: Release:15+
Components - CA ACF2 for z/OS
Description:
There is a IBM supplied REXX EXEC izudflt.cfg.rexx to generate RACF commands for
z/OSMF configuration. This is the ACF2 conversion of the REXX EXEC.
Solution:
This is the z/OSMF IZUCONFIG.CFG.REXX conversion to ACF2 commands.
Document ID: TEC614236
60 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Create the z/OSMF Administrator default group
IZUADMIN and z/OSMF
Step 1: User group IZUUSER
ACF
SET PROFILE(GROUP) DIV(OMVS)
INSERT IZUADMIN GID(9003)
INSERT IZUUSER GID(9004)
F ACF2,REBUILD(GRP),CLASS(P)
61 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Create the z/OSMF Administrator default group
IZUADMIN and z/OSMF
Step 2. Create the z/OSMF Administrator UserID ZOSMFAD:
SET LID
INSERT ZOSMFAD NAME(Z/OSMF ADMINISTRATOR) MAXDAYS(0) LIDZMAX GROUP(IZUADMIN)
UID(9001) HOME(/u/zosmfad) PROGRAM(/bin/sh) PASSWORD(xxxxxxxx)
Step 3. Connect the z/OSMF Administer UserID and z/OSMF Users to Core:
SET RESOURCE(APL)
RECKEY BBNBASE ADD(- UID(uid string for ZOSMFAD) SERVICE(READ) ALLOW)
RECKEY BBNBASE ADD(- UID(uid string for IZUUSERs) SERVICE(READ) ALLOW)
F ACF2,REBUILD(APL)
62 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Create the z/OSMF Administrator default group
IZUADMIN and z/OSMF
Step 5. SyncToOSThread permits:
SET RESOURCE(FAC)
RECKEY BBO ADD(SYNC.BBNBASE.BBNC001 UID(uid string for WSCRU1) ALLOW)
F ACF2,REBUILD(FAC)
Step 5.1 Define resource class ZMFAPLA:
SET C(GSO) SYSID(appropriate sysid)
INSERT CLASMAP.ZMFAPLA RESOURCE(ZMFAPLA) RSRCTYPE(ZMF)
F ACF2,REFRESH(CLASMAP)
Step 5.2 Add Resource type ZMF to INFODIR:
CHA INFODIR TYPES(R-RZMF) ADD
F ACF2,REFRESH(INFODIR)
63 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Create the z/OSMF Administrator default group
IZUADMIN and z/OSMF
Step 5.3 Set up Core rules:
SET RESOURCE(ZMF)
RECKEY BBNBASE ADD(ZOSMF.- UID(uid string for ZOSMFAD) SERVICE(READ) ALLOW)
RECKEY BBNBASE ADD(ZOSMF.- UID(uid string for IZUUSERs) SERVICE(READ) ALLOW)
RECKEY BBNBASE ADD(ZOSMF.ADMINTASKS.- UID(uid string for IZUUSERs))
RECKEY BBNBASE ADD(ZOSMF.SETTINGS.-.MODIFY UID(uid string for IZUUSERs))
RECKEY BBNBASE ADD(ZOSMF.WORKLOAD_MANAGEMENT.WORKLOAD_MANAGEMENT.MODIFY UID(uid
string for IZUUSERs))
RECKEY BBNBASE ADD(ZOSMF.WORKLOAD_MANAGEMENT.WORKLOAD_MANAGEMENT.INSTALL UID(uid string
for IZUUSERs))
RECKEY BBNBASE ADD(ZOSMF.CAPACITY_PROVISIONING.CAPACITY_PROVISIONING.EDIT UID(uid string for
IZUUSERs))
RECKEY BBNBASE ADD(ZOSMF.SOFTWARE_DEPLOYMENT.DATA. UID(uid string for ZOSMFAD) ALLOW)
RECKEY BBNBASE ADD(ZOSMF.SOFTWARE_DEPLOYMENT.DATA. UID(uid string for IZUUSERs) ALLOW)
RECKEY BBNBASE ADD(ZOSMF.SOFTWARE_DEPLOYMENT.SOFTWARE-.PRODUCT_INFO_FILE. UID(uid string for
IZUUSERs))
F ACF2,REBUILD(ZMF)
64 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
CICS Security
65 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
FHPA1101 MYREGION DFHSIT42 IS BEING LOADED.
ACFAE040 Phase 0 Initialization Started
ACFAE300 Setting DFHSIT value SEC=YES
ACFAE000 ACF2 PARAMETERIZATION IN PROGRESS
ACFAE309 Setting DFHSIT value XFCT=YES
ACFAE303 Setting DFHSIT value XPCT=YES
ACFAE304 Setting DFHSIT value XTRAN=YES
ACFAE301 Setting DFHSIT value RESSEC=ALWAYS
ACFAE301 Setting DFHSIT value RESSEC=ALWAYS
ACFAE302 Setting DFHSIT value CMDSEC=ALWAYS
ACFAE311 Setting DFHSIT value DFLTUSER=CICSDFT
ACFAE350 Setting DFHSIT value XAPPC=NO
ACFAE351 Setting DFHSIT value XUSER=YES
ACFAE320 Setting DFHSIT value XEJB=YES
ACFAE321 Setting DFHSIT value EJBROLEPRFX=
ACFAE322 Setting DFHSIT value SNSCOPE=NONE
ACFAE353 Setting DFHSIT value XHFS=YES
ACFAE041 Phase 0 Initialization Ended
CICS SECURITY
CICS INITIALIZATION
66 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
ACFAE044 Phase 2 Initialization Started
ACFAE075 Storage manager subtask has been attached
ACFAE050 Signon Manager Subtask is active
ACFAE051 Attaching 005 Signon Server Subtasks
ACFAE076 Program manager subtask has been attached
ACF04057 GLOBAL DIRECTORY RMTP ALREADY EXISTS
ACF04057 GLOBAL DIRECTORY RMTP ALREADY EXISTS
ACFAE123 Global directory.. Ensure console reload was performed
ACF04057 GLOBAL DIRECTORY RCFC ALREADY EXISTS
ACFAE123 Global directory.. Ensure console reload was performed
ACF04057 GLOBAL DIRECTORY RCKC ALREADY EXISTS
ACFAE123 Global directory.. Ensure console reload was performed
+ACFF9003 CICSSSUB PROCESS INITIALIZATION STARTED
+ACFF9014 CICSSSUB PROCESS INITIALIZATION COMPLETED
+ACFF9003 CICSLSUB PROCESS INITIALIZATION STARTED
+ACFF9014 CICSLSUB PROCESS INITIALIZATION COMPLETED
ACFAE045 Phase 2 Initialization Ended
ACFAE047 Security Initialization Complete
CICS SECURITY
CICS INITIALIZATION
67 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
CICS SECURITY
 You can load CA ACF2 parms one of two ways
– Startup JCL
– CA ACF2 Information Storage records
 C-CIC Records
CICS INITIALIZATION
68 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
CICS SECURITY - ACFM-Function Summary
• AM-Access Rule Maintenance
• Inspects, modifies, and stores access rule sets under the CICS interface.
• CP-CA ACF2 Command Processor
• Executes the ACF command and supports most of the standard ACF command facilities.
• EN, ES, and EV-End of Session
• Terminates ACFM sessions.
• HM-Help General Menu Display
• Displays a list of all functions that are available in ACFM.
• OD/OM-System Option Display and Modification
• Displays (OD) and modifies (OM) the CICS interface security subsystem options currently in
effect.
• RC-Resource Control
• Adds USERKEYs, reloads directories for CICSKEYs and USERKEYs, and resets CA ACF2
validations for session caches.
• RM-Resource Rule Maintenance
• Inspects, modifies, and stores resource rule sets under the CICS interface.
69 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
CICS SECURITY - ACFM-Function Summary
 SD-CICS Interface System Status Display
– Contains secondary functions that display the status of the CICS
interface system:
• CACHE
• DIRECT
• ENVIRON
• GENERAL
• LOOK
• SUBTASK
• WINDOW
• MRO - MRO, ISC, IRC
• IRC inter region
communications
• ISC intersystem
communications
• MRO Multiple Region Option
70 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
CICS SECURITY – ACFE
Who is on the Region?
ACFE=WHOSON
<<< List of USERS in Region: CICSSEC >>>
Signon Signon Signon
Userid Netname Applid Mode Type Time Date
<<------------------------------------------------------------------------------------->>
71 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Don’t
Be convinced that you are
secure because your
infrastructure has advanced
monitoring and protection
Cripple the business with
cumbersome processes they
will find a way to circumvent
Remember
You are only as secure as your
least secure vendor (none are
too small to consider)
Do
Be aware of recent breaches
and ensure you raise the bar
for attackers
Consider all paths into the
Mainframe.
Summary
A Few Words to Review
72 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Q & A
73 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Follow Conversations in the Mainframe Content Center
CA Data Content Discovery
CA ACF2 ™ for z/OS
CA Top Secret® for z/OS
CA Cleanup
CA Auditor
Identify and Control Security
Risk
Discover regulated data on z Systems™
and maintain a secure infrastructure
Advanced Authentication –
Nov 18th @ 4:30pm
The Known Unknown -
Nov 19th @ 12:15pm
74 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
For More Information
To learn more, please visit:
http://cainc.to/Nv2VOe
CA World ’15

Mais conteúdo relacionado

Mais procurados

手作業なしの安定環境実現に向けたZabbix活用方法紹介+Zabbix2.4最新機能紹介
手作業なしの安定環境実現に向けたZabbix活用方法紹介+Zabbix2.4最新機能紹介手作業なしの安定環境実現に向けたZabbix活用方法紹介+Zabbix2.4最新機能紹介
手作業なしの安定環境実現に向けたZabbix活用方法紹介+Zabbix2.4最新機能紹介Daisuke Ikeda
 
SD-WAN docs for aws event
SD-WAN docs for aws eventSD-WAN docs for aws event
SD-WAN docs for aws eventakira suzuki
 
サポート エンジニアが語る、トラブルを未然に防ぐための Azure インフラ設計
サポート エンジニアが語る、トラブルを未然に防ぐための Azure インフラ設計サポート エンジニアが語る、トラブルを未然に防ぐための Azure インフラ設計
サポート エンジニアが語る、トラブルを未然に防ぐための Azure インフラ設計ShuheiUda
 
Aws auto scalingによるwebapサーバbatchサーバの構成例
Aws auto scalingによるwebapサーバbatchサーバの構成例Aws auto scalingによるwebapサーバbatchサーバの構成例
Aws auto scalingによるwebapサーバbatchサーバの構成例Takeshi Mikami
 
Virtual Infrastructure Overview
Virtual Infrastructure OverviewVirtual Infrastructure Overview
Virtual Infrastructure Overviewvalerian_ceaus
 
MQ Support for z/OS Connect
MQ Support for z/OS ConnectMQ Support for z/OS Connect
MQ Support for z/OS ConnectMatt Leming
 
Active Directory_グループポリシー基礎
Active Directory_グループポリシー基礎Active Directory_グループポリシー基礎
Active Directory_グループポリシー基礎F DANKI
 
脆弱性ハンドリングと耐える設計 -Vulnerability Response-
脆弱性ハンドリングと耐える設計 -Vulnerability Response-脆弱性ハンドリングと耐える設計 -Vulnerability Response-
脆弱性ハンドリングと耐える設計 -Vulnerability Response-Tomohiro Nakashima
 
Introducing Spring Cloud Gateway and API Hub for VMware Tanzu
Introducing Spring Cloud Gateway and API Hub for VMware TanzuIntroducing Spring Cloud Gateway and API Hub for VMware Tanzu
Introducing Spring Cloud Gateway and API Hub for VMware TanzuVMware Tanzu
 
Sap security-administration
Sap security-administrationSap security-administration
Sap security-administrationnanda nanda
 
AWS Black Belt Tech シリーズ 2015 - AWS OpsWorks
AWS Black Belt Tech シリーズ 2015 - AWS OpsWorksAWS Black Belt Tech シリーズ 2015 - AWS OpsWorks
AWS Black Belt Tech シリーズ 2015 - AWS OpsWorksAmazon Web Services Japan
 
IBM DataPower Gateways - What's new in 2016 v7.5.2
IBM DataPower Gateways - What's new in 2016 v7.5.2IBM DataPower Gateways - What's new in 2016 v7.5.2
IBM DataPower Gateways - What's new in 2016 v7.5.2IBM DataPower Gateway
 
AWS WAF のマネージドルールって結局どれを選べばいいの?
AWS WAF のマネージドルールって結局どれを選べばいいの?AWS WAF のマネージドルールって結局どれを選べばいいの?
AWS WAF のマネージドルールって結局どれを選べばいいの?YOJI WATANABE
 
Share 2014 Pittsburgh CICS and Workload Management (WLM)
Share 2014 Pittsburgh CICS and Workload Management (WLM)Share 2014 Pittsburgh CICS and Workload Management (WLM)
Share 2014 Pittsburgh CICS and Workload Management (WLM)nick_garrod
 
VMware Disaster Recovery Solution Presentation EN (1).pptx
VMware Disaster Recovery Solution Presentation EN (1).pptxVMware Disaster Recovery Solution Presentation EN (1).pptx
VMware Disaster Recovery Solution Presentation EN (1).pptxFernando564134
 
Identity and access control for custom enterprise applications - SDD412 - AWS...
Identity and access control for custom enterprise applications - SDD412 - AWS...Identity and access control for custom enterprise applications - SDD412 - AWS...
Identity and access control for custom enterprise applications - SDD412 - AWS...Amazon Web Services
 
「これ危ない設定じゃないでしょうか」とヒアリングするための仕組み @AWS Summit Tokyo 2018
「これ危ない設定じゃないでしょうか」とヒアリングするための仕組み @AWS Summit Tokyo 2018「これ危ない設定じゃないでしょうか」とヒアリングするための仕組み @AWS Summit Tokyo 2018
「これ危ない設定じゃないでしょうか」とヒアリングするための仕組み @AWS Summit Tokyo 2018cyberagent
 
20190919 よくご相談いただくセキュリティの質問と考え方
20190919 よくご相談いただくセキュリティの質問と考え方20190919 よくご相談いただくセキュリティの質問と考え方
20190919 よくご相談いただくセキュリティの質問と考え方Amazon Web Services Japan
 

Mais procurados (20)

手作業なしの安定環境実現に向けたZabbix活用方法紹介+Zabbix2.4最新機能紹介
手作業なしの安定環境実現に向けたZabbix活用方法紹介+Zabbix2.4最新機能紹介手作業なしの安定環境実現に向けたZabbix活用方法紹介+Zabbix2.4最新機能紹介
手作業なしの安定環境実現に向けたZabbix活用方法紹介+Zabbix2.4最新機能紹介
 
SD-WAN docs for aws event
SD-WAN docs for aws eventSD-WAN docs for aws event
SD-WAN docs for aws event
 
サポート エンジニアが語る、トラブルを未然に防ぐための Azure インフラ設計
サポート エンジニアが語る、トラブルを未然に防ぐための Azure インフラ設計サポート エンジニアが語る、トラブルを未然に防ぐための Azure インフラ設計
サポート エンジニアが語る、トラブルを未然に防ぐための Azure インフラ設計
 
Aws auto scalingによるwebapサーバbatchサーバの構成例
Aws auto scalingによるwebapサーバbatchサーバの構成例Aws auto scalingによるwebapサーバbatchサーバの構成例
Aws auto scalingによるwebapサーバbatchサーバの構成例
 
Virtual Infrastructure Overview
Virtual Infrastructure OverviewVirtual Infrastructure Overview
Virtual Infrastructure Overview
 
MQ Support for z/OS Connect
MQ Support for z/OS ConnectMQ Support for z/OS Connect
MQ Support for z/OS Connect
 
Amazon VPCトレーニング-VPCの説明
Amazon VPCトレーニング-VPCの説明Amazon VPCトレーニング-VPCの説明
Amazon VPCトレーニング-VPCの説明
 
Active Directory_グループポリシー基礎
Active Directory_グループポリシー基礎Active Directory_グループポリシー基礎
Active Directory_グループポリシー基礎
 
脆弱性ハンドリングと耐える設計 -Vulnerability Response-
脆弱性ハンドリングと耐える設計 -Vulnerability Response-脆弱性ハンドリングと耐える設計 -Vulnerability Response-
脆弱性ハンドリングと耐える設計 -Vulnerability Response-
 
Introducing Spring Cloud Gateway and API Hub for VMware Tanzu
Introducing Spring Cloud Gateway and API Hub for VMware TanzuIntroducing Spring Cloud Gateway and API Hub for VMware Tanzu
Introducing Spring Cloud Gateway and API Hub for VMware Tanzu
 
Sap security-administration
Sap security-administrationSap security-administration
Sap security-administration
 
AWS Black Belt Tech シリーズ 2015 - AWS OpsWorks
AWS Black Belt Tech シリーズ 2015 - AWS OpsWorksAWS Black Belt Tech シリーズ 2015 - AWS OpsWorks
AWS Black Belt Tech シリーズ 2015 - AWS OpsWorks
 
IBM DataPower Gateways - What's new in 2016 v7.5.2
IBM DataPower Gateways - What's new in 2016 v7.5.2IBM DataPower Gateways - What's new in 2016 v7.5.2
IBM DataPower Gateways - What's new in 2016 v7.5.2
 
AWS WAF のマネージドルールって結局どれを選べばいいの?
AWS WAF のマネージドルールって結局どれを選べばいいの?AWS WAF のマネージドルールって結局どれを選べばいいの?
AWS WAF のマネージドルールって結局どれを選べばいいの?
 
Share 2014 Pittsburgh CICS and Workload Management (WLM)
Share 2014 Pittsburgh CICS and Workload Management (WLM)Share 2014 Pittsburgh CICS and Workload Management (WLM)
Share 2014 Pittsburgh CICS and Workload Management (WLM)
 
VMware Disaster Recovery Solution Presentation EN (1).pptx
VMware Disaster Recovery Solution Presentation EN (1).pptxVMware Disaster Recovery Solution Presentation EN (1).pptx
VMware Disaster Recovery Solution Presentation EN (1).pptx
 
Identity and access control for custom enterprise applications - SDD412 - AWS...
Identity and access control for custom enterprise applications - SDD412 - AWS...Identity and access control for custom enterprise applications - SDD412 - AWS...
Identity and access control for custom enterprise applications - SDD412 - AWS...
 
「これ危ない設定じゃないでしょうか」とヒアリングするための仕組み @AWS Summit Tokyo 2018
「これ危ない設定じゃないでしょうか」とヒアリングするための仕組み @AWS Summit Tokyo 2018「これ危ない設定じゃないでしょうか」とヒアリングするための仕組み @AWS Summit Tokyo 2018
「これ危ない設定じゃないでしょうか」とヒアリングするための仕組み @AWS Summit Tokyo 2018
 
Using XSLT in Mule
Using XSLT in MuleUsing XSLT in Mule
Using XSLT in Mule
 
20190919 よくご相談いただくセキュリティの質問と考え方
20190919 よくご相談いただくセキュリティの質問と考え方20190919 よくご相談いただくセキュリティの質問と考え方
20190919 よくご相談いただくセキュリティの質問と考え方
 

Destaque

Interfacing Banner BEIS With Identity Management - Summit 2012
Interfacing Banner BEIS With Identity Management - Summit 2012Interfacing Banner BEIS With Identity Management - Summit 2012
Interfacing Banner BEIS With Identity Management - Summit 2012joelavery
 
Pre-Con Ed: CA ACF2 and CA Top Secret – Part 1: What’s New in the Enterprise ...
Pre-Con Ed: CA ACF2 and CA Top Secret – Part 1: What’s New in the Enterprise ...Pre-Con Ed: CA ACF2 and CA Top Secret – Part 1: What’s New in the Enterprise ...
Pre-Con Ed: CA ACF2 and CA Top Secret – Part 1: What’s New in the Enterprise ...CA Technologies
 
CA ACF2™ and CA Top Secret® Part 1: The Road Leading to r16 and Capabilities ...
CA ACF2™ and CA Top Secret® Part 1: The Road Leading to r16 and Capabilities ...CA ACF2™ and CA Top Secret® Part 1: The Road Leading to r16 and Capabilities ...
CA ACF2™ and CA Top Secret® Part 1: The Road Leading to r16 and Capabilities ...CA Technologies
 
Standardizing Identity Provisioning with SCIM
Standardizing Identity Provisioning with SCIMStandardizing Identity Provisioning with SCIM
Standardizing Identity Provisioning with SCIMWSO2
 
Cost and Economic Modeling for Cloud Computing
Cost and Economic Modeling for Cloud ComputingCost and Economic Modeling for Cloud Computing
Cost and Economic Modeling for Cloud ComputingBooz Allen Hamilton
 
Enterprise Architecture and Cloud Computing
Enterprise Architecture and Cloud Computing Enterprise Architecture and Cloud Computing
Enterprise Architecture and Cloud Computing Booz Allen Hamilton
 
Next-Generation Biometrics and Forensics
Next-Generation Biometrics and ForensicsNext-Generation Biometrics and Forensics
Next-Generation Biometrics and ForensicsBooz Allen Hamilton
 
Mission Engineering Solution Infographic
Mission Engineering Solution InfographicMission Engineering Solution Infographic
Mission Engineering Solution InfographicBooz Allen Hamilton
 
Cloud Computing Technology Framework
Cloud Computing Technology FrameworkCloud Computing Technology Framework
Cloud Computing Technology FrameworkBooz Allen Hamilton
 
The Government's Effective Migration to a Cloud Computing Environment
The Government's Effective Migration to a Cloud Computing EnvironmentThe Government's Effective Migration to a Cloud Computing Environment
The Government's Effective Migration to a Cloud Computing EnvironmentBooz Allen Hamilton
 
User Experience Strategy for Lean Startups & UX Designers - London Tour April...
User Experience Strategy for Lean Startups & UX Designers - London Tour April...User Experience Strategy for Lean Startups & UX Designers - London Tour April...
User Experience Strategy for Lean Startups & UX Designers - London Tour April...Jaime Levy Consulting
 
Vehicle Cyber Security: What Every Automotive Executive Needs to Know
Vehicle Cyber Security: What Every Automotive Executive Needs to KnowVehicle Cyber Security: What Every Automotive Executive Needs to Know
Vehicle Cyber Security: What Every Automotive Executive Needs to KnowBooz Allen Hamilton
 
ontology based- data_integration.ali_aljadaa.1125048
ontology based- data_integration.ali_aljadaa.1125048ontology based- data_integration.ali_aljadaa.1125048
ontology based- data_integration.ali_aljadaa.1125048AliAlJadaa
 
Balancing the tension between Lean and Agile
Balancing the tension between Lean and AgileBalancing the tension between Lean and Agile
Balancing the tension between Lean and AgileJames Coplien
 
Tribute to Muhammad Ali 1942 2016
Tribute to Muhammad Ali 1942 2016Tribute to Muhammad Ali 1942 2016
Tribute to Muhammad Ali 1942 2016Arbunize
 
Pre-Con Education: Effective Change/Configuration Management With CA Service...
Pre-Con Education: Effective Change/Configuration Management With CA Service...Pre-Con Education: Effective Change/Configuration Management With CA Service...
Pre-Con Education: Effective Change/Configuration Management With CA Service...CA Technologies
 
The Rise and Fall of Ellen Pao. Perpetrator or Victim?
The Rise and Fall of Ellen Pao. Perpetrator or Victim?The Rise and Fall of Ellen Pao. Perpetrator or Victim?
The Rise and Fall of Ellen Pao. Perpetrator or Victim?Sage HR
 
India Vs Australia - A Social Media Analysis
India Vs Australia - A Social Media AnalysisIndia Vs Australia - A Social Media Analysis
India Vs Australia - A Social Media AnalysisGermin8
 
Retail Revolution: Thrive in Disruption
Retail Revolution: Thrive in DisruptionRetail Revolution: Thrive in Disruption
Retail Revolution: Thrive in DisruptionBooz Allen Hamilton
 

Destaque (20)

Interfacing Banner BEIS With Identity Management - Summit 2012
Interfacing Banner BEIS With Identity Management - Summit 2012Interfacing Banner BEIS With Identity Management - Summit 2012
Interfacing Banner BEIS With Identity Management - Summit 2012
 
Pre-Con Ed: CA ACF2 and CA Top Secret – Part 1: What’s New in the Enterprise ...
Pre-Con Ed: CA ACF2 and CA Top Secret – Part 1: What’s New in the Enterprise ...Pre-Con Ed: CA ACF2 and CA Top Secret – Part 1: What’s New in the Enterprise ...
Pre-Con Ed: CA ACF2 and CA Top Secret – Part 1: What’s New in the Enterprise ...
 
CA ACF2™ and CA Top Secret® Part 1: The Road Leading to r16 and Capabilities ...
CA ACF2™ and CA Top Secret® Part 1: The Road Leading to r16 and Capabilities ...CA ACF2™ and CA Top Secret® Part 1: The Road Leading to r16 and Capabilities ...
CA ACF2™ and CA Top Secret® Part 1: The Road Leading to r16 and Capabilities ...
 
Standardizing Identity Provisioning with SCIM
Standardizing Identity Provisioning with SCIMStandardizing Identity Provisioning with SCIM
Standardizing Identity Provisioning with SCIM
 
Cost and Economic Modeling for Cloud Computing
Cost and Economic Modeling for Cloud ComputingCost and Economic Modeling for Cloud Computing
Cost and Economic Modeling for Cloud Computing
 
Enterprise Architecture and Cloud Computing
Enterprise Architecture and Cloud Computing Enterprise Architecture and Cloud Computing
Enterprise Architecture and Cloud Computing
 
Next-Generation Biometrics and Forensics
Next-Generation Biometrics and ForensicsNext-Generation Biometrics and Forensics
Next-Generation Biometrics and Forensics
 
Mission Engineering Solution Infographic
Mission Engineering Solution InfographicMission Engineering Solution Infographic
Mission Engineering Solution Infographic
 
Cloud Computing Technology Framework
Cloud Computing Technology FrameworkCloud Computing Technology Framework
Cloud Computing Technology Framework
 
The Government's Effective Migration to a Cloud Computing Environment
The Government's Effective Migration to a Cloud Computing EnvironmentThe Government's Effective Migration to a Cloud Computing Environment
The Government's Effective Migration to a Cloud Computing Environment
 
User Experience Strategy for Lean Startups & UX Designers - London Tour April...
User Experience Strategy for Lean Startups & UX Designers - London Tour April...User Experience Strategy for Lean Startups & UX Designers - London Tour April...
User Experience Strategy for Lean Startups & UX Designers - London Tour April...
 
Vehicle Cyber Security: What Every Automotive Executive Needs to Know
Vehicle Cyber Security: What Every Automotive Executive Needs to KnowVehicle Cyber Security: What Every Automotive Executive Needs to Know
Vehicle Cyber Security: What Every Automotive Executive Needs to Know
 
ontology based- data_integration.ali_aljadaa.1125048
ontology based- data_integration.ali_aljadaa.1125048ontology based- data_integration.ali_aljadaa.1125048
ontology based- data_integration.ali_aljadaa.1125048
 
Balancing the tension between Lean and Agile
Balancing the tension between Lean and AgileBalancing the tension between Lean and Agile
Balancing the tension between Lean and Agile
 
Tribute to Muhammad Ali 1942 2016
Tribute to Muhammad Ali 1942 2016Tribute to Muhammad Ali 1942 2016
Tribute to Muhammad Ali 1942 2016
 
Pre-Con Education: Effective Change/Configuration Management With CA Service...
Pre-Con Education: Effective Change/Configuration Management With CA Service...Pre-Con Education: Effective Change/Configuration Management With CA Service...
Pre-Con Education: Effective Change/Configuration Management With CA Service...
 
The Rise and Fall of Ellen Pao. Perpetrator or Victim?
The Rise and Fall of Ellen Pao. Perpetrator or Victim?The Rise and Fall of Ellen Pao. Perpetrator or Victim?
The Rise and Fall of Ellen Pao. Perpetrator or Victim?
 
India Vs Australia - A Social Media Analysis
India Vs Australia - A Social Media AnalysisIndia Vs Australia - A Social Media Analysis
India Vs Australia - A Social Media Analysis
 
Retail Revolution: Thrive in Disruption
Retail Revolution: Thrive in DisruptionRetail Revolution: Thrive in Disruption
Retail Revolution: Thrive in Disruption
 
The Retail Reality Check
The Retail Reality CheckThe Retail Reality Check
The Retail Reality Check
 

Semelhante a Ten Things You Should not Forget in Mainframe Security

Hands-On Labs: Introduction to CA Unified Infrastructure Management
Hands-On Labs: Introduction to CA Unified Infrastructure Management Hands-On Labs: Introduction to CA Unified Infrastructure Management
Hands-On Labs: Introduction to CA Unified Infrastructure Management CA Technologies
 
Infrastructure Performance Management: Flexibility Combining Breadth, Depth ...
Infrastructure Performance Management: Flexibility Combining Breadth, Depth ...Infrastructure Performance Management: Flexibility Combining Breadth, Depth ...
Infrastructure Performance Management: Flexibility Combining Breadth, Depth ...CA Technologies
 
Protecting the Software-Defined Data Center from Data Breach
Protecting the Software-Defined Data Center from Data BreachProtecting the Software-Defined Data Center from Data Breach
Protecting the Software-Defined Data Center from Data BreachCA Technologies
 
CA Unified Infrastructure Management for z Systems: Get a Holistic View of Yo...
CA Unified Infrastructure Management for z Systems: Get a Holistic View of Yo...CA Unified Infrastructure Management for z Systems: Get a Holistic View of Yo...
CA Unified Infrastructure Management for z Systems: Get a Holistic View of Yo...CA Technologies
 
Case Study: SAIC Provides Full Lifecycle Monitoring Services to the Public Se...
Case Study: SAIC Provides Full Lifecycle Monitoring Services to the Public Se...Case Study: SAIC Provides Full Lifecycle Monitoring Services to the Public Se...
Case Study: SAIC Provides Full Lifecycle Monitoring Services to the Public Se...CA Technologies
 
Taking IT Analytics to the Next Level
Taking IT Analytics to the Next LevelTaking IT Analytics to the Next Level
Taking IT Analytics to the Next LevelCA Technologies
 
Stop the Blame Game with Increased Visibility of your Mobile-to-Mainframe IT ...
Stop the Blame Game with Increased Visibility of your Mobile-to-Mainframe IT ...Stop the Blame Game with Increased Visibility of your Mobile-to-Mainframe IT ...
Stop the Blame Game with Increased Visibility of your Mobile-to-Mainframe IT ...CA Technologies
 
Technology Primer: Monitor Microservices, Containers, Cloud Foundry and Node ...
Technology Primer: Monitor Microservices, Containers, Cloud Foundry and Node ...Technology Primer: Monitor Microservices, Containers, Cloud Foundry and Node ...
Technology Primer: Monitor Microservices, Containers, Cloud Foundry and Node ...CA Technologies
 
Technology Primer: Building Applications the New-Fashioned Way
Technology Primer: Building Applications the New-Fashioned WayTechnology Primer: Building Applications the New-Fashioned Way
Technology Primer: Building Applications the New-Fashioned WayCA Technologies
 
Tech Talk: Preventing Data Breaches with Risk-Aware Session Management
Tech Talk: Preventing Data Breaches with Risk-Aware Session ManagementTech Talk: Preventing Data Breaches with Risk-Aware Session Management
Tech Talk: Preventing Data Breaches with Risk-Aware Session ManagementCA Technologies
 
Pre-Con Education: Building Basic ITSM Workflows in CA Service Management
Pre-Con Education: Building Basic ITSM Workflows in CA Service ManagementPre-Con Education: Building Basic ITSM Workflows in CA Service Management
Pre-Con Education: Building Basic ITSM Workflows in CA Service ManagementCA Technologies
 
Go Deep and Wide: No It’s Not a Football, It’s End-to-End Performance Management
Go Deep and Wide: No It’s Not a Football, It’s End-to-End Performance ManagementGo Deep and Wide: No It’s Not a Football, It’s End-to-End Performance Management
Go Deep and Wide: No It’s Not a Football, It’s End-to-End Performance ManagementCA Technologies
 
How To Save A Million Dollars in 15 Minutes with Software Asset Management (a...
How To Save A Million Dollars in 15 Minutes with Software Asset Management (a...How To Save A Million Dollars in 15 Minutes with Software Asset Management (a...
How To Save A Million Dollars in 15 Minutes with Software Asset Management (a...CA Technologies
 
Case Study: Ball Corporation Spurs Customer Experience and Staff Productivity...
Case Study: Ball Corporation Spurs Customer Experience and Staff Productivity...Case Study: Ball Corporation Spurs Customer Experience and Staff Productivity...
Case Study: Ball Corporation Spurs Customer Experience and Staff Productivity...CA Technologies
 
Hands-On Lab: Integrate Your Monitoring Tools into an Automated Service Impac...
Hands-On Lab: Integrate Your Monitoring Tools into an Automated Service Impac...Hands-On Lab: Integrate Your Monitoring Tools into an Automated Service Impac...
Hands-On Lab: Integrate Your Monitoring Tools into an Automated Service Impac...CA Technologies
 
When Downtime Isn’t an Option: Performance Optimization Analytics in the Era ...
When Downtime Isn’t an Option: Performance Optimization Analytics in the Era ...When Downtime Isn’t an Option: Performance Optimization Analytics in the Era ...
When Downtime Isn’t an Option: Performance Optimization Analytics in the Era ...CA Technologies
 
The Known Unknown—Finding Lost, Abandoned and Hidden Regulated or Sensitive D...
The Known Unknown—Finding Lost, Abandoned and Hidden Regulated or Sensitive D...The Known Unknown—Finding Lost, Abandoned and Hidden Regulated or Sensitive D...
The Known Unknown—Finding Lost, Abandoned and Hidden Regulated or Sensitive D...CA Technologies
 
CA Unified Infrastructure Management Network Performance Management Capabili...
 CA Unified Infrastructure Management Network Performance Management Capabili... CA Unified Infrastructure Management Network Performance Management Capabili...
CA Unified Infrastructure Management Network Performance Management Capabili...CA Technologies
 
Ready, Set, Shop! The Pressure is on For Your Applications to Perform Flawl...
Ready, Set, Shop! The Pressure is on For Your Applications to Perform Flawl...Ready, Set, Shop! The Pressure is on For Your Applications to Perform Flawl...
Ready, Set, Shop! The Pressure is on For Your Applications to Perform Flawl...CA Technologies
 
How To Track Performance and Fault in a Multi-layer, Software-Defined Network...
How To Track Performance and Fault in a Multi-layer, Software-Defined Network...How To Track Performance and Fault in a Multi-layer, Software-Defined Network...
How To Track Performance and Fault in a Multi-layer, Software-Defined Network...CA Technologies
 

Semelhante a Ten Things You Should not Forget in Mainframe Security (20)

Hands-On Labs: Introduction to CA Unified Infrastructure Management
Hands-On Labs: Introduction to CA Unified Infrastructure Management Hands-On Labs: Introduction to CA Unified Infrastructure Management
Hands-On Labs: Introduction to CA Unified Infrastructure Management
 
Infrastructure Performance Management: Flexibility Combining Breadth, Depth ...
Infrastructure Performance Management: Flexibility Combining Breadth, Depth ...Infrastructure Performance Management: Flexibility Combining Breadth, Depth ...
Infrastructure Performance Management: Flexibility Combining Breadth, Depth ...
 
Protecting the Software-Defined Data Center from Data Breach
Protecting the Software-Defined Data Center from Data BreachProtecting the Software-Defined Data Center from Data Breach
Protecting the Software-Defined Data Center from Data Breach
 
CA Unified Infrastructure Management for z Systems: Get a Holistic View of Yo...
CA Unified Infrastructure Management for z Systems: Get a Holistic View of Yo...CA Unified Infrastructure Management for z Systems: Get a Holistic View of Yo...
CA Unified Infrastructure Management for z Systems: Get a Holistic View of Yo...
 
Case Study: SAIC Provides Full Lifecycle Monitoring Services to the Public Se...
Case Study: SAIC Provides Full Lifecycle Monitoring Services to the Public Se...Case Study: SAIC Provides Full Lifecycle Monitoring Services to the Public Se...
Case Study: SAIC Provides Full Lifecycle Monitoring Services to the Public Se...
 
Taking IT Analytics to the Next Level
Taking IT Analytics to the Next LevelTaking IT Analytics to the Next Level
Taking IT Analytics to the Next Level
 
Stop the Blame Game with Increased Visibility of your Mobile-to-Mainframe IT ...
Stop the Blame Game with Increased Visibility of your Mobile-to-Mainframe IT ...Stop the Blame Game with Increased Visibility of your Mobile-to-Mainframe IT ...
Stop the Blame Game with Increased Visibility of your Mobile-to-Mainframe IT ...
 
Technology Primer: Monitor Microservices, Containers, Cloud Foundry and Node ...
Technology Primer: Monitor Microservices, Containers, Cloud Foundry and Node ...Technology Primer: Monitor Microservices, Containers, Cloud Foundry and Node ...
Technology Primer: Monitor Microservices, Containers, Cloud Foundry and Node ...
 
Technology Primer: Building Applications the New-Fashioned Way
Technology Primer: Building Applications the New-Fashioned WayTechnology Primer: Building Applications the New-Fashioned Way
Technology Primer: Building Applications the New-Fashioned Way
 
Tech Talk: Preventing Data Breaches with Risk-Aware Session Management
Tech Talk: Preventing Data Breaches with Risk-Aware Session ManagementTech Talk: Preventing Data Breaches with Risk-Aware Session Management
Tech Talk: Preventing Data Breaches with Risk-Aware Session Management
 
Pre-Con Education: Building Basic ITSM Workflows in CA Service Management
Pre-Con Education: Building Basic ITSM Workflows in CA Service ManagementPre-Con Education: Building Basic ITSM Workflows in CA Service Management
Pre-Con Education: Building Basic ITSM Workflows in CA Service Management
 
Go Deep and Wide: No It’s Not a Football, It’s End-to-End Performance Management
Go Deep and Wide: No It’s Not a Football, It’s End-to-End Performance ManagementGo Deep and Wide: No It’s Not a Football, It’s End-to-End Performance Management
Go Deep and Wide: No It’s Not a Football, It’s End-to-End Performance Management
 
How To Save A Million Dollars in 15 Minutes with Software Asset Management (a...
How To Save A Million Dollars in 15 Minutes with Software Asset Management (a...How To Save A Million Dollars in 15 Minutes with Software Asset Management (a...
How To Save A Million Dollars in 15 Minutes with Software Asset Management (a...
 
Case Study: Ball Corporation Spurs Customer Experience and Staff Productivity...
Case Study: Ball Corporation Spurs Customer Experience and Staff Productivity...Case Study: Ball Corporation Spurs Customer Experience and Staff Productivity...
Case Study: Ball Corporation Spurs Customer Experience and Staff Productivity...
 
Hands-On Lab: Integrate Your Monitoring Tools into an Automated Service Impac...
Hands-On Lab: Integrate Your Monitoring Tools into an Automated Service Impac...Hands-On Lab: Integrate Your Monitoring Tools into an Automated Service Impac...
Hands-On Lab: Integrate Your Monitoring Tools into an Automated Service Impac...
 
When Downtime Isn’t an Option: Performance Optimization Analytics in the Era ...
When Downtime Isn’t an Option: Performance Optimization Analytics in the Era ...When Downtime Isn’t an Option: Performance Optimization Analytics in the Era ...
When Downtime Isn’t an Option: Performance Optimization Analytics in the Era ...
 
The Known Unknown—Finding Lost, Abandoned and Hidden Regulated or Sensitive D...
The Known Unknown—Finding Lost, Abandoned and Hidden Regulated or Sensitive D...The Known Unknown—Finding Lost, Abandoned and Hidden Regulated or Sensitive D...
The Known Unknown—Finding Lost, Abandoned and Hidden Regulated or Sensitive D...
 
CA Unified Infrastructure Management Network Performance Management Capabili...
 CA Unified Infrastructure Management Network Performance Management Capabili... CA Unified Infrastructure Management Network Performance Management Capabili...
CA Unified Infrastructure Management Network Performance Management Capabili...
 
Ready, Set, Shop! The Pressure is on For Your Applications to Perform Flawl...
Ready, Set, Shop! The Pressure is on For Your Applications to Perform Flawl...Ready, Set, Shop! The Pressure is on For Your Applications to Perform Flawl...
Ready, Set, Shop! The Pressure is on For Your Applications to Perform Flawl...
 
How To Track Performance and Fault in a Multi-layer, Software-Defined Network...
How To Track Performance and Fault in a Multi-layer, Software-Defined Network...How To Track Performance and Fault in a Multi-layer, Software-Defined Network...
How To Track Performance and Fault in a Multi-layer, Software-Defined Network...
 

Mais de CA Technologies

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Technologies
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceCA Technologies
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...CA Technologies
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCA Technologies
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...CA Technologies
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCA Technologies
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...CA Technologies
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCA Technologies
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramCA Technologies
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageCA Technologies
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementCA Technologies
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...CA Technologies
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...CA Technologies
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...CA Technologies
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...CA Technologies
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentCA Technologies
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseCA Technologies
 

Mais de CA Technologies (20)

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
 

Último

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 

Último (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 

Ten Things You Should not Forget in Mainframe Security

  • 1. Ten Things You Should not Forget in Mainframe Security Pete Garza Mainframe Zions Bank Senior Information Security Architect MFX47S #CAWorld
  • 2. 2 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Terms of this Presentation © 2015 All rights reserved. All trademarks referenced herein belong to their respective companies. The presentation provided at CA World 2015 is intended for information purposes only and does not form any type of warranty. Some of the specific slides with customer references relate to customer's specific use and experience of CA products and solutions so actual results may vary. For Informational Purposes Only
  • 3. 3 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Abstract Given the current state of security and breaches in the news every day, you won’t want to miss this session. We will cover the top 10 areas that you should be reviewing as a security practitioner that most organizations overlook. With the knowledge taken from this session, you will be able to better educate your staff and auditors about how to take security to the next level for your business and protect z/OS®. Pete Garza - Sr. Information Security Architect
  • 4. 4 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Agenda ARE YOU SECURE? WHERE DO YOU START? ENTERPRISE SECURITY MANAGER (ESM) STATIC IDS / PASSTICKETS / OSMF / CICS SHOULD I BE CONCERNED WHEN AN EXTERNAL MF SECURITY AUDIT IS DONE CONFIGURATION BEST PRACTICES DRP THINGS TO WORRY ABOUT 1 2 3 4 5 6
  • 5. 5 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD How Secure is Your Mainframe  VM secure platform for virtual environments and workloads  Security is built into every level of the System z structure – Processor - Hypervisor- Operating system – Communications – Storage - Applications  Security features designed specifically to help users – Comply with security related regulatory requirements – Identity and access management – Hardware and software encryption – Communication security capabilities – Extensive logging and reporting of security events – Security certifications based on Common Criteria and FIPS 140
  • 6. 6 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD How Secure is Your Mainframe  Mainframes are extremely secure, there is still a variety of attack vectors that can result in a breach.  There can be too much trust in mainframe security – Historically, risk may seem low but the recent increase in mainframe connectivity means mainframes need the same attention to security as any other device on the network – However, between the above trust and scarcity of qualified mainframe security resources  There is typically an underinvestment in mainframe security.  There needs to be a common, enterprise-wide approach to security – Security groups and z/OS teams need to work together in pursuing this common approach
  • 7. 7 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD How Secure is Your MF  Most reported attacks point to exploits of misconfigurations and a large percentage are initiated by inside  The security policy may be sound but implementation does not match the policy  Distributed decision following its policy can result in contradicting access policy e.g. Open access to resources – Inadequate Policy  e.g. Legacy practices and standards mainframe – Misconfiguration can be predictable – Unix System Services often is not secured
  • 8. 8 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Where do I start?
  • 9. 9 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Process Definition Take a Look at
  • 10. 10 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD  Teachability  Repeatability  Measurability  Manageability  Fire-prevention versus fire-fighting  Ending dependency on superstars  Achieving CMM Level 3  High rate of return Benefits of Documenting Processes
  • 11. 11 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Guidelines - Managerial parameters concerning either processes (intended objectives) or products (desired attributes). Definition of Guidelines
  • 12. 12 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Definition of a Process  This includes: • Efforts of people • Equipment guided by guidelines • Standards • Procedures Process - The work effort that produces a product.
  • 13. 13 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Process Life Cycle: Define the Process  Does the process satisfy its stated requirements/goals?  Are the entry points of the process understandable and reasonable?  Are the deliverables of the process clearly stated?  Does the process point to or include a description of each deliverable’s purpose, form and content?  Is the flow complete, logical and consistent with the task descriptions?  Are the task descriptions complete, logical, and consistent with the flow for the process?  Does the process clearly indicate potential exceptions; does it provide guidance for how to handle them?  Do the recommendations clearly indicate the methods of performing each task?  Is the RACI expressed in the process consistent with the process flow and task descriptions?  Are the exit criteria for the process properly defined and understandable? Process Acceptance Checklist Yes or No
  • 14. 14 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD  List your security processes and identify missing processes  Setup meetings to discuss current and missing process  By setting up meetings you should be able to identify gaps  Define process owners and scope  Prioritize  Create a Security Central Repository Next Steps
  • 15. 15 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD MF Security Project Process Flow Example of how MF security should be involved supporting projects
  • 16. 16 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Where do I start?  CA ACF2 (or CA Top Secret or IBM RACF) – CA ACF2 Daily Reports – CA ACF2 Clean up Weekly report – Weekly Show commands reports – Follow ups  Nightly Security – Nightly problems production control/scheduling – Nightly problems test/development At the beginning…
  • 17. 17 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Enterprise Security Manager (ESM)  Daily reports – System entry – ACFRPTPW – Restricted ID – ACFRPTJL – Dataset Rules –ACFRPTDS – Resource rules – ACFRPTRV – Logonid Modification - ACFRPTLL – Rule change log – ACFRPTRL – Resource change log – ACFRPTEL CA ACF2 REPORTING - Know what they are saying
  • 18. 18 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Enterprise Security Manager (ESM)  Daily reports process – Audit Daily report process  Document process  Demonstrate process  Log process – Auditors review most often  User cleanup upon termination process  Justification for rule and resource modification – DATA field in rules point to ticket CA ACF2 REPORTING
  • 19. 19 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Enterprise Security Manager (ESM)
  • 20. 20 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Many of todays system hacks are internal Denial of service starts at system entry A Journey In Information Security Why do we do this?
  • 21. 21 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Three VSAM key-sequenced datasets Logonid 1024 bytes Access rules 4K records InfoStorage 4K records SMF recording 230 record # Backup controls Recovery ability CA ACF2 Control Databases
  • 22. 22 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD LPAR Application CICS Region Validation 1 Validation ? System Entry
  • 23. 23 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Logonid InfoStorage UADS z/OS Operating System CA-ACF2 CA-ACF2 CA-ACF2 CA-ACF2 Behind the Scenes
  • 24. 24 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD TSO Batch One ID verse many Started Tasks (STC) Know what they do CICS How many regions MRO FTP Where is System Entry Processing Done?
  • 25. 25 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Supplied by user: Logonid Password Source Date and time Access Privileges Logonid DB z/OS Security Controls System Entry Validation Process
  • 26. 26 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD CA-ACF2 Access Rules: Option ===> TSO ACF -------------------- ACF SET NORULES Controlled Sharing of Resources
  • 27. 27 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD The Auditors are coming – Should I be concerned?
  • 28. 28 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Should I Be Concerned  Be prepared  Common requests – Security Policy – Security Standards – Display of current options selected  Show ACF2 – ACFFDR – Change Control policy – APF list – Various CA ACF2 reports When a MF Audit is done
  • 29. 29 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Should I Be Concerned  CA Auditor will lessen the concern  CA Auditor is a good tool with more than just auditing  Create procedures to audit your physical IT environment.  External review every two years  Helps maintain z/OS integrity through timely identification of z/OS customization and modifications  Helps verify internal compliance to change control procedures  Helps users learn z/OS You should constantly audit your mainframe z/OS system
  • 30. 30 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD CA Auditor Design Philosophy  Functionality was a critical issue in designing  Addresses the needs of a wide range of data processing personnel with varied technical backgrounds  Provides uncompromised accuracy of information  Sets new levels of ease of use  Is virtually self-installing and easy to maintain  Does not impact system performance
  • 31. 31 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD CA Auditor Audience  Auditors  Programming managers  Data security managers  Quality assurance personnel  Data center managers  Technical support and systems personnel
  • 32. 32 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD -------------- CA-Examine Auditing - MANAGEMENT INFORMATION ----------- OPTION ===> 1 OVERVIEW - Display z/OS or OS/390 version, level, IPL date, etc. 2 HARDWARE - See and scan hardware configuration 3 ERRORS - Show hardware error rate for disk and tape 4 CONSOLE - Display information about operator consoles 5 SMF - Analyze and search the System Management Facility CA Auditor Management Information Menu
  • 33. 33 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD -- CA-Examine Auditing - z/OS and OS/390 SYSTEM INSTALLATION CHOICES --- OPTION ===> 1 PARMLIB - Analyze z/OS and OS/390 parameter library 2 APF - Analyze Authorized Program Facility 3 SMP - Analyze z/OS and OS/390 libraries using SMP/E 4 KEY - Show key z/OS and OS/390 libraries 5 TSO - Analyze TSO user attribute file (UADS) 6 CATALOGS - List z/OS and OS/390 system catalogs z/OS and OS/390 System Installation Choices Menu Screens that you can use to examine z/OS and OS/390 installation options
  • 34. 34 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD ------ CA-Examine Auditing - z/OS AND OS/390 TECHNICAL INFORMATION ----- OPTION ===> 1 SUBSYSTEMS - Display information about z/OS and OS/390 subsystems 2 APPENDAGES - User Input/output appendage display and status review 3 EXITS - z/OS and OS/390 system exit display and status review 4 LPA - Link Pack Area display and library search 5 FLPA/MLPA - Detailed FLPA, MLPA, and selected PLPA Analysis 6 PPT - Program Properties Table analysis and library search 7 SVC - Supervisor call analysis display z/OS and OS/390 Technical Information Menu
  • 35. 35 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Configuration Best Practices
  • 36. 36 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD ACF Field Definition Record  ACFFDR – Supervisor Call (SVC) numbers – Definition on VSAM files (acf2 DB’s) – SMF recording number – Product and site defined fields  CFDE’s macros  Logonid dsect
  • 37. 37 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Configuration Best Practices  A configured ACFFDR module should have multiple instances of the @DDSN macro with each instance defining a different group of security files.  Specifying two @DDSN groups – One named PRIMARY, – A second named ALT  Switch Command – Aid in applying maintenance to your Primary – F ACF2,SWITCH – OPTS GSO record  SWTCHKEY(key) eight byte character field upper case ACFFDR Database Specification
  • 38. 38 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Configuration Best Practices  Command Propagation Facility (CPF) and password synchronization – Mirror CA ACF2 commands  Business Value: – CPF and password synchronization simplifies administrative processing by keeping security record contents synchronized across multiple systems.  Additional Considerations: – Use the CPF password synchronization feature to share updates to passwords and password suspensions among two or more distributed CA ACF2 systems. Logical CA ACF2 Database Sharing with CPF
  • 39. 39 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Configuration Best Practices  Security System Interface – Loaded and activated via CA Cleanup main task.  The Interface: – Represents a small extension to the normal security check process and executes as each security check completes  Is passive and performs monitoring only – Contains abend protection that immediately ends CA Cleanup monitoring in the event of any problem – Produces no measurable overhead – Is loaded in common memory so all users can execute it CA CLEANUP for ACF2
  • 40. 40 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Configuration Best Practices  Report and Command Generator Authority  A batch utility program: – Produces reports showing unreferenced (or referenced) security file entries. – Creates the command files to perform security file cleanup. – Optionally creates a file of cleanup commands. – Optionally creates a file to back out change if executed – A report summary for an UNREF report. CA CLEANUP for ACF2
  • 41. 41 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD DRP’s
  • 42. 42 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD DRP’s  Check for CA ACF2 errors messages when the system is coming up  Verify access to CA ACF2 system in the DR environment  Compare CA ACF2 active status with the active status of the DR CA ACF2 system Mode(ABORT)  List the release level of the DR CA ACF2 system and ensure that it is equal to the current production CA ACF2 used.  Ensure that the security configuration parameters for all Lpars are equal – Create a list on each LPAR to ensure that the configuration settings are correct.  Test options by comparing them to the previous day/month setting  Ensure availability of CA ACF2 Reporting  Ensure that you can create / delete / modify CA ACF2 records
  • 43. 43 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD DRP’s ACF79001 ACFFDR COULD NOT BE FOUND - ACF2 TERMINATING Reason: The CA ACF2 Field Definition Record (ACFFDR) is required for CA ACF2 processing. You must define the ACFFDR field definition module in a linklist data set. An error occurred in the CA ACF2 installation process. Action: Notify your CA ACF2 maintenance personnel of this error. Check for CA ACF2 errors messages when the system is coming up ACF79 Main Task message
  • 44. 44 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD DRP’s ACF79002 ACFINT COULD NOT BE FOUND - ACF2 TERMINATING Reason: The CA ACF2 initialization routine cannot find the CA ACF2 rule interpreter. The CA ACF2 rule interpreter is required for CA ACF2 processing. An error occurred in the CA ACF2 installation process. Action: Notify your CA ACF2 maintenance personnel of this error. Check for CA ACF2 errors messages when the system is coming up ACF79 Main Task message
  • 45. 45 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD DRP’s ACF79018 UNABLE TO LOCATE ACF2 CVT POINTER IN SSVT Reason: The CA ACF2 initialization task cannot locate the anchor word for the CA ACF2 CVT. An error occurred while installing the CA ACF2 CVT locator routine ACF$GCVT (CSECT $ACFGCVT). Action: Contact CA ACF2 Technical Support. Check for CA ACF2 errors messages when the system is coming up ACF79 Main Task message
  • 46. 46 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD DRP’s  Verify access to CA ACF2 system in the DR environment – Just try and logon  Not running in the same mode as production will bring the system up, but puts your company as risk – Compare CA ACF2 active status with the active status of the DR CA ACF2 system. Mode(ABORT)  Proper DR testing will ensure – Include things like loss of database – Recover a CICS region  SHOW ALL or SHOW ACF
  • 47. 47 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Review use of Static ID’s
  • 48. 48 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Static ID’s  All Mainframe address spaces require Logonids – Users – user password managed by user – Applications – static id and static password – Production jobs – static id and no password  Work loads on the MF accountability lost when not associated to end user. This makes resolving problems difficult  The user already has been authenticated on the system making the request – Duplicated authentication  Create the id as part of network access (automate – Make all requests with a single ID  Pass the ID and use passtickets – Passtickets with Application ID with passwords The Concerns
  • 49. 49 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD User logon Application Id or JAVA Generate Passticket User logonid Application ID A P PA P PA P PA P P CI C S W E B S E R V IC E S C I C S Static ID Flow
  • 50. 50 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD How to Review a New Static ID Request
  • 51. 51 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Passtickets, XREF, Resource Rules
  • 52. 52 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Passtickets
  • 53. 53 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Passtickets Building records You can build via batch – ACFBATCH TSO using ACF2 command SET PROFILE(PTKTDATA) DIVISION(SSIGNON) INSERT cicswebservice.appid sskey(1234567812345678) mult-use INSERT cicswebservice.appid.userlid sskey(8765432187654321) mult-use F ACF2,REBUILD(PTK),CLASS(P) Building Records - PTKDATA
  • 54. 54 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Passtickets Building records You can build via batch – ACFBATCH TSO using ACF2 command SET XREF(RGP) SYSID(****) INSERT APPIDRGP INCLUDE(CCCC CCCC CCCC CCCC) RESOURCE TYPE(CKC) F ACF2,NEWXREF,TYPE(RGP) Building Records – Resource Group
  • 55. 55 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Passtickets Building records You can build via batch – ACFBATCH TSO using ACF2 command SET RESOURCE(CKC) COMPILE * $KEY(APPIDRGP) TYPE(CKC) ROLESET USER(APPID) ALLOW STORE Building Records – Resource Rule
  • 56. 56 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD OSMF How do I put in the Security?
  • 57. 57 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Convert into CA ACF2 Commands /* Create the z/OSMF Administrators group */ Call RacfCmd "ADDGROUP IZUADMIN OMVS(GID(9003))" /* Create the z/OSMF Users group */ Call RacfCmd "ADDGROUP IZUUSER OMVS(GID(9004))" /* Create the z/OSMF Administrator UserID */ /* The home directory is created in the -prime step. If automount managed, pre-create it before the -prime step */ Call RacfCmd "ADDUSER ZOSMFAD DFLTGRP(IZUADMIN) OMVS(UID(9001) HOME(/u/zosmfad) PROGRAM(/bin/sh)) NOPASSWORD NOOIDCARD " Call RacfCmd "ALU ZOSMFAD TSO(PROC(IKJTDA) ACCTNUM(TSO) SIZE(2096128)) OMVS(ASSIZEMAX(2147483647) MEMLIMIT(2G))" /* Assign a password to the Administrator UserID before using it */ /* This is an example only - it is not recommended to insert passwords in this file */ /* Call RacfCmd "ALU ZOSMFAD PASSWORD(InsertAValidPassword) NOEXPIRED" */ /* Connect the z/OSMF Administrator UserID to the WebSphere Application Server Administrators Group */ Call RacfCmd "CONNECT ZOSMFAD GROUP(WSCFG1)"
  • 58. 58 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
  • 59. 59 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD What is the ACF2 setup for z/OSMF? Products o CA ACF2 for z/OS & CA ACF2 Option for DB2 Releases - CA ACF2 for z/OS: Release:15+ Components - CA ACF2 for z/OS Description: There is a IBM supplied REXX EXEC izudflt.cfg.rexx to generate RACF commands for z/OSMF configuration. This is the ACF2 conversion of the REXX EXEC. Solution: This is the z/OSMF IZUCONFIG.CFG.REXX conversion to ACF2 commands. Document ID: TEC614236
  • 60. 60 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Create the z/OSMF Administrator default group IZUADMIN and z/OSMF Step 1: User group IZUUSER ACF SET PROFILE(GROUP) DIV(OMVS) INSERT IZUADMIN GID(9003) INSERT IZUUSER GID(9004) F ACF2,REBUILD(GRP),CLASS(P)
  • 61. 61 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Create the z/OSMF Administrator default group IZUADMIN and z/OSMF Step 2. Create the z/OSMF Administrator UserID ZOSMFAD: SET LID INSERT ZOSMFAD NAME(Z/OSMF ADMINISTRATOR) MAXDAYS(0) LIDZMAX GROUP(IZUADMIN) UID(9001) HOME(/u/zosmfad) PROGRAM(/bin/sh) PASSWORD(xxxxxxxx) Step 3. Connect the z/OSMF Administer UserID and z/OSMF Users to Core: SET RESOURCE(APL) RECKEY BBNBASE ADD(- UID(uid string for ZOSMFAD) SERVICE(READ) ALLOW) RECKEY BBNBASE ADD(- UID(uid string for IZUUSERs) SERVICE(READ) ALLOW) F ACF2,REBUILD(APL)
  • 62. 62 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Create the z/OSMF Administrator default group IZUADMIN and z/OSMF Step 5. SyncToOSThread permits: SET RESOURCE(FAC) RECKEY BBO ADD(SYNC.BBNBASE.BBNC001 UID(uid string for WSCRU1) ALLOW) F ACF2,REBUILD(FAC) Step 5.1 Define resource class ZMFAPLA: SET C(GSO) SYSID(appropriate sysid) INSERT CLASMAP.ZMFAPLA RESOURCE(ZMFAPLA) RSRCTYPE(ZMF) F ACF2,REFRESH(CLASMAP) Step 5.2 Add Resource type ZMF to INFODIR: CHA INFODIR TYPES(R-RZMF) ADD F ACF2,REFRESH(INFODIR)
  • 63. 63 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Create the z/OSMF Administrator default group IZUADMIN and z/OSMF Step 5.3 Set up Core rules: SET RESOURCE(ZMF) RECKEY BBNBASE ADD(ZOSMF.- UID(uid string for ZOSMFAD) SERVICE(READ) ALLOW) RECKEY BBNBASE ADD(ZOSMF.- UID(uid string for IZUUSERs) SERVICE(READ) ALLOW) RECKEY BBNBASE ADD(ZOSMF.ADMINTASKS.- UID(uid string for IZUUSERs)) RECKEY BBNBASE ADD(ZOSMF.SETTINGS.-.MODIFY UID(uid string for IZUUSERs)) RECKEY BBNBASE ADD(ZOSMF.WORKLOAD_MANAGEMENT.WORKLOAD_MANAGEMENT.MODIFY UID(uid string for IZUUSERs)) RECKEY BBNBASE ADD(ZOSMF.WORKLOAD_MANAGEMENT.WORKLOAD_MANAGEMENT.INSTALL UID(uid string for IZUUSERs)) RECKEY BBNBASE ADD(ZOSMF.CAPACITY_PROVISIONING.CAPACITY_PROVISIONING.EDIT UID(uid string for IZUUSERs)) RECKEY BBNBASE ADD(ZOSMF.SOFTWARE_DEPLOYMENT.DATA. UID(uid string for ZOSMFAD) ALLOW) RECKEY BBNBASE ADD(ZOSMF.SOFTWARE_DEPLOYMENT.DATA. UID(uid string for IZUUSERs) ALLOW) RECKEY BBNBASE ADD(ZOSMF.SOFTWARE_DEPLOYMENT.SOFTWARE-.PRODUCT_INFO_FILE. UID(uid string for IZUUSERs)) F ACF2,REBUILD(ZMF)
  • 64. 64 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD CICS Security
  • 65. 65 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD FHPA1101 MYREGION DFHSIT42 IS BEING LOADED. ACFAE040 Phase 0 Initialization Started ACFAE300 Setting DFHSIT value SEC=YES ACFAE000 ACF2 PARAMETERIZATION IN PROGRESS ACFAE309 Setting DFHSIT value XFCT=YES ACFAE303 Setting DFHSIT value XPCT=YES ACFAE304 Setting DFHSIT value XTRAN=YES ACFAE301 Setting DFHSIT value RESSEC=ALWAYS ACFAE301 Setting DFHSIT value RESSEC=ALWAYS ACFAE302 Setting DFHSIT value CMDSEC=ALWAYS ACFAE311 Setting DFHSIT value DFLTUSER=CICSDFT ACFAE350 Setting DFHSIT value XAPPC=NO ACFAE351 Setting DFHSIT value XUSER=YES ACFAE320 Setting DFHSIT value XEJB=YES ACFAE321 Setting DFHSIT value EJBROLEPRFX= ACFAE322 Setting DFHSIT value SNSCOPE=NONE ACFAE353 Setting DFHSIT value XHFS=YES ACFAE041 Phase 0 Initialization Ended CICS SECURITY CICS INITIALIZATION
  • 66. 66 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD ACFAE044 Phase 2 Initialization Started ACFAE075 Storage manager subtask has been attached ACFAE050 Signon Manager Subtask is active ACFAE051 Attaching 005 Signon Server Subtasks ACFAE076 Program manager subtask has been attached ACF04057 GLOBAL DIRECTORY RMTP ALREADY EXISTS ACF04057 GLOBAL DIRECTORY RMTP ALREADY EXISTS ACFAE123 Global directory.. Ensure console reload was performed ACF04057 GLOBAL DIRECTORY RCFC ALREADY EXISTS ACFAE123 Global directory.. Ensure console reload was performed ACF04057 GLOBAL DIRECTORY RCKC ALREADY EXISTS ACFAE123 Global directory.. Ensure console reload was performed +ACFF9003 CICSSSUB PROCESS INITIALIZATION STARTED +ACFF9014 CICSSSUB PROCESS INITIALIZATION COMPLETED +ACFF9003 CICSLSUB PROCESS INITIALIZATION STARTED +ACFF9014 CICSLSUB PROCESS INITIALIZATION COMPLETED ACFAE045 Phase 2 Initialization Ended ACFAE047 Security Initialization Complete CICS SECURITY CICS INITIALIZATION
  • 67. 67 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD CICS SECURITY  You can load CA ACF2 parms one of two ways – Startup JCL – CA ACF2 Information Storage records  C-CIC Records CICS INITIALIZATION
  • 68. 68 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD CICS SECURITY - ACFM-Function Summary • AM-Access Rule Maintenance • Inspects, modifies, and stores access rule sets under the CICS interface. • CP-CA ACF2 Command Processor • Executes the ACF command and supports most of the standard ACF command facilities. • EN, ES, and EV-End of Session • Terminates ACFM sessions. • HM-Help General Menu Display • Displays a list of all functions that are available in ACFM. • OD/OM-System Option Display and Modification • Displays (OD) and modifies (OM) the CICS interface security subsystem options currently in effect. • RC-Resource Control • Adds USERKEYs, reloads directories for CICSKEYs and USERKEYs, and resets CA ACF2 validations for session caches. • RM-Resource Rule Maintenance • Inspects, modifies, and stores resource rule sets under the CICS interface.
  • 69. 69 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD CICS SECURITY - ACFM-Function Summary  SD-CICS Interface System Status Display – Contains secondary functions that display the status of the CICS interface system: • CACHE • DIRECT • ENVIRON • GENERAL • LOOK • SUBTASK • WINDOW • MRO - MRO, ISC, IRC • IRC inter region communications • ISC intersystem communications • MRO Multiple Region Option
  • 70. 70 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD CICS SECURITY – ACFE Who is on the Region? ACFE=WHOSON <<< List of USERS in Region: CICSSEC >>> Signon Signon Signon Userid Netname Applid Mode Type Time Date <<------------------------------------------------------------------------------------->>
  • 71. 71 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Don’t Be convinced that you are secure because your infrastructure has advanced monitoring and protection Cripple the business with cumbersome processes they will find a way to circumvent Remember You are only as secure as your least secure vendor (none are too small to consider) Do Be aware of recent breaches and ensure you raise the bar for attackers Consider all paths into the Mainframe. Summary A Few Words to Review
  • 72. 72 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Q & A
  • 73. 73 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Follow Conversations in the Mainframe Content Center CA Data Content Discovery CA ACF2 ™ for z/OS CA Top Secret® for z/OS CA Cleanup CA Auditor Identify and Control Security Risk Discover regulated data on z Systems™ and maintain a secure infrastructure Advanced Authentication – Nov 18th @ 4:30pm The Known Unknown - Nov 19th @ 12:15pm
  • 74. 74 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD For More Information To learn more, please visit: http://cainc.to/Nv2VOe CA World ’15