Oh. Yes, I thought commercials are not that popular here :) We also provide in-depth IT security assessments for mainframe systems, have been doing this for quite some years. We offer some specialized tools as well, for example for offline / regular RACF password auditing (but no, no such animal as a z/OS virus checker).
More information at http://www.detack.com/en/hms.html Costin Enache / Detack GmbH --- On Fri, 3/4/11, Jan Vanbrabant <[email protected]> wrote: > From: Jan Vanbrabant <[email protected]> > Subject: Re: z/OS Virus Checker & zLinux Virus Checker > To: [email protected] > Date: Friday, March 4, 2011, 8:56 AM > Don't see anything like a "forum" in > the sitemap of your web site. > J > > On Fri, Mar 4, 2011 at 7:21 AM, Dr. Stephen Fedtke < > [email protected]> > wrote: > > > hi all, > > > > i almost missed this discussion. if you are interested > in further arguments > > and details in this field "Vulnerability Analysis and > Scan on z" you should > > also refer to the "it security forum" on our website. > we completely solve > > this problem for over a decade. > > > > best > > stephen > > > > > > > > --- > > Dr. Stephen Fedtke > > Enterprise-IT-Security.com > > > > Seestrasse 3a > > CH-6300 Zug > > Switzerland > > Tel. ++41-(0)41-710-4005 > > www.enterprise-it-security.com > > > > > > ++NEWS++ SF-LoginHood provides state-of-the-art > password, phrase and login > > security for z/OS ++NEWS++ > > > > > > > > > > > > > > > > > > At 14:04 29.01.2011 -0600, you wrote: > > >Elardus, > > > > > >Please let me add some information in response to > your posting: > > > > > >There is a difference between a Virus and a System > Integrity > > >Exposure.The System Integrity Exposure is the Root > Cause that a Virus > > >exploits.There may be many Viruses, especially in > Windows Systems, which > > >exploit the same Root Cause.The PC Virus checkers > look for the > > >signatures of Virus code either executing or in > directories and then > > >take action to remove them.The Virus Checkers > cannot fix the Root Cause > > >-- in the case of Windows, only Microsoft can do > that.But, it would be > > >better if Microsoft would fix the Root Cause > because then the Virus > > >programs would become ineffective. > > > > > >IBM's Statement of Integrity clearly states that > if a System Integrity > > >Vulnerability (the Root Cause) is reported to IBM, > they will fix > > >it.Microsoft does not make this commitment and > this is why the z/OS > > >Operating System is a much more "securable" system > than Windows. > > > > > >However, z/OS is not immune to these threats > because it too has system > > >integrity vulnerabilities.In your posting, you > state that there are many > > >alternatives to our Vulnerability Analysis Product > for the "ethical > > >hacking/penetrating/scanning for defects and > exposures."In fact, IBM > > >purports to provide this capability from their > Tivoli zSecure unit.On > > >their zSecure Audit Website, they state: "Security > zSecure Audit > > >includes a powerful system integrity analysis > feature. Reports identify > > >exposures and potential threats based on > intelligent analysis built into > > >the system."That's a pretty powerful and absolute > statement. > > > > > >But, since Tivoli is part of IBM you can be > assured that their Quality > > >Assurance Unit regularly tests their software > against revisions to the > > >IBM z/OS Operating System and, if any integrity > exposures were found, > > >they would have reported the vulnerabilities to > IBM z/OS Development and > > >Development would have fixed them.That would just > be the normal course > > >of business within IBM. > > > > > >But, then, how can you reconcile the fact that our > VAT product has > > >located SIXTY SEVEN (67) new system integrity > vulnerabilities in z/OS > > >within the last two years.And, our clients have > reported them to IBM, > > >IBM has accepted them as errors, issued APARS for > all of them and issued > > >PTFs for almost all of them.So, obviously, the IBM > Tivoli zSecure Audit > > >package is not catching these errors.And, if IBM, > is not catching these > > >in their own code, what about the ones introduced > by the rest of the > > >Independent Software Vendor products and locally > developed or otherwise > > >obtained code on your system?There is a big > vulnerability here that > > >cannot be ignored. > > > > > >An exploit of a z/OS (or ISV) system integrity > vulnerability would allow > > >the illegitimate user to obtain control in an > authorized state and use > > >this state to change his security credentials to > obtain access and be > > >able to modify any RACF protected resource on the > system with no SMF > > >journaling of the access.We have found these > integrity exposures in code > > >that is in operation on every z/OS system in > existence.That is something > > >to be concerned about and to act on. > > > > > >I have no idea of the comparison between the cost > of our Vulnerability > > >Analysis Tool versus the competition.We would be > happy to discuss that > > >with you -- we believe it is inexpensive compared > to the benefits which > > >include not only a reduction of risk and exposure > to data loss and > > >modification which would result in exposure of > company secrets, private > > >information and financial loss, but a reduction of > system outages.But, > > >VAT works and locates the errors that other > software/services do not.I > > >can totally assure you that a manual process just > will not work in our > > >lifetimes.So, an automated process is > necessary.And VAT provides that > > >automation. > > > > > >And I agree with you that many z/OS Auditors need > to be educated on this. > > > > > >Ray Overby > > >Key Resources, Inc. > > >Ensuring System Integrity for z/Series^(TM) > > >www.vatsecurity.com > > >(312)574-0007 > > > > > > > > > > > >On 1/29/2011 09:12 AM, Elardus Engelbrecht wrote: > > >> Cris Hernandez #9 wrote: > > >> > > >>> I too have auditors who treat the my > mainframe like one those little > > puters > > >> and I find it best to first educate them > before they convince my > > management > > >> to send me chasing phantoms. Don't > assume your auditor won't appreciate > > a > > >> mainframe education. > > >> > > >> Jim Marshall wrote: > > >> > > >>> Auditors came around and wrote up our > z/OS V1R10 Sysplex for not > > running a > > >> Virus Checker. Anyone has a > constructive solution as to one being > > available or > > >> some verbage which defends the position. > > >> > > >> > > >> After reading all those good answers, please > allow me a reply: > > >> > > >> I told my auditors this: > > >> > > >> 1. There are NO vendors for z/OS antivirus > software. Give me one example > > and > > >> I'm ready to talk with my management. > Otherwise we talk about RACF, APF, > > >> etc. as discussed already in this thread. > > >> > > >> 2. There are Linux and Unix antivirus > software, but z/OS itself are > > immune > > >> against the threats. > > >> > > >> 3. Some disgruntled employee(s) may place a > TROJAN, not a virus. It > > >> happened unfortunately. That is another > matter for another rainy day. > > >> > > >> 4. Depending on RACF accesses, one can write > something in any language > > to > > >> delete or modify datasets. Anyone. It is up > to you to protect your z/OS. > > Read > > >> again that thread in ibmmainframes.com > mentioned in this thread for > > some > > info. > > >> > > >> 5. About VAT Security and similar > software/service - It looked to me > > that > > this > > >> is *ethical* hacking/penetrating/scanning for > defects and exposures. > > That is > > >> the standard (?), but expensive way, for > checking out your z/OS. There > > are > > >> many such software and services available > from various vendors. > > >> > > >> > > >> I'm very sure those auditors are in for a > serious *re-education* ;-D > > >> > > >> Groete / Greetings > > >> Elardus Engelbrecht > > >> > > >> > ---------------------------------------------------------------------- > > >> For IBM-MAIN subscribe / signoff / archive > access instructions, > > >> send email to [email protected] > with the message: GET IBM-MAIN INFO > > >> Search the archives at http://bama.ua.edu/archives/ibm-main.html > > >> > > > > > > >---------------------------------------------------------------------- > > >For IBM-MAIN subscribe / signoff / archive access > instructions, > > >send email to [email protected] > with the message: GET IBM-MAIN INFO > > >Search the archives at http://bama.ua.edu/archives/ibm-main.html > > > > > > > > > > > ---------------------------------------------------------------------- > > For IBM-MAIN subscribe / signoff / archive access > instructions, > > send email to [email protected] > with the message: GET IBM-MAIN INFO > > Search the archives at http://bama.ua.edu/archives/ibm-main.html > > > > ---------------------------------------------------------------------- > For IBM-MAIN subscribe / signoff / archive access > instructions, > send email to [email protected] > with the message: GET IBM-MAIN INFO > Search the archives at http://bama.ua.edu/archives/ibm-main.html > ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [email protected] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html

