On 8 May 2012 11:06, Pascoe, Raymond M <[email protected]> wrote:
> Not sure if this forum is the appropriate place to ask this question, so 
> please advise.

It's a fine place to ask.

> We have been requested by the Centers for Medicare and Medicaid, as a part of 
> our mainframe compliance program (using NIST and DISA STIGs) , to use the 
> national vulnerability database http://web.nvd.nist.gov/view/vuln/search   to 
> identify vulnerabilities which affect the zOS operating system running on the 
> IBM mainframe.
>
> Is the National Vulnerability Database the right place to look for zOS 
> vulnerabilities in the first place?

I doubt that most of the discovered vulnerabilities get into it, but
it doesn't hurt to look there.

> We are primarily looking for vulnerabilities for zOS operating system, but 
> would also be interested in searching for vulnerabilities in third party 
> software packages from vendors such as CA Technology.
>
> Any guidance and/or the appropriate keyword search(es) for the NVD which can 
> be used to meet this objective would be appreciated.

IBM publishes a series of documents with titles like "Security Target
for IBM z/OS Version 1 Release nn", which I believe are intended for
Common Criteria evaluation by various governments.  The German Federal
Office for Information Security (BSI) publishes what it has evaluated,
and there may be others. They are referenced in the _Planning for
Multilevel Security and the Common Criteria_ book, and you can also
simply plug in release numbers and such and see what your favorite
search engine comes up with. (Do watch out for bogus sites that
collect anything they think will get them search engine points and/or
serve ads to you.) Take note also that there are similar documents for
some other IBM operating systems, and for hardware.

One can learn quite a bit from these published documents, not least
lists of fixes that must be applied in order to pass the claimed
security specifications, from which one might reasonably infer that
the fixes are for software vulnerabilities. Obviously IBM has much
jucier internal versions of these documents. I don't know if there is
an official way to get hold of this kind of material, either from IBM
or from your national government. In any case, the weaknesses
described are almost certainly long since fixed.

Tony H.

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to