Is IBM trying to get out of z/OS? Abby Ross states "passwords and confidential 
information should not be on the mainframe because they are exposed to any type 
of user". This article is about selling IBM services and moving to Unix. So 
called experts yet she and her team obviously don't understand z/OS security. 
She gives a list of Unix security exposures. I'll go thru them shortly.
It's sad that these so called IBM security experts give out such bad advice to 
their customers. The actual solution is to treat z/OS Unix security exactly the 
same as any other Unix system. Unix programmers get the flexibility to do 
everything but with that comes the responsibility to learn corporate Unix 
security standards. z/OS Unix must comply with both corporate standards (Unix 
and z/OS).
Item 1 - password policies: In what world is an 8 character passwords easily 
guessed in 10 attempts? She even thinks hackers will have a whole day to crack 
it. Even worse she sites a colleagues example of Windows active directory 
services breach exposing a z/OS user's password. Is she saying that Unix 
doesn't have this exposure with Windows Active Directory Services? If not, then 
what corporate standard is z/OS Unix missing?

Item 2 - data left behind: When was MVS ever a setup and forget system? Planned 
properly then much of the security will occur naturally (e.g. naming 
conventions). Fewer people are needed to maintain z/OS corporate standards 
because they are very easy to follow.
"Certain data should be secured". Obviously but people must follow corporate 
standards (e.g. naming conventions or the equivalent Unix standard).
"Sensitive data should be deleted". In Unix, why bother with deletion when you 
can't delete from the backups. The only solution for any Unix system is to 
properly protect the data. Deleting datasets from z/OS and HSM is trivial but 
why bother when it's properly secured in the first place.

"passwords and confidential information should not be on the mainframe because 
they are exposed to any type of user" totally boggles the mind. They think it's 
a great idea to move sensitive data to systems that are getting hacked all the 
time (do a web search for the last year to see the reported cases).
"They had a hacker who found privileged data". People make fewer (and far less 
impact) security mistakes on z/OS than Unix. Think back to that web search.  
Item 3: over-privileged users. Most people forget 90% of the z/OS users are 
either CICS and IMS who don't have direct access to any datasets and often 
restricted to specific transactions. How many of the remaining 10% are 
considered over-privileged by their companies policies? Is that mostly z/OS 
Unix where they aren't following corporate Unix standards?
Item 4: unencrypted protocols. Specifically she sites "TN3270 defaults to 
unencrypted for webservers". z/OS TN3270 easily supports SSL encryption. 
Doesn't the blame belong to the a web server not using the SSL port? This is a 
usage issue instead of a technical issue. Set a corporate standard and everyone 
must follow.
Item 5: insecure applications. Security in CICS, IMS, TSO and batch are hidden 
with very few exceptions (e.g. TCP sockets). There are only 3 commonly used 
security products (RACF, ACF2 and Top-Secret) and they are so heavily used that 
testing is considered far superior to Unix equivalents.
Unix gives programmers the flexibility to implement anything they want. Because 
this flexibility includes security, they have the responsibility to test what 
ever security they implement. Who takes responsibility for all the freeware in 
use by those applications (huge list)? How about frameworks (software bundles)? 
How about each programmer's set of utilities and tools? Do you really think 
most Unix systems are being properly validated?  
The biggest factor in security is human. z/OS has greatly reduced that 
exposure. Unix needs to grow up and take responsibility for it's failures. Or 
maybe we just need another 100 API's, frameworks and utilities.
Jon.
    On Tuesday, August 13, 2019, 06:57:59 AM PDT, Charles Mills 
<charl...@mcn.org> wrote:  
 
 I disagree somewhat with the other two commenters.

The papers are NOT an advanced how-to for RACF administrators! (For that, see 
the DISA STIGs!) But they are a decent intro for a manager who is ignorant of 
-- and frankly, need not be concerned with -- configuration details. They 
weren't written for readers of this list -- but think about your manager or his 
boss ...

The first paper is pretty good IMHO. Would anyone disagree that the five 
vulnerabilities listed are at least among the top ten or so vulnerabilities?

The second paper is certainly airline magazine level. Yeah, the quote cited by 
Lennie makes absolutely no sense. But there are some good points in there. 
Would anyone disagree with the following? Would anyone say it would NOT be good 
if every CIO at a mainframe organization read the following?

The mainframe
was and is critical to commercial databases, transaction
servers and applications that require high reliability,
scalability, compatibility and speed. In fact, mainframes
handle 30 billion business transactions every single day—
and that number is only expected to grow1.
However, companies face challenges ensuring their mainframes
are secure. With IT resources stretched and criminal attacks
on the rise, CIOs and CISOs need to make sure their mainframes
are locked down.

Charles


-----Original Message-----
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Filip Palian
Sent: Monday, August 12, 2019 6:17 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Mainframes testing

Hey List,

This can be of interest to some:

- 
https://securityintelligence.com/posts/top-five-security-focus-areas-for-mainframes/
- https://www.ibm.com/downloads/cas/A9NKZ8WE

Any thoughts/comments?

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN  

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

Reply via email to