57
Copyright 2000, 2006 EKC Inc. Eberhard Klemens Co. Experts in Computer Systems - Software - Security Auditing the Auditing the RACF RACF Environment Environment Topic 1: Auditing RACF

auditing The Racf Environment - Ekc · Selected Data Sets ReportSelected Data Sets Report-----

  • Upload
    hakhue

  • View
    240

  • Download
    5

Embed Size (px)

Citation preview

Page 1: auditing The Racf Environment - Ekc · Selected Data Sets ReportSelected Data Sets Report-----

Copyright 2000, 2006 EKC Inc.

Eberhard Klemens Co.Experts in Computer

Systems - Software - Security

Auditing theAuditing theRACFRACF

EnvironmentEnvironmentTopic 1: Auditing RACF

Page 2: auditing The Racf Environment - Ekc · Selected Data Sets ReportSelected Data Sets Report-----

Auditing 2Copyright 2000, 2006 EKC Inc.

www.ekcinc.com

Eberhard Klemens Co.Experts in Computer

Systems - Software - Security

Topic 1 ObjectivesTopic 1 Objectives

The Audit Environment

Sample Audit Points

Audit Controls

Audit Data

Audit Reporting

Page 3: auditing The Racf Environment - Ekc · Selected Data Sets ReportSelected Data Sets Report-----

Auditing 3Copyright 2000, 2006 EKC Inc.

www.ekcinc.com

Eberhard Klemens Co.Experts in Computer

Systems - Software - Security

Separation of PowersSeparation of Powers

SPECIAL AUDITOR

Page 4: auditing The Racf Environment - Ekc · Selected Data Sets ReportSelected Data Sets Report-----

Auditing 4Copyright 2000, 2006 EKC Inc.

www.ekcinc.com

Eberhard Klemens Co.Experts in Computer

Systems - Software - Security

Conducting the AuditConducting the Audit

Judge how effectively RACF has beenimplemented to handle security at theinstallation.

Identify any security exposures.

Recommend ways to improve the system.

Page 5: auditing The Racf Environment - Ekc · Selected Data Sets ReportSelected Data Sets Report-----

Auditing 5Copyright 2000, 2006 EKC Inc.

www.ekcinc.com

Eberhard Klemens Co.Experts in Computer

Systems - Software - Security

The Audit CycleThe Audit Cycle

Establish Benchmark

Check loggings regularly

Re-examine security implementation andcompare against last benchmark

Establish new benchmark

Page 6: auditing The Racf Environment - Ekc · Selected Data Sets ReportSelected Data Sets Report-----

Auditing 6Copyright 2000, 2006 EKC Inc.

www.ekcinc.com

Eberhard Klemens Co.Experts in Computer

Systems - Software - Security

Twelve Point ApproachTwelve Point Approach Point 1 - System Controls - Level of Implementation

Point 2 - Change Control Over Options and Software

Point 3 - Protection for Database and SMF Files

Point 4 - Enforcement of Security Policy

Point 5 - Password Administration

Point 6 - Approach to Access Profiles

Page 7: auditing The Racf Environment - Ekc · Selected Data Sets ReportSelected Data Sets Report-----

Auditing 7Copyright 2000, 2006 EKC Inc.

www.ekcinc.com

Eberhard Klemens Co.Experts in Computer

Systems - Software - Security

Twelve Point ApproachTwelve Point Approach Point 7 - Ability to Bypass Controls

Point 8 - Control of Non-Owned Ids

Point 9 - Controls Over Production Ids

Point 10 - Controls for Key System Components

Point 11 - Ability to Gain Unauthorized Access

Point 12 - Security Reporting and Follow-Up

Page 8: auditing The Racf Environment - Ekc · Selected Data Sets ReportSelected Data Sets Report-----

Auditing 8Copyright 2000, 2006 EKC Inc.

www.ekcinc.com

Eberhard Klemens Co.Experts in Computer

Systems - Software - Security

11 -- System ImplementationSystem Implementation

Limit / Control / Review Where to Look

RACF Release level

System Release levelDSMONSystem Report

shows zOS and RACFRelease / FMID levels

SETROPTS LIST

shows module names andlengths of installed exits

shows PROTECTALLlevel and options

RACF Exits DSMON SystemExits Report

PROTECTALL settings

Page 9: auditing The Racf Environment - Ekc · Selected Data Sets ReportSelected Data Sets Report-----

Auditing 9Copyright 2000, 2006 EKC Inc.

www.ekcinc.com

Eberhard Klemens Co.Experts in Computer

Systems - Software - Security

22 –– Administration / Change ControlAdministration / Change Control

Limit / Control / Review Where to Look

assignment ofsystem-SPECIAL

DSMON SelectedUser AttributeReport

shows number of usersand user IDs givensystem-SPECIAL

use of RVARY command SETROPTS LISTshows if there is anRVARY password specified

use of SETROPTSREFRESH command DSMON SUAR

shows number of usersand user IDs with SPECIALand AUDITOR

Page 10: auditing The Racf Environment - Ekc · Selected Data Sets ReportSelected Data Sets Report-----

Auditing 10Copyright 2000, 2006 EKC Inc.

www.ekcinc.com

Eberhard Klemens Co.Experts in Computer

Systems - Software - Security

33 –– Securing access to RACF & SMFSecuring access to RACF & SMF

Limit / Control / Review Where to Look

Access to RACFdatabase carefullycontrolled

LISTDSD

shows access lists forprimary and backupRACF databases

LISTDSD

Site specific

Access to SMFfiles limited

shows access lists forprimary and backupRACF databases

Review procedures andschedule for backupof RACF database(s)

Regularly scheduledbackups of RACFdatabase files

Page 11: auditing The Racf Environment - Ekc · Selected Data Sets ReportSelected Data Sets Report-----

Auditing 11Copyright 2000, 2006 EKC Inc.

www.ekcinc.com

Eberhard Klemens Co.Experts in Computer

Systems - Software - Security

44 –– Security Policy ReviewSecurity Policy Review

Limit / Control / Review Where to Look

Determine existenceof security policy Interviews with Security management staff.

Procedures in placefor PASSWORDchanges, makeup.

Review site specific procedures,SETROPTS LIST

Handeling of deleteduserids Review site specific procedures

Page 12: auditing The Racf Environment - Ekc · Selected Data Sets ReportSelected Data Sets Report-----

Auditing 12Copyright 2000, 2006 EKC Inc.

www.ekcinc.com

Eberhard Klemens Co.Experts in Computer

Systems - Software - Security

55 –– Password Policy ReviewPassword Policy Review

Limit / Control / Review Where to Look

Periodic requiredpassword change Review change interval.

PASSWORDlength

Review site specificprocedures,

Review unsuccessfulpassword attempts

SETROPTS LIST

SETROPTS LIST

PASSWORD“hacking” SETROPTS LIST

Page 13: auditing The Racf Environment - Ekc · Selected Data Sets ReportSelected Data Sets Report-----

Auditing 13Copyright 2000, 2006 EKC Inc.

www.ekcinc.com

Eberhard Klemens Co.Experts in Computer

Systems - Software - Security

66 –– Access HierarchyAccess Hierarchy

Limit / Control / Review Where to Look

Verify access listsfor individuals andgroups

Review groups to determinedefinition and use offunctional groups.

Verify appropriateUACC access

Review dataset profiles forapropriate UACC access.

DSMONGROUP TREE

LISTDSD

Verify OWNER datafor profiles andgroups

LISTDSD

DSMONGROUP TREE

Review owner data todetermine inheritance ofdata / application ownership

Page 14: auditing The Racf Environment - Ekc · Selected Data Sets ReportSelected Data Sets Report-----

Auditing 14Copyright 2000, 2006 EKC Inc.

www.ekcinc.com

Eberhard Klemens Co.Experts in Computer

Systems - Software - Security

77 –– Ability to Bypass ControlsAbility to Bypass Controls

Limit / Control / Review Where to Look

Verify SETROPTSPROTECTALL activein FAILURE mode

shows ifPROTECTALL FAILUREis in effect

SETROPTS LISTshows if profile creator isautomatically added withALTER to access list

DSMONshows number of userswith OPERATIONS

SETROPTS LIST

Ensure SETROPTSNOADDCREATORis applied

Minimize use ofOPERATIONSattribute

Page 15: auditing The Racf Environment - Ekc · Selected Data Sets ReportSelected Data Sets Report-----

Auditing 15Copyright 2000, 2006 EKC Inc.

www.ekcinc.com

Eberhard Klemens Co.Experts in Computer

Systems - Software - Security

88 –– NonNon--OwnedOwned UseridsUserids

Limit / Control / Review Where to Look

Use of region IDs forbatch jobs submittedon behalf of users

SEARCH CLASS(PROPCNTL)NOMASK

Search forPROPCNTLprofiles

Review use ofsurrogate profiles

Search forSURROGATprofiles

SEARCH CLASS(SURROGAT)NOMASK

Page 16: auditing The Racf Environment - Ekc · Selected Data Sets ReportSelected Data Sets Report-----

Auditing 16Copyright 2000, 2006 EKC Inc.

www.ekcinc.com

Eberhard Klemens Co.Experts in Computer

Systems - Software - Security

99 –– Controls over Production IDsControls over Production IDs

Limit / Control / Review Where to Look

Review rationale usedto associate productionIDs with jobs

Site specific

Verify controlsover productionJCL libraries

Datasetprofiles

Review profiles to ensureappropriate access

Review SURROGATuse to ensure onlyauthorized use

SURROGATprofiles

RL userid.SUBMITCL(SURROGAT) AU

Page 17: auditing The Racf Environment - Ekc · Selected Data Sets ReportSelected Data Sets Report-----

Auditing 17Copyright 2000, 2006 EKC Inc.

www.ekcinc.com

Eberhard Klemens Co.Experts in Computer

Systems - Software - Security

1010 –– Key System ComponentsKey System Components

Limit / Control / Review Where to Look

Review inventory ofproducts requiringsecurity interface

Site specific-List of installed products

Verify adequacy ofaccess controlsin place

Review general resource profilesfor vendor products.

Assure adequate useof SAF-basedcontrols

DSMON AuthorizedCaller Report

Page 18: auditing The Racf Environment - Ekc · Selected Data Sets ReportSelected Data Sets Report-----

Auditing 18Copyright 2000, 2006 EKC Inc.

www.ekcinc.com

Eberhard Klemens Co.Experts in Computer

Systems - Software - Security

1111 –– Ability to gain unauthorized accessAbility to gain unauthorized access

Limit / Control / Review Where to Look

User IDs which havenever been used or notused for an extendedperiod of time

SEARCH CLASS(USER) AGE(120)

Default userids(IBMUSER)

LU IBMUSER

RACF defaultpassword

Review procedures for changing passwords

Page 19: auditing The Racf Environment - Ekc · Selected Data Sets ReportSelected Data Sets Report-----

Auditing 19Copyright 2000, 2006 EKC Inc.

www.ekcinc.com

Eberhard Klemens Co.Experts in Computer

Systems - Software - Security

1212 –– Security Reporting and FollowSecurity Reporting and Follow--upup

Limit / Control / Review Where to Look

Review types andfrequency ofreports

Review reportdistribution

Determine actionsfrom violationattempts

Site specific procedures

Site specific procedures

Site specific procedures

Page 20: auditing The Racf Environment - Ekc · Selected Data Sets ReportSelected Data Sets Report-----

Auditing 20Copyright 2000, 2006 EKC Inc.

www.ekcinc.com

Eberhard Klemens Co.Experts in Computer

Systems - Software - Security

Auditor ControlsAuditor Controls

General ControlsSETROPTS Commands – SETR AUDIT(*)

Specific ControlsUser activity – ALU …

Dataset activity – ALTDSD

Resource activity – RALTER

Page 21: auditing The Racf Environment - Ekc · Selected Data Sets ReportSelected Data Sets Report-----

Auditing 21Copyright 2000, 2006 EKC Inc.

www.ekcinc.com

Eberhard Klemens Co.Experts in Computer

Systems - Software - Security

Audit ControlsAudit Controls --SETROPTSSETROPTS

APPLAUDIT and NOAPPLAUDIT AUDIT and NOAUDIT CMDVIOL and NOCMDVIOL LIST LOGOPTIONS OPERAUDIT and NOOPERAUDIT REFRESH GENERIC REFRESH RACLIST SAUDIT and NOSAUDIT SECLABELAUDIT and NOSECLABELAUDIT SECLEVELAUDIT and NOSECLEVELAUDIT

Page 22: auditing The Racf Environment - Ekc · Selected Data Sets ReportSelected Data Sets Report-----

Auditing 22Copyright 2000, 2006 EKC Inc.

www.ekcinc.com

Eberhard Klemens Co.Experts in Computer

Systems - Software - Security

Controlling LoggingControlling Logging

ApplicationOwner

SYS1.MANx

Auditor

Page 23: auditing The Racf Environment - Ekc · Selected Data Sets ReportSelected Data Sets Report-----

Auditing 23Copyright 2000, 2006 EKC Inc.

www.ekcinc.com

Eberhard Klemens Co.Experts in Computer

Systems - Software - Security

OwnerOwner--Controlled LoggingControlled Logging

ALTDSD 'PAYROLL.MASTER.*'AUDIT(FAILURES(READ))

PAYROLL.MASTER.* . . . FAILURES(READ)

Profile Name AUDIT GLOBALAUDIT

Page 24: auditing The Racf Environment - Ekc · Selected Data Sets ReportSelected Data Sets Report-----

Auditing 24Copyright 2000, 2006 EKC Inc.

www.ekcinc.com

Eberhard Klemens Co.Experts in Computer

Systems - Software - Security

Auditor ControlsAuditor Controls –– LoggingLogging

ALTDSD 'PAYROLL.MASTER.*'GLOBALAUDIT(SUCCESS(UPDATE))

SETR LOGOPTIONS(ALWAYS(DASDVOL))SETR LOGOPTIONS(FAILURES(TERMINAL))

PAYROLL.MASTER.* . . . FAILURES(READ) SUCCESS(UPDATE)

Profile Name AUDIT GLOBALAUDIT

ALU STAN UAUDIT

Page 25: auditing The Racf Environment - Ekc · Selected Data Sets ReportSelected Data Sets Report-----

Auditing 25Copyright 2000, 2006 EKC Inc.

www.ekcinc.com

Eberhard Klemens Co.Experts in Computer

Systems - Software - Security

Two Types of Audit DataTwo Types of Audit Data

Snapshot Data – The ImplementationRACF Commands – L…, SETR LIST

Data Security Monitor – DSMON

RACF Database Unload – IRRDBU00

Event Data – Wazhappnin???RACF Commands – LOGOPTIONS, GLOBALAUDIT…

SMF Data Unload Utility – IFASMFDP

Reporting Tools – SAMPLIB

RICE reports – ICEMAN statements for DB & SMF unloaded data

DB2 queries – RACDBUxx, IRRADUxx

Page 26: auditing The Racf Environment - Ekc · Selected Data Sets ReportSelected Data Sets Report-----

Auditing 26Copyright 2000, 2006 EKC Inc.

www.ekcinc.com

Eberhard Klemens Co.Experts in Computer

Systems - Software - Security

Running the DSMON ProgramRunning the DSMON Program

ICHDSM00

//stepname EXEC PGM=ICHDSM00//SYSPRINT DD SYSOUT=A//SYSUT2 DD SYSOUT=A//SYSIN DD *LINECOUNT 55FUNCTION ALLUSEROPT USRDSN PAY.MASTER.FILE

Hardware

Software

DSMONReports

Page 27: auditing The Racf Environment - Ekc · Selected Data Sets ReportSelected Data Sets Report-----

Auditing 27Copyright 2000, 2006 EKC Inc.

www.ekcinc.com

Eberhard Klemens Co.Experts in Computer

Systems - Software - Security

DSMON ReportsDSMON Reports

Selected Data Sets Report

Group Tree Report

RACF Global Access Table Report

RACF Class Descriptor Table Report

RACF Started Procedures Table Report

Selected User Attribute Summary Report

Selected User Attribute Report

RACF Authorized Caller Table Report

Program Properties Table Report

System Report

CPU-IDCPU MODELOPERATING SYSTEM/LEVEL z/OS . . .SYSTEM RESIDENCE VOLUMERACF FMID HRF7709 IS ACTIVE

DSMON

Reports

RACF Exits Report

Page 28: auditing The Racf Environment - Ekc · Selected Data Sets ReportSelected Data Sets Report-----

Auditing 28Copyright 2000, 2006 EKC Inc.

www.ekcinc.com

Eberhard Klemens Co.Experts in Computer

Systems - Software - Security

System ReportSystem Report

CPU-ID 111606CPU MODEL 2064OPERATING SYSTEM/LEVEL z/OS 1.6.0SYSTEM RESIDENCE VOLUME DR250BSMF-ID ZOSRRACF FMID HRF7709 IS ACTIVE

Page 29: auditing The Racf Environment - Ekc · Selected Data Sets ReportSelected Data Sets Report-----

Auditing 29Copyright 2000, 2006 EKC Inc.

www.ekcinc.com

Eberhard Klemens Co.Experts in Computer

Systems - Software - Security

Program Properties Table ReportProgram Properties Table ReportPROGRAM BYPASS PASSWORD SYSTEMNAME PROTECTION KEY---------------------------------------------------------------------------------IEDQTCAM NO YESISTINM01 YES YESIKTCAS00 NO YESAHLGTF NO YESHHLGTF NO YESIHLGTF NO YESIEFIIC NO YESIEEMB860 YES YESIEEVMNT2 NO YESIASXWR00 NO YESCSVVFCRE NO YESHASJES20 YES YESDFSMVRC0 NO YESIATINTK YES YESDXRRLM00 NO YES

Page 30: auditing The Racf Environment - Ekc · Selected Data Sets ReportSelected Data Sets Report-----

Auditing 30Copyright 2000, 2006 EKC Inc.

www.ekcinc.com

Eberhard Klemens Co.Experts in Computer

Systems - Software - Security

RACF Authorized Caller Table ReportRACF Authorized Caller Table Report

MODULE RACINIT RACLISTNAME AUTHORIZED AUTHORIZED---------------------------------------------------------------------------DFHSIP NO YES

Page 31: auditing The Racf Environment - Ekc · Selected Data Sets ReportSelected Data Sets Report-----

Auditing 31Copyright 2000, 2006 EKC Inc.

www.ekcinc.com

Eberhard Klemens Co.Experts in Computer

Systems - Software - Security

RACF Exit ReportRACF Exit Report

EXIT MODULE MODULENAME LENGTH----------------------------------------------------------ICHPWX01 1354ICHDEX01 224

Page 32: auditing The Racf Environment - Ekc · Selected Data Sets ReportSelected Data Sets Report-----

Auditing 32Copyright 2000, 2006 EKC Inc.

www.ekcinc.com

Eberhard Klemens Co.Experts in Computer

Systems - Software - Security

Selected User Attribute ReportSelected User Attribute Report

USERID ---------------- ATTRIBUTE TYPE ----------------------------------------- ASSOCIATIONS ----------------------SPECIAL OPERATIONS AUDITOR REVOKE NODE.USERID PASSWORD ASSOCIATION

SYNC TYPE---------------------------------------------------------------------------------------------------------------------------------------------------BIGBIRD SYSTEM SYSTEMBERT SYSTEMELMO GROUP GROUPERNIE SYSTEM SYSTEMGROVER SYSTEM SYSTEMGROUCH GROUPIBMUSER SYSTEM SYSTEM SYSTEMSNUFFY GROUPZOE GROUP

Page 33: auditing The Racf Environment - Ekc · Selected Data Sets ReportSelected Data Sets Report-----

Auditing 33Copyright 2000, 2006 EKC Inc.

www.ekcinc.com

Eberhard Klemens Co.Experts in Computer

Systems - Software - Security

Selected User Attribute SummarySelected User Attribute Summary

--------------------------------------------------------------------------------------------------------------TOTAL DEFINED USERS: 563TOTAL SELECTED ATTRIBUTE USERS:ATTRIBUTE BASIS SPECIAL OPERATIONS AUDITOR REVOKE-------------------------- ------------- -------------------- -------------- -------------SYSTEM 4 3 1 2GROUP 1 2 1 1

Page 34: auditing The Racf Environment - Ekc · Selected Data Sets ReportSelected Data Sets Report-----

Auditing 34Copyright 2000, 2006 EKC Inc.

www.ekcinc.com

Eberhard Klemens Co.Experts in Computer

Systems - Software - Security

Started Procedures Table ReportStarted Procedures Table Report

FROM THE STARTED PROCEDURES TABLE (ICHRIN03):FROM PROFILES IN THE STARTED CLASS:------------------------------------------------------------------------------------------------------------------------------------------------PROFILE ASSOCIATED ASSOCIATEDNAME USER GROUP PRIVILEGED TRUSTED TRACE------------------------------------------------------------------------------------------------------------------------------------------------CICS.REGIONA CICSA NO NO NOCICS.REGIONB CICSB NO NO NODCEKERN.* (G) DCEKERN DCEGRP NO NO NOEZAFTPAP.* (G) TCPIP OMVSGRP NO YES NOFTPD.* (G) OMVSKERN OMVSGRP NO NO NOMVSNFS.* (G) TCPIP OMVSGRP NO NO NOOMVS.* (G) OMVSKERN OMVSGRP NO NO NOPORTMAP.* (G) TCPIP OMVSGRP NO YES YESFTPSERVE.* (G) TCPIP OMVSGRP NO YES NOINETD.* (G) INETD SYS1 NO NO NOSMF.* (G) STCUSR SYS1 NO YES NOIRRDPTAB.* (G) STCUSR SYS1 NO YES NOJES2.* (G) STCUSR SYS1 NO YES NOLLA.* (G) STCUSR SYS1 NO YES NOTSO.* (G) TSO TSOGRP NO NO NOVTAM.* (G) VTAM VTAMGRP NO YES NOLOGREC.* (G) LOGREC SYS1 NO NO NO** (G) =MEMBER STCGRP NO NO YES

Page 35: auditing The Racf Environment - Ekc · Selected Data Sets ReportSelected Data Sets Report-----

Auditing 35Copyright 2000, 2006 EKC Inc.

www.ekcinc.com

Eberhard Klemens Co.Experts in Computer

Systems - Software - Security

Class Descriptor Table ReportClass Descriptor Table ReportCLASS DEFAULT OPERATIONSNAME STATUS AUDITING STATISTICS UACC ALLOWED----------------------------------------------------------------------------------------------------------------------------RACFVARS ACTIVE NO NO NONE NOSECLABEL INACTIVE NO NO NONE NODASDVOL ACTIVE NO NO ACEE YESGDASDVOL ACTIVE NO NO ACEE YESTAPEVOL ACTIVE NO NO ACEE YESTERMINAL INACTIVE NO NO ACEE NOGTERMINL INACTIVE NO NO ACEE NOAPPL ACTIVE NO NO NONE NOTIMS INACTIVE NO NO NONE NOGIMS INACTIVE NO NO NONE NOAIMS INACTIVE NO NO NONE NOTCICSTRN ACTIVE NO NO NONE NOGCICSTRN ACTIVE NO NO NONE NOPCICSPSB INACTIVE NO NO NONE NOGLOBAL ACTIVE NO NO NONE NOGMBR INACTIVE NO NO NONE NODSNR INACTIVE NO NO ACEE NOFACILITY ACTIVE NO NO NONE NO

Page 36: auditing The Racf Environment - Ekc · Selected Data Sets ReportSelected Data Sets Report-----

Auditing 36Copyright 2000, 2006 EKC Inc.

www.ekcinc.com

Eberhard Klemens Co.Experts in Computer

Systems - Software - Security

Global Access Checking Table ReportGlobal Access Checking Table Report

CLASS ACCESS ENTRYNAME LEVEL NAME----------------------------------------------------------------------------------------DATASET ALTER &RACUID.*

READ ISPF.*UPDATE SYS1.BRODCAST

RVARSMBR -- NO ENTRIES --SECLABEL -- NO ENTRIES --DASDVOL -- NO ENTRIES --TAPEVOL -- NO ENTRIES --TERMINAL -- NO ENTRIES --APPL -- NO ENTRIES --TIMS -- NO ENTRIES --AIMS -- NO ENTRIES --TCICSTRN -- NO ENTRIES --PCICSPSB -- NO ENTRIES --

Page 37: auditing The Racf Environment - Ekc · Selected Data Sets ReportSelected Data Sets Report-----

Auditing 37Copyright 2000, 2006 EKC Inc.

www.ekcinc.com

Eberhard Klemens Co.Experts in Computer

Systems - Software - Security

Group Tree ReportGroup Tree Report

LEVEL GROUP (OWNER)---------------------------------------------------------

1 SYS1 (IBMUSER)|

2 | DATASETG (TOMC)| |

3 | | ABA| |

3 | | ARP| | |

4 | | | ARPLST|

2 | CICSADM| |

3 | | TRANA| |

3 | | TRANB|

2 | DATACTRL

Page 38: auditing The Racf Environment - Ekc · Selected Data Sets ReportSelected Data Sets Report-----

Auditing 38Copyright 2000, 2006 EKC Inc.

www.ekcinc.com

Eberhard Klemens Co.Experts in Computer

Systems - Software - Security

Selected Data Sets ReportSelected Data Sets Report

VOLUME SELECTIONDATA SET NAME SERIAL CRITERION-------------------------------------------------------------------------------------------PAY.MASTER.FILE USER23 USERDSNPAY.SALARY.FILE USER23 USERDSNISP.PPLIB.ISPLLIB M80LIB LNKLST - APFISP.V3R1M0.ISPLOAD M80LIB APFISP.V3R2M0.ISPLOAD M80LIB APF

LNKLST - APFJES2311.STEPLIB SMS036 APFJES2313.STEPLIB SMS036 APFJES2410.STEPLIB SMS036 APFJES2420.STEPLIB SMS036 APFSYS1.CMDLIB JS2RES APF

LNKLST - APFSYSTEM

SYS1.COBLIB M80LIB LNKLST - APFSYS1.LINKLIB MVSRES LNKLST - APF

SYSTEMSYS1.NCATLG M80PGE MASTER CATALOGSYS1.NUCLEUS MVSRES SYSTEMSYS1.PROCLIB M80PGE SYSTEMSYS1.RACF.BACKUP SMS124 RACF BACKUPSYS1.RACF.PRIMARY SMS073 RACF PRIMARYSYS1.UADS M80PGE SYSTEM

RACF RACFINDICATED PROTECTED UACC-------------------------------------------------------NO YES NONENO YES NONENO YES READN.F YES READNO YES READ

N.C YES READNO YES READNO YES READNO YES READNO YES READ

NO YES READN.F YES NONE

NO YES READNO YES NONENO YES NONENO YES NONENO YES NONENO YES NONE

Page 39: auditing The Racf Environment - Ekc · Selected Data Sets ReportSelected Data Sets Report-----

Auditing 39Copyright 2000, 2006 EKC Inc.

www.ekcinc.com

Eberhard Klemens Co.Experts in Computer

Systems - Software - Security

Reporting on the Unloaded DatabaseReporting on the Unloaded Database

Valid users

IRRDBU00Output Data

Reports

Selected groupsConnections

MVS Open Edition

SQL Queriesor ICETOOLs

Page 40: auditing The Racf Environment - Ekc · Selected Data Sets ReportSelected Data Sets Report-----

Auditing 40Copyright 2000, 2006 EKC Inc.

www.ekcinc.com

Eberhard Klemens Co.Experts in Computer

Systems - Software - Security

SMF Data Unload UtilitySMF Data Unload UtilityDB2 orOtherRDMS

IFASMFDP

ICETOOLor Utilities

InstallationWritten

Programs

Browse

SMF Data UnloadedSMF DataUSER2(IRRADU00)

USER3(IRRADU86)

Page 41: auditing The Racf Environment - Ekc · Selected Data Sets ReportSelected Data Sets Report-----

Auditing 41Copyright 2000, 2006 EKC Inc.

www.ekcinc.com

Eberhard Klemens Co.Experts in Computer

Systems - Software - Security

SMF Unload JCL ExampleSMF Unload JCL Example

//SMFUNLD JOB ,'SMF DATA UNLOAD',// MSGLEVEL=(1,1),TYPRUN=HOLD//SMFDUMP EXEC PGM=IFASMFDP//SYSPRINT DD SYSOUT=A//ADUPRINT DD SYSOUT=A//OUTDD DD DISP=SHR,DSN=USER01.RACF.IRRADU00//SMFDATA DD DISP=SHR,DSN=USER01.RACF.SMFDATA//SMFOUT DD DUMMY//SYSIN DD *

INDD(SMFDATA,OPTIONS(DUMP))OUTDD(SMFOUT,TYPE(000:255))ABEND(NORETRY)USER2(IRRADU00)USER3(IRRADU86)

/*

Page 42: auditing The Racf Environment - Ekc · Selected Data Sets ReportSelected Data Sets Report-----

Auditing 42Copyright 2000, 2006 EKC Inc.

www.ekcinc.com

Eberhard Klemens Co.Experts in Computer

Systems - Software - Security

SamplibSamplib Tools AvailableTools Available

IRRICE Collection– Uses DFSORT and ICETOOL to produce reports

based on Unloaded Database data and SMF data.

IRRADULD, ..QR, ..TB– Uses SQL to define (TB), Load (LD), and Query

(QR) auditing (unloaded SMF) data.

RACDBULD, ..QR, ..TB– Uses SQL to define (TB), Load (LD), and Query

(QR) security definition data.

Page 43: auditing The Racf Environment - Ekc · Selected Data Sets ReportSelected Data Sets Report-----

Auditing 43Copyright 2000, 2006 EKC Inc.

www.ekcinc.com

Eberhard Klemens Co.Experts in Computer

Systems - Software - Security

Sample IRRDBU00 ReportSample IRRDBU00 Report

- 1 - UAGR: GR Profiles with a UACC Other Than None 06/09/28

Class General Resource Profile Name Generic Owner UACC-------- ----------------------------- ------- -------- --------

DSNR DSN.WLM_REFRESH.DB8GENV1 NO 0 P390A READDSNR SYSPROC.WLM_REFRESH.DB8GRFSH NO 0 P390A READDSNR SYSPROC.WLM_REFRESH.WLMENV1 NO 0 IBMUSER READDSNR SYSPROC.WLM_REFRESH.WLMENV2 NO 0 IBMUSER READFIRECALL FIRECALL NO 0 SYS1 READFACILITY DITTO.* YES 0 IBMUSER READFACILITY MVSADMIN.WLM.POLICY NO 0 IBMUSER READ

Page 44: auditing The Racf Environment - Ekc · Selected Data Sets ReportSelected Data Sets Report-----

Auditing 44Copyright 2000, 2006 EKC Inc.

www.ekcinc.com

Eberhard Klemens Co.Experts in Computer

Systems - Software - Security

Sample IRRADU00 ReportSample IRRADU00 Report

- 1 - CADU: Number of IRRADU00 Events06/09/28 09:57:32 am

Type Count-------- ---------------ACCESS 1842ALTUSER 6CONNECT 3DACCESS 1DEFINE 4DIRSRCH 15JOBINIT 2951PERMIT 1RDEFINE 2REMOVE 3SETROPTS 1

Page 45: auditing The Racf Environment - Ekc · Selected Data Sets ReportSelected Data Sets Report-----

Auditing 45Copyright 2000, 2006 EKC Inc.

www.ekcinc.com

Eberhard Klemens Co.Experts in Computer

Systems - Software - Security

Conducting the AuditConducting the AuditWe’ve checked the RACF implementation

for appropriate security controls.

Identified security exposures.

Made our recommendations.

What’s this 18 hour “Special”?

Page 46: auditing The Racf Environment - Ekc · Selected Data Sets ReportSelected Data Sets Report-----

Copyright 2000, 2006 EKC Inc.

Eberhard Klemens Co.Experts in Computer

Systems - Software - Security

Part 2: Emergency Access

Page 47: auditing The Racf Environment - Ekc · Selected Data Sets ReportSelected Data Sets Report-----

Auditing 47Copyright 2000, 2006 EKC Inc.

www.ekcinc.com

Eberhard Klemens Co.Experts in Computer

Systems - Software - Security

What is Emergency Access?What is Emergency Access?Non-standard access

Storage fixes

General Error fixes

System upgrades

Testing the Recovery Plan

Page 48: auditing The Racf Environment - Ekc · Selected Data Sets ReportSelected Data Sets Report-----

Auditing 48Copyright 2000, 2006 EKC Inc.

www.ekcinc.com

Eberhard Klemens Co.Experts in Computer

Systems - Software - Security

Typical MethodsTypical MethodsMay I have the envelope please?

Temporary connect

Scheduled connect

Always on, just in case security

Secondary accounts

Page 49: auditing The Racf Environment - Ekc · Selected Data Sets ReportSelected Data Sets Report-----

Auditing 49Copyright 2000, 2006 EKC Inc.

www.ekcinc.com

Eberhard Klemens Co.Experts in Computer

Systems - Software - Security

The PreThe Pre--loaded Accountloaded AccountAll the access in the world

Keeping it relevant

Turning it off / Re-loading

Not tied to an individual

Accounting for use

Page 50: auditing The Racf Environment - Ekc · Selected Data Sets ReportSelected Data Sets Report-----

Auditing 50Copyright 2000, 2006 EKC Inc.

www.ekcinc.com

Eberhard Klemens Co.Experts in Computer

Systems - Software - Security

Temporary ConnectionTemporary ConnectionConnect at 5pm

Disconnect at 9am

Is it enough?

Less difficult to audit

Request/approval trace

Page 51: auditing The Racf Environment - Ekc · Selected Data Sets ReportSelected Data Sets Report-----

Auditing 51Copyright 2000, 2006 EKC Inc.

www.ekcinc.com

Eberhard Klemens Co.Experts in Computer

Systems - Software - Security

Temporary ConnectionTemporary ConnectionScheduled connect at 3am

Disconnect at 9am

Is it enough?

Less difficult to audit

Request/approval trace

Page 52: auditing The Racf Environment - Ekc · Selected Data Sets ReportSelected Data Sets Report-----

Auditing 52Copyright 2000, 2006 EKC Inc.

www.ekcinc.com

Eberhard Klemens Co.Experts in Computer

Systems - Software - Security

The Trusted ProfessionalThe Trusted ProfessionalExtra access for the normal fixer

Enough access for typical emergencies

May not be enough

Difficult to audit

What paper trail?

Page 53: auditing The Racf Environment - Ekc · Selected Data Sets ReportSelected Data Sets Report-----

Auditing 53Copyright 2000, 2006 EKC Inc.

www.ekcinc.com

Eberhard Klemens Co.Experts in Computer

Systems - Software - Security

Dual AccountsDual AccountsSecondary account for the normal fixer

Enough access for typical emergencies

May not be enough

Less difficult to audit

After the fact request/approval

Page 54: auditing The Racf Environment - Ekc · Selected Data Sets ReportSelected Data Sets Report-----

Auditing 54Copyright 2000, 2006 EKC Inc.

www.ekcinc.com

Eberhard Klemens Co.Experts in Computer

Systems - Software - Security

The Business Recovery PlanThe Business Recovery PlanMost companies use “test” data, right?

DRP accounts do everything

Minimum alteration risk

Maximum disclosure risk

Auditing the Recovery Test

Page 55: auditing The Racf Environment - Ekc · Selected Data Sets ReportSelected Data Sets Report-----

Auditing 55Copyright 2000, 2006 EKC Inc.

www.ekcinc.com

Eberhard Klemens Co.Experts in Computer

Systems - Software - Security

The BRP RealityThe BRP Reality

> -----Original Message-----> From: RACF Discussion List On Behalf Of XXXX XXXXXXXX>> We want to give users testing programs in a D/R LPAR the> authority to run production jobs. The production jobs run> under the USERID of SYSMANT. What's the RACF command to allow> this to happen.

PERMIT SYSMANT.SUBMIT CLASS(SURROGAT) ACCESS(READ) ID(userID) .

Page 56: auditing The Racf Environment - Ekc · Selected Data Sets ReportSelected Data Sets Report-----

Auditing 56Copyright 2000, 2006 EKC Inc.

www.ekcinc.com

Eberhard Klemens Co.Experts in Computer

Systems - Software - Security

Emergency Access RecommendationsEmergency Access Recommendations

Keep a good trail of request & authorization.For periodical needs, use 2 accounts, log

access used by second account. (UAUDIT)

Rip up the envelope, get rid of the pre-loadedaccount.

Collect and examine SMF data from DRPRestrict or remove software capable of

editing raw SMF data.

Page 57: auditing The Racf Environment - Ekc · Selected Data Sets ReportSelected Data Sets Report-----

Copyright 2000, 2006 EKC Inc.

Eberhard Klemens Co.Experts in Computer

Systems - Software - Security

Audit Reporting & Emergency Access