I too have auditors who treat the my mainframe like one those little puters and 
I find it best to first educate them before they convince my management to send 
me chasing phantoms.  Don't assume your auditor won't appreciate a mainframe 
education.

The first place to hide a virus is in the OS, y/n?  What protects the mainframe 
OS?  Answer, APF.  I monitor the APF libraries for any alterations on a daily 
basis.  Any changes that didn't go thru change control are cause for 
investigation.  Most auditors don't know squat about APF, and if they did, they 
would be asking about it instead of a mainframe virus scanner.  

The 2nd place to hide virus is in software, which on the mainframe are the 
command libraries.  Aside from the potential for corrupt vendor software 
(unlikely a vendor will install compromised loadlib, but we're talking auditors 
here), most those command libraries (vendor & in-house) are written in 
interpretive languages and can be scanned using standard PDS utilities for 
whatever string (like delete commands) your shop believes poses the greatest 
threat.  Loadlibs can be scanned using standard utilities as well.  One method 
is to unload the PDS to a GDG daily, and compare the current to the previous 
day's file for any changes.  Start with the linklist and the logon proc 
sysproc/sysexec allocations, after that the catalog can be scanned for 
application and personal clist/rexx libraries.  Looking for changes to the 
baseline may not qualify as a virus scanner, but it's a whole lot better than 
doing nothing or spending a fortune on unnecessary software.   

The 3rd place I look for mainframe malware is in the parmlibs, JCL, macros, 
utilities and such.  DASD utilities can erase the entire storage pool if 
corrupted.  Who can update these libraries?  Are they subject to stringent 
change control  procedures?  Are their contents monitored for changes and 
content?  Does your auditor know what DASD is?  HSM?  DFDSS? 

Address these items and I can almost guarantee that you'll pass your audits 
like I do.   

Disclaimer:  apart from monitoring APF, none the above is industry standard, 
not yet anyway...  


-hernandez



> 
> 
> On Fri, 28 Jan 2011 12:27:54 -0600, Jim Marshall <jim.marsh...@opm.gov>
> wrote:
> 
> >Auditors came around and wrote up our z/OS V1R10
> Sysplex for not running a
> >Virus Checker.  Anyone has a constructive solution
> as to one being available or
> >some verbage which defends the position.
> >
> >Been hunting around for a Virus Checker for
> zLinux.  Also interested in what
> >kind of over head it might use.
> >
> >thanks  jim
> 
> ----------------------------------------------------------------------
> For IBM-MAIN subscribe / signoff / archive access
> instructions,
> send email to lists...@bama.ua.edu
> with the message: GET IBM-MAIN INFO
> Search the archives at http://bama.ua.edu/archives/ibm-main.html
> 


      

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to