Elardus,
Please let me add some information in response to your posting:
There is a difference between a Virus and a System Integrity
Exposure.The System Integrity Exposure is the Root Cause that a Virus
exploits.There may be many Viruses, especially in Windows Systems, which
exploit the same Root Cause.The PC Virus checkers look for the
signatures of Virus code either executing or in directories and then
take action to remove them.The Virus Checkers cannot fix the Root Cause
-- in the case of Windows, only Microsoft can do that.But, it would be
better if Microsoft would fix the Root Cause because then the Virus
programs would become ineffective.
IBM's Statement of Integrity clearly states that if a System Integrity
Vulnerability (the Root Cause) is reported to IBM, they will fix
it.Microsoft does not make this commitment and this is why the z/OS
Operating System is a much more "securable" system than Windows.
However, z/OS is not immune to these threats because it too has system
integrity vulnerabilities.In your posting, you state that there are many
alternatives to our Vulnerability Analysis Product for the "ethical
hacking/penetrating/scanning for defects and exposures."In fact, IBM
purports to provide this capability from their Tivoli zSecure unit.On
their zSecure Audit Website, they state: "Security zSecure Audit
includes a powerful system integrity analysis feature. Reports identify
exposures and potential threats based on intelligent analysis built into
the system."That's a pretty powerful and absolute statement.
But, since Tivoli is part of IBM you can be assured that their Quality
Assurance Unit regularly tests their software against revisions to the
IBM z/OS Operating System and, if any integrity exposures were found,
they would have reported the vulnerabilities to IBM z/OS Development and
Development would have fixed them.That would just be the normal course
of business within IBM.
But, then, how can you reconcile the fact that our VAT product has
located SIXTY SEVEN (67) new system integrity vulnerabilities in z/OS
within the last two years.And, our clients have reported them to IBM,
IBM has accepted them as errors, issued APARS for all of them and issued
PTFs for almost all of them.So, obviously, the IBM Tivoli zSecure Audit
package is not catching these errors.And, if IBM, is not catching these
in their own code, what about the ones introduced by the rest of the
Independent Software Vendor products and locally developed or otherwise
obtained code on your system?There is a big vulnerability here that
cannot be ignored.
An exploit of a z/OS (or ISV) system integrity vulnerability would allow
the illegitimate user to obtain control in an authorized state and use
this state to change his security credentials to obtain access and be
able to modify any RACF protected resource on the system with no SMF
journaling of the access.We have found these integrity exposures in code
that is in operation on every z/OS system in existence.That is something
to be concerned about and to act on.
I have no idea of the comparison between the cost of our Vulnerability
Analysis Tool versus the competition.We would be happy to discuss that
with you -- we believe it is inexpensive compared to the benefits which
include not only a reduction of risk and exposure to data loss and
modification which would result in exposure of company secrets, private
information and financial loss, but a reduction of system outages.But,
VAT works and locates the errors that other software/services do not.I
can totally assure you that a manual process just will not work in our
lifetimes.So, an automated process is necessary.And VAT provides that
automation.
And I agree with you that many z/OS Auditors need to be educated on this.
Ray Overby
Key Resources, Inc.
Ensuring System Integrity for z/Series^(TM)
www.vatsecurity.com
(312)574-0007
On 1/29/2011 09:12 AM, Elardus Engelbrecht wrote:
Cris Hernandez #9 wrote:
I too have auditors who treat the my mainframe like one those little puters
and I find it best to first educate them before they convince my management
to send me chasing phantoms. Don't assume your auditor won't appreciate a
mainframe education.
Jim Marshall wrote:
Auditors came around and wrote up our z/OS V1R10 Sysplex for not running a
Virus Checker. Anyone has a constructive solution as to one being available or
some verbage which defends the position.
After reading all those good answers, please allow me a reply:
I told my auditors this:
1. There are NO vendors for z/OS antivirus software. Give me one example and
I'm ready to talk with my management. Otherwise we talk about RACF, APF,
etc. as discussed already in this thread.
2. There are Linux and Unix antivirus software, but z/OS itself are immune
against the threats.
3. Some disgruntled employee(s) may place a TROJAN, not a virus. It
happened unfortunately. That is another matter for another rainy day.
4. Depending on RACF accesses, one can write something in any language to
delete or modify datasets. Anyone. It is up to you to protect your z/OS. Read
again that thread in ibmmainframes.com mentioned in this thread for some info.
5. About VAT Security and similar software/service - It looked to me that this
is *ethical* hacking/penetrating/scanning for defects and exposures. That is
the standard (?), but expensive way, for checking out your z/OS. There are
many such software and services available from various vendors.
I'm very sure those auditors are in for a serious *re-education* ;-D
Groete / Greetings
Elardus Engelbrecht
----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html
----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html