Hi Jantje We're running a zOS DMZ with a WAS for about 3 years now. It is in a dedicated LPAR whithin one of our CECs. Since the application running in the DMZ is read-only, the setup and the protection of the production environment was quite simple. No worries about saving the data or transporting updates into production. We dedicated a string of DASD and an OSA-Adapter to the LPAR. All the other LPARs were protected against the DMZ by removing the DMZ-Lpar from the "Device Candidate list" of all other shared resources. There is no TCPIP-connection between the DMZ and the other LPARs. The data that we put into the DMZ is copied through a "transport DASD" from our production into the DMZ (by varying a DMZ-NONSMS-Dasd online in our production system). So, the worst thing that can happen is that the DMZ itself gets destroyed and/or hacked. Since this application is not a critical one, we can take that risk. TSO/ISPF access is through OSA/ICC-connections only. We installed a couple of freeware tools (AUTO, MXI, etc.) on the DMZ to be able to do a minimum of automation and save the log and smfdata of the lpar (also by using the "transport-dasd"). This nearly physical separation of the dmz let us sleep quite happily. *But* the downside of this setup is facing us now: we will have to move away from the "read-only-dogma" into a full function dmz that allows updates even in the production systems. Currently, we are discussing several scenarios how to get there. They start somewhere with a http-server on Linux between a bunch of firewalls accessing data on a production system and end whithin a fully fashioned zOS-DMZPLEX with its own DASD, taperobots etc. The key problem we are faced with is the companys security policy that no event from "outside" may generate an immediate action in a production system.
Hth Cheers Tom Thomas Ramseier Bundesamt für Informatik und Telekommunikation BIT Betriebszentrum / Bereitstellung / Host Informationssystem-Architekt Monbijoustrasse 74 CH-3003 Bern Tel. +41 (0)31 323 01 00 Fax +41 (0)31 325 90 30 [EMAIL PROTECTED] www.bit.admin.ch Der Eisbrecher: Die Kundenzeitung des BIT www.bit.admin.ch/eisbrecher -----Ursprüngliche Nachricht----- Von: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] Im Auftrag von Jan MOEYERSONS Gesendet: Mittwoch, 10. August 2005 15:04 An: [email protected] Betreff: Mainframe in the DMZ -- organization of operations Dear Listers, We are considering what the security impact of putting a WAS on mainframe in the DMZ would be. I was wondering: did any of you already do that? What impact does this have on the operational organization? Do you have special procedures for application and system maintenance? Do you have a separate CEC or is a separate LPAR safe enough? What about updates to the system configuration? IODF? Sharing OSA adapters? Sharing DASD? Any suggestions are welcome. Cheers, Jantje. ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html

