Hehe "Reasonable" must be in the eye of the beholder. 

Witness that we see a lot of mainframes 'protected' by using Windows servers as 
a 'buffer' or 'shield'. FTP servers are one example, network encryption 
appliances are another, and TN3270 servers yet another. 

And yet 99.99% of successful site penetrations used a Windows server as the 
attack vector. (None of the reported successful penetrations were via z/os.)  
What's wrong with this picture?

HAL - a not so little speaking and thinking (?) computer person that saw the 
famous movie in the theater. :-D

   

-----Original Message-----
From: IBM Mainframe Discussion List [mailto:[email protected]] On Behalf Of 
Timothy Sipples
Sent: Wednesday, July 07, 2010 12:13 AM
To: [email protected]
Subject: Re: Backup/Restore products at z/OS sites

Paul Gilmartin wrote:
>Firewall security rules. Their z system is not permitted to connect
>to ftp.cbttape.org.

Elardus Engelbrecht replied:
>Ok. Thanks. It seemed reasonable to me.

Are those rules "reasonable"? I don't assume that, having observed the
common consequences of such rules in the real world. In many instances such
rules dramatically *reduce* overall enterprise security as business people
(naturally!) bypass the rules to get their (expletive deleted) jobs done.
Such rules might be a good way to end up with stolen laptops containing
your customers' credit card numbers, passport numbers, dates of birth, and
social insurance numbers, for example. Or to open up new and interesting
hacker attack vectors that become available through the workarounds.

It is also theoretically possible to heave your mainframe into the Mariana
Trench, too, allegedly in the name of "security." And to disconnect all
your telephones. It doesn't mean that's "reasonable."

- - - - -
Timothy Sipples
Resident Enterprise Architect
STG Value Creation & Complex Deals Team
IBM Growth Markets (Based in Singapore)
E-Mail: [email protected]
 
NOTICE: This electronic mail message and any files transmitted with it are 
intended
exclusively for the individual or entity to which it is addressed. The message, 
together with any attachment, may contain confidential and/or privileged 
information.
Any unauthorized review, use, printing, saving, copying, disclosure or 
distribution 
is strictly prohibited. If you have received this message in error, please 
immediately advise the sender by reply email and delete all copies.

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to