W dniu 07.09.2020 o 14:57, kekronbekron pisze:
Makes me wonder.. some network products have a 'total lockdown' mode that stops 
*anything* network. Like pulling the plug.

IBM can have a similar thing for z/OS TCPIP/SNA networks but I reckon it's more 
effective if a similar lockdown (ugh) feature exists for RACF instead.
Of course, this will mean a whole lot of things will now start failing (perhaps 
this feature can also write such lockdown-initiated violations into a special 
report), but it may be worth shuttering things down before things can get worse.

Alternatively, storage boxes need to get intelligent with their metadata.


- KB

I see no relationship to the ransomware problem, however in z/OS you can "totally lockdown" any network interface you want. Including offline the device and chpid. And this is IMHO good for Hollywood movies, not as real protection - this "plug out feature" would work ...when? After the hacker started encryption, or just two minutes before? Who/what recognize suspected activity? What if the activity was phony, just to run "plug out feaure"?

My advice:
1. Only authorized users should have connectivity to the mainframe ...and any other resource. No more "any to any" company networks. Note: "authorized" in this point has nothing to do with a mainframe. Just Johny the Sysprog can connect to the host, but Jim the secretary cannot.
2. Only authorized users can logon. User, password, maybe MFA. Obvious.
3. Users are authorized to the resources they need, nothing more. Of course we do not talk about READ to SYS1.HELP, but it is good idea to not allow APF update to any TSO user. This is typical RACF responsibility. Loooong story.


--
Radoslaw Skorupka
Lodz, Poland





======================================================================

Jeśli nie jesteś adresatem tej wiadomości:

- powiadom nas o tym w mailu zwrotnym (dziękujemy!),
- usuń trwale tę wiadomość (i wszystkie kopie, które wydrukowałeś lub zapisałeś 
na dysku).
Wiadomość ta może zawierać chronione prawem informacje, które może wykorzystać 
tylko adresat.Przypominamy, że każdy, kto rozpowszechnia (kopiuje, rozprowadza) 
tę wiadomość lub podejmuje podobne działania, narusza prawo i może podlegać 
karze.

mBank S.A. z siedzibą w Warszawie, ul. Senatorska 18, 00-950 
Warszawa,www.mBank.pl, e-mail: [email protected]. Sąd Rejonowy dla m. st. 
Warszawy XII Wydział Gospodarczy Krajowego Rejestru Sądowego, KRS 0000025237, 
NIP: 526-021-50-88. Kapitał zakładowy (opłacony w całości) według stanu na 
01.01.2020 r. wynosi 169.401.468 złotych.

If you are not the addressee of this message:

- let us know by replying to this e-mail (thank you!),
- delete this message permanently (including all the copies which you have 
printed out or saved).
This message may contain legally protected information, which may be used 
exclusively by the addressee.Please be reminded that anyone who disseminates 
(copies, distributes) this message or takes any similar action, violates the 
law and may be penalised.

mBank S.A. with its registered office in Warsaw, ul. Senatorska 18, 00-950 
Warszawa,www.mBank.pl, e-mail: [email protected]. District Court for the Capital 
City of Warsaw, 12th Commercial Division of the National Court Register, KRS 
0000025237, NIP: 526-021-50-88. Fully paid-up share capital amounting to PLN 
169.401.468 as at 1 January 2020.

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to