Note that measures you instate to protect against a cotntingency you expect 
might also protect against contingencies you didn't anticipate; ransomware is 
not the only threat. ObChicago Backup early and often. Test your backups. Have 
remote backups far enough away that they are not affected by the same disaster. 
Most shops know the drill, but fewer follow it.


--
Shmuel (Seymour J.) Metz
http://mason.gmu.edu/~smetz3


________________________________________
From: IBM Mainframe Discussion List <[email protected]> on behalf of 
Timothy Sipples <[email protected]>
Sent: Tuesday, September 8, 2020 12:57 AM
To: [email protected]
Subject: Re: Ransoming a mainframe disk farm

Kekronbekron wrote:
>Thinking about it ... it would be far simpler (than anti-ransomware
>capability in storage, or lock-all behaviour) if there were a RACF
>HealthChecker that looks for abnormal enc/dec activity. What 'normal'
>is can be learnt from a year's worth of actual enc/dec-related SMF
>data.

There are tools with capabilities like the ones you're describing.

I have a couple comments:

1. There are some excellent ransomware (and similar non-ransomware
disaster scenario) defenses available based on "out of band" controls and
lockouts. IBM DS8000 SafeGuarded Copy is one such example, a really
important one that's the foundation for some other valuable resiliency
capabilities. However, I have worked with some organizations that still
(also) want to maintain total physical and electronic (wired, wireless)
separation for certain data. You can achieve total separation in a few
ways, such as physical tape cartridges (usually WORM, preferably
encrypted) ejected from tape libraries and vaulted "afar." Of course the
costs include elongated Recovery Point Objectives (RPOs) and Recovery Time
Objectives (RTOs), but in some cases the costs are tolerable or at least
tolerated.

You cannot really keep data completely, absolutely separate if you care
about retrieving it. You can only maintain separation with at least one
adjective added, such as "physically and electronically separate storage
media," which is not the same as "storage media separated from all
possible human contact." The Voyager space probes, I think it's fair to
say, will "never" be vulnerable to human contact. They contain tape drives
and tape media, and they are currently electronically connected via NASA's
Deep Space Network.

Anyway, it depends on what you're trying to accomplish, but lots of
options are available, not necessarily mutually exclusive.

2. If you need secure software build and deployment processes (yes, you
do), I suggest contacting my employer. IBM has some super exciting new
capabilities in this area, very cutting edge. They're grounded in
mainframe technologies, whether in your data center, in the public cloud,
or both. Mainframes often pioneer new capabilities that didn't exist in
the entire industry. Here, too, that's what's happening.

Ransomware is one clearcut demonstration that it doesn't particularly
matter how terrific your data-focused defenses are if you have compromised
applications, for it's applications -- program code -- that process(es)
data. So you've got to approach security challenges holistically.

- - - - - - - - - -
Timothy Sipples
I.T. Architect Executive
Digital Asset & Other Industry Solutions
IBM Z & LinuxONE
- - - - - - - - - -
E-Mail: [email protected]

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to