S 3.107 S/390 and zSeries mainframes

Logo S/390- und zSeries-Mainframe

Description

The IBM S/390 and zSeries systems belong to the server systems generally referred to as mainframes. Mainframes developed from classic stand-alone systems with batch processing to state-of-the-art client/server systems. Today, they form the top end of the range of offered server systems.

This module only considers type IBM zSeries and/or IBM S/390 mainframes. zSeries systems with the z/OS operating system constitute a logical further development of the OS/390 architecture. With the zSeries, the additional 64-bit support is added, for example. Both system types coexist, whereby the OS/390 may be deemed a "discontinued" operating system, since IBM discontinued its service in autumn 2004. For reasons of clarity, only the term "zSeries" is used for the hardware and "z/OS" for the operating system in this context.

History

The S/360 architecture introduced in 1964 constitutes the basis for all following further developments and can still be found today in essential parts on current zSeries systems. The changing names from "S/360", through "S/370" and "S/390", up to today's "zSeries" reflect the continuous development of the underlying architecture. Due to its backwards compatibility, the architecture also supports programs in the older 24- or 31-bit mode, along with newer 64-bit applications.

Despite increasing performance capability, the physical dimensions of mainframe systems have been reduced significantly. Today, mainframe systems have similar dimensions to other systems typically operated in computer centres.

Overview

For zSeries systems, there are mechanisms that can be used to achieve high availability and scalability. High availability is achieved by the redundant design of the components. In order to increase performance and availability, currently up to 16 processors can be operated in a zSeries system in parallel and up to 32 zSeries systems can be compiled to form a cluster. This is referred to as parallel Sysplex cluster.

Different operating systems are available for the zSeries hardware (e.g. z/OS, VSE, z/VM, or TPF). These are normally selected based on the parameters computer size and purpose. However, the z/OS operating system is used most frequently. In order to not go beyond the scope of this module, the recommendations in this module are mainly limited to the z/OS operating system.

Based on the enhancement of the z/OS operating system formerly also known as "MVS" by the subsystem Unix System Services, it is possible to also operate Unix-based applications in parallel to the classic mainframe applications. Additionally, a Linux operating system is also available for the zSeries hardware.

Fields of application for state-of-the-art z/OS systems include:

The software components described in this module mainly refer to products of the manufacturer IBM. Moreover, there are many products from third party manufacturers frequently used in mainframe environments. These products may be addressed in exceptional cases only, since otherwise that would go beyond the scope of the module.

The z/OS operating system consists of the actual operating system (kernel), including the interfaces to the user processes. Different subsystems control and support communications. The most important subsystems include

Further subsystems include, for example

The security interface System Authorization Facility (SAF) enables protection of the system and the files against unauthorised accesses. The actual security functions are provided by the RACF security software. Top Secret and ACF2 must also be mentioned at this point as alternatives.

The following figure shows the connections of the operating system design in a simplified manner:

Basic design of the z/OS operating system
Figure: Basic design of the z/OS operating system

On overview of the zSeries and z/OS architectures and explanations regarding the terminology can be found in the following safeguards:

Threat scenario

In general, the threat scenario depends on the operational scenario. For example, a z/OS system with SNA connection to an isolated network in a government agency or company is normally less endangered than a z/OS system connected to the internet and offering web services. Furthermore, it is important whether data access must be read-only (e.g. for an information system) or whether the data can be edited. Specifically by using web servers or web applications connected to the internet, the threat scenario of the mainframe systems formerly deemed "very secure" significantly increased.

The public network connection of mainframe systems results in significantly higher threats as a result of improper or incorrect configuration of the system or based on missing processes or processes established incompletely when compared to the past.

This is applicable both to external connections and attacks in this context and to the internal area. Today, mainframe systems are exposed to similar threats when compared to Unix or Windows systems.

Organisational Shortcomings

T 2.4 Insufficient monitoring of security safeguards
T 2.27 Lack of or insufficient documentation
T 2.54 Loss of confidentiality through hidden pieces of data
T 2.99 Inadequate or incorrect configuration of the zSeries system environment

Human Error

T 3.2 Negligent destruction of equipment or data
T 3.3 Non-compliance with IT security measures
T 3.9 Improper IT system administration
T 3.38 Errors in configuration and operation
T 3.66 Incorrect character conversion on the use of z/OS
T 3.67 Inadequate or incorrect configuration of the z/OS operating system
T 3.68 Inadequate or incorrect configuration of the z/OS web server
T 3.69 Incorrect configuration of Unix System Services in z/OS
T 3.70 Insufficient z/OS system file protection
T 3.71 Incorrect system time on z/OS systems
T 3.72 Incorrect configuration of the z/OS security system, RACF
T 3.73 Incorrect use of the z/OS system functions
T 3.74 Inadequate protection of the z/OS system settings against dynamic changes
T 3.75 Inadequate control of the batch jobs in z/OS

Technical Failure

T 4.10 Complexity of access possibilities to networked IT systems
T 4.22 Software vulnerabilities or errors
T 4.50 z/OS operating system overload

Deliberate Acts

T 5.2 Manipulation of information or software
T 5.10 Abuse of remote maintenance ports
T 5.18 Systematic trying-out of passwords
T 5.19 Abuse of user rights
T 5.21 Trojan horses
T 5.28 Denial of services
T 5.57 Network analysis tools
T 5.116 Tampering with the z/OS system configuration
T 5.117 Covering up tampering in z/OS
T 5.118 Obtaining high level rights in the RACF by unauthorised means
T 5.119 Use of other IDs in z/OS systems
T 5.120 Tampering with the Linux/zSeries system configuration
T 5.121 Attacks on z/OS systems using TCP/IP
T 5.122 Misuse of RACF attributes in z/OS

Method recommendation

To secure the information system examined, other modules must be implemented in addition to this module, with these modules being selected based on the results of the IT-Grundschutz modelling process.

A series of safeguards must be implemented to successfully design and implement a z/OS mainframe system, starting with the strategic decision and continuing through the design phase, the installation phase, and up to the operation phase. In addition, it must be noted that a system needs to be disposed of properly once it has reached the end of its operation phase.

Parallel to the operation phase, the contingency planning phase must ensure that operation of the system is also maintained in an emergency. The IT Security Management and Audit departments must make sure that these rules are also followed.

The steps to take to accomplish this as well as the safeguards to implement in each phase are listed in the following.

Strategy

Before starting any planning operations, the strategic orientation phase takes place based largely on the requirements of the application owners. Here, it must be checked whether the z/OS platform is suitable regarding the solution of the respective task.

Furthermore, the general orientation of the computer centre's IT landscape is important. If there is no z/OS platform operating yet, the build-up of the required know-how with the operating personnel must be prepared accordingly. The following safeguards provide support during strategic planning:

They provide an overview of the individual hardware and software functions and thereby support the understanding of the z/OS platform.

Conception

If the strategic decision was made in favour of using a z/OS mainframe system, the aforementioned phase must be followed by a detailed planning phase regarding the use of this system. In this, the following safeguards must be taken into consideration:

Implementation

Once the preparatory organisational and planning tasks have been completed, the zSeries hardware and the z/OS operating system can be installed. The following safeguards must be taken into account during installation and commissioning:

Operation

After the initial installation and a test operation phase, regular operations can be initiated. The following security aspects must be taken into account in this phase:

Disposal

Recommendations for uninstalling z/OS systems, for example when regular operation is terminated, can be found in safeguard S 2.297 Deinstallation of z/OS systems.

Contingency Planning

Recommendations for contingency planning can be found in safeguard S 6.93 Contingency planning for z/OS systems.

Security Management and Auditing

The Security Management Department should support the entire lifecycle of a z/OS system. In doing so, the following items should be taken into account specifically:

In the following, the bundle of security measures for the "S/390 and zSeries mainframe" module are presented.

Planning and design

S 2.285 (Z) Determining standards for z/OS system definitions
S 2.286 (Z) Planning and use of zSeries systems
S 2.287 (Z) Batch job planning for z/OS systems
S 2.288 (B) Drawing up a security policy for z/OS systems
S 2.295 (A) System administration of z/OS systems
S 2.296 (Z) Basic factors to consider with z/OS-transaction monitors
S 3.39 (W) Introduction to the zSeries platform
S 3.40 (W) Introduction to the z/OS operating system
S 3.41 (W) Introduction to Linux and z/VM for zSeries systems
S 4.221 (C) Parallel Sysplex under z/OS

Implementation

S 2.289 (A) Use of restrictive z/OS IDs
S 2.290 (Z) Use of RACF exits
S 3.42 (A) Training z/OS operators
S 4.207 (A) Use and protection of system-related z/OS terminals
S 4.208 (B) Protecting the start process of z/OS systems
S 4.209 (A) Secure basic configuration of z/OS systems
S 4.211 (A) Use of the z/OS security system RACF
S 4.212 (Z) Protection of Linux for zSeries
S 4.213 (A) Protecting the login process under z/OS
S 4.216 (C) Stipulation of the system limits of z/OS
S 4.217 (C) Workload management for z/OS systems
S 4.219 (C) Licence key management for z/OS software
S 4.220 (B) Protection of Unix System Services on z/OS systems
S 5.113 (Z) Use of the VTAM Session Management Exit under z/OS
S 5.114 (B) Protection of the z/OS trace functions

Operation

S 2.291 (C) Security reporting and security audits under z/OS
S 2.292 (B) Monitoring of z/OS systems
S 2.293 (C) Maintenance of zSeries systems
S 2.294 (Z) Synchronisation of z/OS passwords and RACF commands
S 4.210 (B) Secure operation of the z/OS operating system
S 4.214 (B) Administration of data media under z/OS systems
S 4.215 (B) Protection of z/OS utilities that are critical to security
S 4.218 (Z) Information on character set conversion in z/OS systems

Disposal

S 2.297 (B) Deinstallation of z/OS systems

Contingency Planning

S 6.93 (A) Contingency planning for z/OS systems