S 4.209 Secure basic configuration of z/OS systems

Initiation responsibility: Head of IT, IT Security Officer

Implementation responsibility: Administrator

The z/OS operating system administers and uses different authorisation mechanisms. If these mechanisms are used improperly or misused, this may affect the integrity of the entire system. The mechanisms must therefore be taken into consideration in the basic configuration. These are mainly the following functions:

Recommendations for the security system RACF (Resource Access Control Facility) are described in S 4.211 Use of the z/OS security system RACF. Furthermore, S 4.220 Protection of Unix System Services on z/OS systems must be taken into consideration for the basic configuration.

The following recommendations must be taken into consideration in order to protect the z/OS operating system's integrity:

APF authorisations

APF-authorised files are required in order to gain access to privileged operations (e.g. MODESET SVC). As a consequence, functions can be used which the user normally does not have any authorisation for. In this way, it is possible at any time to gain access to privileged main memory areas and to assign highly privileged attributes (e.g. SPECIAL in the ACEE - Accessor Environment Element) to one's own ID in supervisor mode. The following must be taken into account for APF files:

User SVCs (SuperVisor Calls)

User SVCs (all SVC numbers over 200) are provided with the control in the SuperVisor status by Key 0 (this corresponds to the kernel mode for some other operating systems), i.e. user SVCs may access all memory areas and all operations of the z/OS operating system. Therefore, the following must be taken into account for user SVCs:

Resources

Resources of the z/OS operating system (e.g. files, programs, functions, etc.) must be protected by means of RACF (see S 4.211 Use of the z/OS security system RACF). Furthermore, the following recommendations should be taken into consideration:

IPL parameter file

The IPL parameter file (Initial Program Load) contains the essential information required for initialising the z/OS operating system. This file must be protected with the help of RACF and the number of employees authorised for this file must be kept low. However, it must be ensured that substitution arrangements are implemented.

Parmlib definitions

The parameter files of the z/OS operating system (SYSn.PARMLIBs, there may be several) contain essential definitions of the operating system. All Parmlib files must be protected with the help of RACF. Access must only be granted to those employees who edit these files within the framework of their work. It must be considered whether different parameter files with different RACF protection should be used, since the Parmlib contains definitions with different protection requirements. Security-critical members of the Parmlib include, for example (without sorting):

Access to these definitions must be restricted to the required employees. Substitution arrangements must be in force.

System procedures

All important procedures of the Started Tasks can be found in specific libraries announced to the system either using the MSTJCLxx definitions or the JES2/3 definitions. The files, e.g. SYS1.PROCLIB, must be protected with the help of RACF profiles which only grant authorised employees access to the definitions.

The protection of generic login procedures, i.e. login procedures used by all employees, is particularly important, since the risk of misuse is particularly high here (see safeguard S 4.213 Protecting the login process under z/OS). The write/edit access should be restricted to the system administrators; furthermore, only JES2/3 requires read access.

These safeguards are also applicable to all script files used in generic login procedures (TSO CLISTs, or REXX EXECs), since the risk of misuse is particularly high here as well.

JESx definitions (Job Entry Subsystem)

In order to protect the Job Entry subsystems JES2 and JES3, the following resources must mainly be protected by RACF:

The following RACF functions should be used in order to increase the security of JES2/3:

Furthermore, RACF provides a host of General Resource Classes for JES2/3 that should be used for protecting JES functions:

Review questions: