S 5.114 Protection of the z/OS trace functions

Initiation responsibility: Head of IT, IT Security Officer

Implementation responsibility: Administrator

Under z/OS, trace functions can be used to analyse errors that occur during connection setup. They can be used both in VTAM (Virtual Telecommunication Access Method) and in TCP/IP. The Generalized Trace Facility (GTF) is used to capture and analyse the trace data. On top of this, the Network Logical Data Manager (NLDM, a NetView component) and Advanced Communication Facility Trace Analysis Program (ACFTAP) are also available for analysing VTAM data.

Trace functions not only point to errors, but also allow the transmitted data itself to be presented. Hence the information set out below should be noted:

Protection of trace functions and GTF

If any session data is transmitted unencrypted, it will be possible to read the passwords in plaintext in the trace. Access to the commands that can initiate traces must therefore be granted only to employees who need GTF in connection with their work. To minimise the risk of breaches of confidentiality, the number of such employees should be kept to a minimum.

Protection of GTF files

The GTF analyses are saved to files. These files must be protected so that only the responsible employees have access to them (especially Universal Access=NONE). The same applies to copies of these files.

NLDM traces

The trace function of NLDM should normally be disabled and only be activated in case of need. It should only be available to the employees responsible.

Protection of ACFTAP

The ACFTAP program should be protected so that only the employees responsible have access to it.

Session data

To protect the passwords from being read by unauthorised persons during transmission, transmitting the session data encrypted should be considered. It is recommended to do this for the connections used by the RACF (Resource Access Control Facility) administrators at a minimum.

Review questions: