Top Banner
Click to add text Introduction to the new mainframe: Large-Scale Commercial Computing © Copyright IBM Corp., 2006. All rights reserved. Chapter 4: Integrity and security
26

Click to add text Introduction to the new mainframe: Large-Scale Commercial Computing © Copyright IBM Corp., 2006. All rights reserved. Chapter 4: Integrity.

Dec 30, 2015

Download

Documents

Victor Sherman
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Click to add text Introduction to the new mainframe: Large-Scale Commercial Computing © Copyright IBM Corp., 2006. All rights reserved. Chapter 4: Integrity.

Click to add text

Introduction to the new mainframe:Large-Scale Commercial Computing

© Copyright IBM Corp., 2006. All rights reserved.

Chapter 4: Integrity and security

Page 2: Click to add text Introduction to the new mainframe: Large-Scale Commercial Computing © Copyright IBM Corp., 2006. All rights reserved. Chapter 4: Integrity.

Introduction to the new mainframe

© Copyright IBM Corp., 2006. All rights reserved. 2

Objectives

The ability to:• Describe the security and integrity needs of a

large-scale operating environment• Describe the methods for serialization in a

multi-user environment• Describe the built-in features that enable

integrity and security• Describe the two-phase commit process and

why it is needed• Describe the features needed from an add-on

security package

Page 3: Click to add text Introduction to the new mainframe: Large-Scale Commercial Computing © Copyright IBM Corp., 2006. All rights reserved. Chapter 4: Integrity.

Introduction to the new mainframe

© Copyright IBM Corp., 2006. All rights reserved. 3

Integrity

Data Integrity – Primarily concerned with the accidental damage and recovery of data.

System Integrity – Ensures there is no way for any unauthorized program to: Bypass store or fetch protection Bypass security checking Obtain control in an authorized (privileged) state

Page 4: Click to add text Introduction to the new mainframe: Large-Scale Commercial Computing © Copyright IBM Corp., 2006. All rights reserved. Chapter 4: Integrity.

Introduction to the new mainframe

© Copyright IBM Corp., 2006. All rights reserved. 4

Serialization

Serialization means make a resource to be used on a one-at-a-time basis

Methods to prevent concurrent updates: Enqueing- wait in queue during execution Reserves- e.g. reserve at startup (before execution) Locks- exclusive or read shared Global Resource Serialization (GRS) – across all systems

Page 5: Click to add text Introduction to the new mainframe: Large-Scale Commercial Computing © Copyright IBM Corp., 2006. All rights reserved. Chapter 4: Integrity.

Introduction to the new mainframe

© Copyright IBM Corp., 2006. All rights reserved. 5

Serialization – GRS (Global Resource Serialization)

Page 6: Click to add text Introduction to the new mainframe: Large-Scale Commercial Computing © Copyright IBM Corp., 2006. All rights reserved. Chapter 4: Integrity.

Introduction to the new mainframe

© Copyright IBM Corp., 2006. All rights reserved. 6

DFSMS the component of the operating system that -controls all data set allocation and -provides automatic backup of the data

The DFSMS constructs: - Data class: defines what a file looks like

- Storage class: Decides if data will be SMS managed or not

- What level of performance a file should have

- Management class: determines backup and migration requirements. -Storage group: groups disks together into storage pools, you

allocate by storage pool.

-ACS routines are used to assign the 4 SMS classes to datasets, tapes or objects

Z/OS ..DFSMS- (Data facility Storage Management Systems)

Page 7: Click to add text Introduction to the new mainframe: Large-Scale Commercial Computing © Copyright IBM Corp., 2006. All rights reserved. Chapter 4: Integrity.

Introduction to the new mainframe

© Copyright IBM Corp., 2006. All rights reserved. 7

SMS Constructs

Page 8: Click to add text Introduction to the new mainframe: Large-Scale Commercial Computing © Copyright IBM Corp., 2006. All rights reserved. Chapter 4: Integrity.

Introduction to the new mainframe

© Copyright IBM Corp., 2006. All rights reserved. 8

Auditing is ensuring that the information processing system complies with the installation policy.

Auditing may be:

A one time project (e.g; a snap inspection)

or

An ongoing process

System Management Facilities: writes audit records on DASD

System Logger: log changes to data

Auditing

Page 9: Click to add text Introduction to the new mainframe: Large-Scale Commercial Computing © Copyright IBM Corp., 2006. All rights reserved. Chapter 4: Integrity.

Introduction to the new mainframe

© Copyright IBM Corp., 2006. All rights reserved. 9

RRS is the coordinating resource manager

Assures that updates of the different data storage places are:

- correctly coordinated and

- data integrity is maintained.

(2 Phase Commit - Commit Coordinator)

Resource Recovery Services (RRS)

Page 10: Click to add text Introduction to the new mainframe: Large-Scale Commercial Computing © Copyright IBM Corp., 2006. All rights reserved. Chapter 4: Integrity.

Introduction to the new mainframe

© Copyright IBM Corp., 2006. All rights reserved. 10

RRS – Two-phase commitResource

Manager 3ApplicationResource

Recovery

Services (RRS)

Resource

Manager 1

Resource

Manager 2

Page 11: Click to add text Introduction to the new mainframe: Large-Scale Commercial Computing © Copyright IBM Corp., 2006. All rights reserved. Chapter 4: Integrity.

Introduction to the new mainframe

© Copyright IBM Corp., 2006. All rights reserved. 11

FLASHCOPY

FlashCopy

- A microcode-based technology

- Comes as an add-on to some DASD subsystems.

- Other DASD manufacturers have similar capabilities

-Lets the DASD subsystem handle some of the data movement task (rather than OS or programs).

- A useful utility for backing up databases and moving large volumes of data quickly at a volume level.

- FlashCopy Version 2 introduces data set level copy.

Page 12: Click to add text Introduction to the new mainframe: Large-Scale Commercial Computing © Copyright IBM Corp., 2006. All rights reserved. Chapter 4: Integrity.

Introduction to the new mainframe

© Copyright IBM Corp., 2006. All rights reserved. 12

Data backup and recovery : FlashCopy

Page 13: Click to add text Introduction to the new mainframe: Large-Scale Commercial Computing © Copyright IBM Corp., 2006. All rights reserved. Chapter 4: Integrity.

Introduction to the new mainframe

© Copyright IBM Corp., 2006. All rights reserved. 13

Data backup and recovery : Remote Copy

Page 14: Click to add text Introduction to the new mainframe: Large-Scale Commercial Computing © Copyright IBM Corp., 2006. All rights reserved. Chapter 4: Integrity.

Introduction to the new mainframe

© Copyright IBM Corp., 2006. All rights reserved. 14

Data backup and recovery : Metro Mirror

When the application performs a write update operation to a primary volume, this is what happens:

1.Write to primary volume (DS6000 cache and NVS).

2.Write to secondary (DS6000 cache and NVS).

3.Signal write complete on the secondary DS6000.

4.Post I/O complete to host server.

Page 15: Click to add text Introduction to the new mainframe: Large-Scale Commercial Computing © Copyright IBM Corp., 2006. All rights reserved. Chapter 4: Integrity.

Introduction to the new mainframe

© Copyright IBM Corp., 2006. All rights reserved. 15

Data backup and recovery: Global Copy

4. The secondary DS6000 returns write complete to the primary DS6000 when the updates are secured in the secondary DS6000 cache and NVS. The primary DS6000 then resets its change recording information.

The primary and secondary copies can be separated by any distance. The process is as follows:

1. The host server requests a write I/O to the primary DS6000. The write is staged through cache and non-volatile storage (NVS).

2. The write returns to the host server’s application.

3. At a later time, that is, in a non-synchronous manner, the primary DS6000 sends the necessary data so that the updates are reflected on the secondary volumes. The updates are grouped in batches for efficient transmission.

Page 16: Click to add text Introduction to the new mainframe: Large-Scale Commercial Computing © Copyright IBM Corp., 2006. All rights reserved. Chapter 4: Integrity.

Introduction to the new mainframe

© Copyright IBM Corp., 2006. All rights reserved. 16

Global Mirror

Other backup and recovery solutions:

Data set level

Volume level

Application level

Data backup and recovery:

Page 17: Click to add text Introduction to the new mainframe: Large-Scale Commercial Computing © Copyright IBM Corp., 2006. All rights reserved. Chapter 4: Integrity.

Introduction to the new mainframe

© Copyright IBM Corp., 2006. All rights reserved. 17

Page 18: Click to add text Introduction to the new mainframe: Large-Scale Commercial Computing © Copyright IBM Corp., 2006. All rights reserved. Chapter 4: Integrity.

Introduction to the new mainframe

© Copyright IBM Corp., 2006. All rights reserved. 18

Security

• System Z servers achieve Common Criteria Security Certification - Evaluation Assurance Level 5.

• U. S. Government had rated the mainframe EAL4+

• PR/SM configures separate logical systems on the same hardware. It prevents the flow of information among logical partitions, providing a highly secure isolated environment.

ATTENTION: Only the IBM mainframe partitions have attained an EAL5 rating.

IBM System Z partitioning achieves highest certification

Page 19: Click to add text Introduction to the new mainframe: Large-Scale Commercial Computing © Copyright IBM Corp., 2006. All rights reserved. Chapter 4: Integrity.

Introduction to the new mainframe

© Copyright IBM Corp., 2006. All rights reserved. 19

z/OS Architecture : Enforced Isolation

Address Spaces - Unique area for executing and storing data for each user or program.

Frames – 4096-byte chunks of storage protected keys.

Address SpacesVirtual Storage

(memory)

Physical StorageReal Storage

(frames)

Page 20: Click to add text Introduction to the new mainframe: Large-Scale Commercial Computing © Copyright IBM Corp., 2006. All rights reserved. Chapter 4: Integrity.

Introduction to the new mainframe

© Copyright IBM Corp., 2006. All rights reserved. 20

z/OS System Security Mechanisms

Supervisor Call Routine (SVC)

Code to perform system level functions.

Problem State Most modules run in this state.

Supervisor State Only operating system modules run in this state.

Authorized Program Facility (AFP)

1. Limits the use of sensitive SVCs to authorized programs.

2. Ensures that all modules fetched by authorized programs only come from authorized libraries.

Storage Protection Keys

Keys 0-7 are system keys and can only be obtained by programs in supervisor state. Keys 8-15 are user keys.

Authorized Program

Any program that runs, in supervisor state, with APF authorization, with a storage key in 0-7.

Page 21: Click to add text Introduction to the new mainframe: Large-Scale Commercial Computing © Copyright IBM Corp., 2006. All rights reserved. Chapter 4: Integrity.

Introduction to the new mainframe

© Copyright IBM Corp., 2006. All rights reserved. 21

z/OS System Security

• An attribute of z/OS such that there is no way for an unauthorized program:

To bypass store or fetch protection. To bypass Password, RACF, or System Authorization Facility

(SAF) mediated security checking, or, To obtain control in an authorized state

Page 22: Click to add text Introduction to the new mainframe: Large-Scale Commercial Computing © Copyright IBM Corp., 2006. All rights reserved. Chapter 4: Integrity.

Introduction to the new mainframe

© Copyright IBM Corp., 2006. All rights reserved. 22

z/OS Security

Accessor Environment Element (ACEE)

Operating system control block which is assigned when a user logs on the system and is used for authentication and auditing.

Security Access Facility (SAF)

Operating system function which provides security for resources. It is called for every access attempt and access is either granted or denied. External security products such as Top Secret and RACF are used to define, users, resources and access levels.

z/OS Security Server (RACF)

Optional z/OS feature to provide additional security enhancements.

Page 23: Click to add text Introduction to the new mainframe: Large-Scale Commercial Computing © Copyright IBM Corp., 2006. All rights reserved. Chapter 4: Integrity.

Introduction to the new mainframe

© Copyright IBM Corp., 2006. All rights reserved. 23

Resource Access Control Facility (RACF)

Installation decides which resources to protect

and which users need access to them.

RACF provides functions that:

- Identify and verify system users

- Identify, classify, and protect system resources

- Authorize the users to access protected resources

- Control the means of access to these resources

- Log and report unauthorized attempts at access

- Administer to meet the installation's security goals.

Page 24: Click to add text Introduction to the new mainframe: Large-Scale Commercial Computing © Copyright IBM Corp., 2006. All rights reserved. Chapter 4: Integrity.

Introduction to the new mainframe

© Copyright IBM Corp., 2006. All rights reserved. 24

z/OS Certification

On March 11,2005, BSI awarded IBM EAL3+ certification for its flagship operating system z/OS 1.6 with the RACF optional feature.

The certification encompasses Controlled Access Protection Profile (CAPP) EAL3+ and Labeled Security Protection Profile (LSPP) EAL 3+. z/OS 1.5 and later with the RACF optional feature and DB2 Version 8, provides a multilevel security (MLS) solution.

Page 25: Click to add text Introduction to the new mainframe: Large-Scale Commercial Computing © Copyright IBM Corp., 2006. All rights reserved. Chapter 4: Integrity.

Introduction to the new mainframe

© Copyright IBM Corp., 2006. All rights reserved. 25

Functions provided by z/OS Security Server

Traditional Functions1. Identify and authenticate users.

2. Authorize users to protected resources.

3. Control users’ level of authorization to resources.

4. Log and report attempts to unauthorized.

5. Providing auditing functions.

Newer Functions 1. Generation/Management of digital certificates.

2. Multilevel security

Page 26: Click to add text Introduction to the new mainframe: Large-Scale Commercial Computing © Copyright IBM Corp., 2006. All rights reserved. Chapter 4: Integrity.

Introduction to the new mainframe

© Copyright IBM Corp., 2006. All rights reserved. 26

Summary

The Mainframe:• Has several possibilities for to guaranty the integrity of the data• Data can be recovered when needed• Has several possibilities to make sure that the data is saved and

secure