View
214
Download
1
Tags:
Embed Size (px)
Citation preview
Setting up SAFEGUARD:Safe and Easy
A Users PerspectiveCarl Weber GreenHouse Software & ConsultingCarl Weber GreenHouse Software & Consulting14Oct2003, 14:45 – 15:45 14Oct2003, 14:45 – 15:45 MEA-18-U, Room C 1/2 MEA-18-U, Room C 1/2
7 years of process computer background prior to Tandem (HW & SW)
Started with Tandem Germany 1978 First cryptographic TAL procedure written in 1979
(causing 1st trouble with the US…) First contact to SAFEGUARD in 1985
(known as OBI at that time; ask Tim Chou…)
Since 1985 product responsibility for all security related Tandem products in Germany
Brief Intro Carl Weber
GH S
Management of the two successful system evaluations at GISA (German Information Security Agency) 1989 and 1993
Participation in the NCSC evaluation incl. ceremony in Baltimore (1993)
Left Tandem 1994 and started GreenHouse as Alliance Partner, specialized in- Security Tools and Products- Security Consulting & Education (from policy development up to implementation)- System programming (TAL/pTAL, PRIV code)
Brief Intro Carl Weber
GH S
I still maintain a close contact to Cupertino and the SAFEGUARD development group by- E-Mail- At least a yearly visit in Cupertino
Brief Intro Carl Weber
GH S
GreenHouse runs a K122 and S7000,connected by EXPAND over IP(Itanium system is planned for end 2004)
Using most recent versions of GUARDIAN/NSK/OSS
Investment necessary to offer good quality, services, and products(you need the right tools to do a good job!)
Brief Intro GreenHouse
GH S
Development triggered in 1984 by:
- Security Pacific Bank, LA- DoD agencies (indirect)
- Roy Capaldo, Tandem (driving force Marketing)
- Tim Chou, Tandem (technical expert, designer)
with the target of reaching C2 equivalent security functionality
SAFEGUARD History
GH S
Original development team:
- Tim Chou, product and code design, coding, ‘heavy lifting’
- Bill Lamb, developed SAFECOM; later owner of entire code
- Tim Newton, manuals
- Ian Earnest, QA
- Matt Mathews, education
- Kevin Coughlin, support
- many more, part time from other development areas
SAFEGUARD History
GH S
Bill Lamb still is in charge of SAFEGUARD He is around – talk to him to get more insight
information!
SAFEGUARD History
GH S
Identify Assets and Threats Topics to plan:
- Awareness (assessment of what assets are at risk )
- Accountability (who owns the asset and who needs access )
- Appropriateness (what level of access and degree of auditing is needed )
- Education (NOT product education, but: Why do we do security)
General Security Statement
GH S
General Security Statement
Have a Plan (Security Policy)describing the target to reach
It is a generic plan, fitting all platforms in your company!
It is a one page thing! It needs to be approved by the board of
directors!
GH S
General Security Statement
Make a Plandescribing the way to go
Before installing mechanisms, bring order into your systeme.g. introduce and follow naming conventions
Relate Security Functions to persons
GH S
SAFEGUARD is a tool to enforce order on your system
It does NOT bring more security, but more granularity and new functionality!(an error 48 from GUARDIAN is as solid as an error 48 from SAFEGUARD!)
Use SAFEGUARD and its features with sense of proportion
General Security Statement
GH S
In case GUARDIAN security solves your requirements, do NOT add SAFEGUARD rules (ACLs)!
Introducing and activating SAFEGUARD is:- 99% decision making (make the plan!) (who owns what; who needs access; who is responsible, etc.)
- 1% real work with SAFECOM (normally the creation and execution of an OBEY file)
General Security Statement
GH S
SAFEGUARD covers these functions:
- Authentication (more than GUARDIAN)
- Authorization (more than GUARDIAN)
- Auditing (new)
- Administration (much more than GUARDIAN)
SAFEGUARD
GH S
Purchasing SAFEGUARD and paying a yearly license fee does NOT secure your system!
You have to- Run- Configure and- MaintainSAFEGUARD as well!
SAFEGUARD
GH S
Running SAFEGUARD
Methods to run SAFEGUARD
- Started ‘by hand’ (strongly recommended for beginners)
- Through the CIIN file at system cold load time (OK for experts; satisfies 99% of all customers)
- Generated into the OS (sysgened) (only needed in high risk shops; may cause outages)
GH S
Running SAFEGUARD
Command:
[run] OSMP/NAME $ZSMP,NOWAIT,PRI 199,CPU 0/1
This creates the $ZSMP monitor process as well as $ZSnn processes, and- activates all SAFEGUARD default settings or- configured settings!
GH S
Configuring SAFEGUARD
Configuring SAFEGUARD is essential SAFEGUARD without, or with insufficient,
configuration is a massive security breach! Configuration areas are:
- Management rights- Global settings- Audit file handling- Access Control Lists (ACL)
GH S
Configuring SAFEGUARDManagement
SAFEGUARD has its own internal security system, allowing different persons to manage- SAFEGUARD management- SAFEGUARD global configuration attributes- Users- Access rights (ACLs)
GH S
Configuring SAFEGUARDManagement
ObjectTypes
Users with OBJECTTYPE access rights have the ability to introduce ACLs and/or Users! - OBJECTTYPE (owner of all OBJECTTYPEs)
- USER (also controls Aliases and Groups)
- DEVICE/SUBDEVICE- PROCESS/SUBPROCESS- VOLUME/SUBVOL/DISKFILE
Introduce ALL OBJECTTYPES
GH S
Configuring SAFEGUARDManagement
Security Groups
Security Group users have management access rights in SAFEGUARD
Introduce the two Security Groups- System-Operator- Security-Administrator
GH S
Configuring SAFEGUARDAudit Service
Audit System
Allows definition of- audit service management- audit file handling- audit file size and location
GH S
Configuring SAFEGUARDAudit Service
Audit Service Management
WRITE-THROUGH CACHE ON | OFF
EOF REFRESH ON | OFF
RECOVERY RECYCLE [ FILES ] DENY GRANTS SUSPEND AUDIT
GH S
Configuring SAFEGUARDAudit Service
File SizeChose a file size that spans at least one day.To get the right extent sizes, control the audit files for some time (see next page)Warning:The disk space for the audit files is always allocated
Number of Audit FilesDepends on your disk space; but should have 5 files at least
File LocationChose the least busy disk, having enough space; optionally make use of audit pools
GH S
Configuring SAFEGUARDAudit Service
Auditing is some kind of religious question:- interested in fails (= hacks)?- interested in passes (= who really was it?)
Invoke your Audit department to get your company rules!
When you audit events – CHECK the audits as well!
Keep audit files for some time(e.g. tape backups for 3 months)
GH S
Configuring SAFEGUARDGlobal Settings
Global SAFEGUARD settings- Authentication attributes- Password attributes- ACL use and evaluation rules- Global CI- Global Auditing- Miscellaneous
GH S
Configuring SAFEGUARDGlobal Settings - Authentication
AUTHENTICATE-MAXIMUM-ATTEMPTS = 3 (or more)
AUTHENTICATE-FAIL-TIMEOUT = 60 SECONDS (or more)
AUTHENTICATE-FAIL-FREEZE = OFF
When you raise the number of maximum attempts, raise the time out as well, e.g. 5 attempts within 10 minutes
GH S
Configuring SAFEGUARDGlobal Settings - Password
PASSWORD-REQUIRED = OFF PASSWORD-HISTORY = 13 (or more)
PASSWORD-ENCRYPT = ON PASSWORD-MINIMUM-LENGTH = 6 (or more)
PASSWORD-MAY-CHANGE = 7 DAYS BEFORE-EXPIRATION
PASSWORD-EXPIRY-GRACE = 45 DAYS AFTER-EXPIRATION
GH S
Configuring SAFEGUARDGlobal Settings - WarningMode
WARNING-MODE = OFF WARNING-FALLBACK-SECURITY = GUARDIAN
GH S
Configuring SAFEGUARDGlobal Settings - Device
DIRECTION-DEVICE = DEVICE-FIRST CHECK-DEVICE = ON
COMBINATION-DEVICE = FIRST-ACL CHECK-SUBDEVICE = ON
ACL-REQUIRED-DEVICE = OFF
GH S
Configuring SAFEGUARDGlobal Settings - Process
DIRECTION-PROCESS = PROCESS-FIRST CHECK-PROCESS = ON
COMBINATION-PROCESS = FIRST-ACL CHECK-SUBPROCESS = ON
ACL-REQUIRED-PROCESS = OFF
GH S
Configuring SAFEGUARDGlobal Settings – Disk File
DIRECTION-DISKFILE = FILENAME-FIRST CHECK-VOLUME = OFF
COMBINATION-DISKFILE = FIRST-ACL CHECK-SUBVOLUME = ON
ACL-REQUIRED-DISKFILE = OFF CHECK-FILENAME = ON
CLEARONPURGE-DISKFILE = OFF
GH S
Configuring SAFEGUARDGlobal Settings – ACL Eval.
These settings allow:- an easy understanding of ACLs- A clear structure- Protection against non allowed file and subvol creates
GH S
Configuring SAFEGUARDGlobal Settings – Auditing
AUDIT-OBJECT-ACCESS-PASS = NONE AUDIT-AUTHENTICATE-PASS = ALL
AUDIT-OBJECT-ACCESS-FAIL = NONE AUDIT-AUTHENTICATE-FAIL = ALL
AUDIT-OBJECT-MANAGE-PASS = ALL AUDIT-SUBJECT-MANAGE-PASS = ALL
AUDIT-OBJECT-MANAGE-FAIL = All AUDIT-SUBJECT-MANAGE-FAIL = ALL
AUDIT-DEVICE-ACCESS-PASS = NONE AUDIT-PROCESS-ACCESS-PASS = NONE
AUDIT-DEVICE-ACCESS-FAIL = NONE AUDIT-PROCESS-ACCESS-FAIL = NONE
AUDIT-DEVICE-MANAGE-PASS = ALL AUDIT-PROCESS-MANAGE-PASS = ALL
AUDIT-DEVICE-MANAGE-FAIL = ALL AUDIT-PROCESS-MANAGE-FAIL = ALL
AUDIT-DISKFILE-ACCESS-PASS = NONE
AUDIT-DISKFILE-ACCESS-FAIL = NONE
AUDIT-DISKFILE-MANAGE-PASS = ALL
AUDIT-DISKFILE-MANAGE-FAIL = ALL
Auditing can be configured on an individual object basis as well!
GH S
Configuring SAFEGUARDGlobal Settings – CI
CI-PROG = $SYSTEM.SYSTEM.TACL CMON = OFF
CI-LIB = * NONE * CMONERROR = ACCEPT
CI-SWAP = * NONE * CMONTIMEOUT = 1 SECONDS
CI-CPU = ANY BLINDLOGON = ON
CI-PRI = 149 NAMELOGON = ON
CI-PARAM-TEXT =
GH S
Configuring SAFEGUARDAccess Control Lists
It does make sense to have ACLs onapplication, SPOOLER and PATHWAY- (Sub-)Processes- Disk Files (file, subvol, volume)
Do NOT put ACLs on SPI interfaces Do NOT secure the SAFEGUARD SPI
interface!!!
GH S
Configuring SAFEGUARDAccess Control Lists
I don’t know of DEVICES to be secured, except- X.25 lines- tape drives
Use the highest possible level to minimize number of ACLs
GH S
Configuring SAFEGUARDAccess Control Lists
Introduction of Terminals does make sense only with fixed named terminals.
All other terminal types should use: $SYSTEM.SYSTEM.LOGONas initial resource, or service (IP)
GH S
Configuring SAFEGUARDInitial Command Interpreter
Initial Command Interpreter- Requires a SAFEGUARD controlled terminal- Can be defined - on the User (first check) - on the Terminal (next check) - globally (last check)
GH S
Configuring SAFEGUARD Initial Command Interpreter
Benefits:- A LOGON starts a pre-defined resource- the password handling can be done at logon time- LOGON- as well as LOGOFF-events are recorded
GH S
Maintaining SAFEGUARD
Never ever change global SAFEGUARD settings ‘on the fly’, or for test purposes:You for sure end up in big trouble!
All that needs maintenance is:- Users (add, delete, alter)- ACLs (add, delete, alter)- Possibly Audit file sizes and locations- Rarely management rights
GH S
Conclusion
Have a plan (Security Policy) in place BEFORE you start
Relate security functions to persons Make a plan to run and configure
SAFEGUARD Check audit information – at least keep it for
some time (…for a post mortal analysis)
GH S
Conclusion
Most important:
Educate your employees!Not about security products, but about security as a method, and why you are going to use it!
GH S
ConclusionBad news
Security costs- money- CPU cycles- disk space- time- nerves
Security causes- trouble
GH S
ConclusionGood News
Security- gives you a system that is much easier to maintain- makes you sleep better ([not only] at home)- is worth the effort!
GH S
Helpful Gadgets
Check
www.GreenHouse.de
for supported FreeWare and ShareWare tools and products, making life with SAFEGUARD much easier!
Come to my tools presentation tomorrow at 11:30 in this room (C1)
GH S