+ All Categories
Home > Documents > Top 10 Security Risks AS400

Top 10 Security Risks AS400

Date post: 06-Apr-2018
Category:
Upload: avez4u
View: 228 times
Download: 1 times
Share this document with a friend

of 48

Transcript
  • 8/3/2019 Top 10 Security Risks AS400

    1/48

    Copyright 2006

    The PowerTech Group, Inc

    The St a t e o f Sys t em i

    Secur i t y&

    The Top 10 OS/400Sec ur i t y Risk s

  • 8/3/2019 Top 10 Security Risks AS400

    2/48

    Agenda

    Introduction

    The Top Ten Unprotected Network Access Powerful Users Weak or Compromised Passwords User Identity Theft The Open Door Policy Promiscuous Object Ownership Library and Library List Problems Command Interface Abuse

    System Value Weaknesses No Audit Ability

    Conclusion

  • 8/3/2019 Top 10 Security Risks AS400

    3/48

    The St at e o f iSer ies Sec ur i t y -

    2006

    188 Companies - Mostly in the US

    195 Different iSeries Systems

    825 users on average

    393 libraries on average

    Purpose of the Study

    Help IT managers and auditors understand iSeries security

    exposures Focus on top areas of concern in meeting regulatory

    compliance

    3

  • 8/3/2019 Top 10 Security Risks AS400

    4/48

    What Dr ives Com pl ianc e

    Security has increased in visibility andimportance

    Companies are getting skewered in the

    press Bank of America, Marriott, Citibank,

    ChoicePoint, etc.

    The general public is concerned for itssafety

  • 8/3/2019 Top 10 Security Risks AS400

    5/48

    The Leg is la t ure Reac t s

    Legislatures create laws Sarbanes Oxley, HIPAA, Gramm-Leach-Bliley,SB1386, etc.

    Laws are open to interpretation Sarbanes Oxley Section 404

    Perform annual assessment of the effectiveness of internalcontrol over financial reporting

    and obtain attestation from external auditors

    Auditors are the interpreters

  • 8/3/2019 Top 10 Security Risks AS400

    6/48

    The Audi t or s V iew

    Auditors interpret regulations Auditors focus on frameworks and processes Auditors have concluded that IT is lagging

    when it comes to internal controls

    Executives just follow the auditors

    recommendations

    So what are the auditors going to say

    when they review your systems?

  • 8/3/2019 Top 10 Security Risks AS400

    7/48

    HACKERS!!! Your Company

    The Biggest Threat

    t o Your Dat a

    or

  • 8/3/2019 Top 10 Security Risks AS400

    8/48

    Unpro tec ted

    Net w ork Ac c ess

    Many OS/400 applications rely on menu

    security It was easy to build Its the legacy of business applications

    Most menu security designs assume: AllAllaccess is through the application menu No users have command line access

    Query access is limited or denied completely That the user is a member of the groupuser is a member of the groupthat

    owns the objects. Or

    *PUBLIC has broad access to the data

    1

    R lt

  • 8/3/2019 Top 10 Security Risks AS400

    9/48

    Application MenuCRM

    ODBC

    Telnet

    Resul t :

    Too Muc h Ac c ess 1

    U t t d

  • 8/3/2019 Top 10 Security Risks AS400

    10/48

    Unpro tec ted

    Net w ork Ac c ess 1

    A t l St t f iS i

  • 8/3/2019 Top 10 Security Risks AS400

    11/48

    Ac t ua l St a t e o f iSer ies

    Ne t w ork Ac c ess Cont rol

    iSeries Security Study 2007 Source: The PowerTech Group Inc.

    U t t d

  • 8/3/2019 Top 10 Security Risks AS400

    12/48

    User specifiedexit program

    3. Analyze request &return result

    What is an exit point anyway?

    Main program

    IBMs ODBC Server

    1. User requests data:2. ODBC Server calls ex it

    program

    Pass/Fail

    4. Cont inue processing...

    1

    Unpro tec ted

    Net w ork Ac c ess

    P f l

  • 8/3/2019 Top 10 Security Risks AS400

    13/48

    Power fu l

    Users

    Users can be made more powerful through thegranting of OS/400 Special Authorities

    Special Authorities can trump OS/400 object levelauthorities.

    A USER WITH *ALLOBJ CAN READ, CHANGE, OR DELETEANY OBJECT ON THE SYSTEM.

    A USER WITH *SPLCTL CAN READ, CHANGE, OR DELETEANY SPOOL FILE ON THE SYSTEM.

    A USER WITH *JOBCTL CAN VIEW, CHANGE, OR STOP ANYJOB ON THE SYSTEM (INCLUDES ENDSBS ANDPWRDWNSYS)

    A USER WITH *SAVSYS CAN READ OR DELETEANY

    OBJECT ON THE SYSTEM.

    2

    Power fu l

  • 8/3/2019 Top 10 Security Risks AS400

    14/48

    iSeries Security Study 2007 Source: The PowerTech Group Inc.

    Power fu l

    Users 2

    P f l

  • 8/3/2019 Top 10 Security Risks AS400

    15/48

    Power fu l

    Users

    What do special authorities do?

    *ALLOBJ - ALL authority to every object on thesystem Game Over!

    *AUDIT - Authority to manipulate system auditingvalues.

    *IOSYSCFG - Authority to create and modifycommunications to the system.

    *JOBCTL- Authority to control otherusers jobs.

    2

    P f l

  • 8/3/2019 Top 10 Security Risks AS400

    16/48

    Power fu l

    Users

    What do special authorities do? *SAVRST - Authority to save, restore, and

    remove any object on the system.

    *SECADM - Authority to change profiles

    and passwords *SERVICE - Authority to use the system

    service tools

    *SPLCTL - *ALLOBJ authority for spoolfiles

    Learn more at:

    http://www.powertech.com/documents/articles/Exposures.pdf

    2

    W k C i d

  • 8/3/2019 Top 10 Security Risks AS400

    17/48

    Weak or Com prom ised

    Passwords

    Passwords can be sniffed in network traffic Several protocols submit user IDs and

    passwords in clear text FTP, Telnet, and older forms of Client Access

    and PC support

    Protect yourself by Minimizing use of legacy OS/400 sign-on screen

    Set the Client Access Bypass Signon UseVPNs when communicating over un-securenetworks

    3

    Weak or Com prom ised

  • 8/3/2019 Top 10 Security Risks AS400

    18/48

    Too many passwords, too many places Users pick passwords that are easy to remember Users will re-use passwords inside and outside the

    company.

    Every occurrence of a password is a potential point ofexposure.

    Use Single Sign-On to reduce the numberof passwords in your organization Dont send passwords via email, or over un-secured

    networks.

    Require that passwords be changed at regular intervals.

    Dont use default passwords

    Weak or Com prom ised

    Passwords 3

    Weak or Com prom ised

  • 8/3/2019 Top 10 Security Risks AS400

    19/48

    If you must have passwords, prevent trivialpasswords:

    At a minimum, set these system values:System Value Name Value Description

    QPWDEXPITV 90 90 Days QPWDMINLEN 6 6 Character Minimum length

    QPWDRQDDGT 1 Require a digit QPWDRQDDIF 5 Unique in 10

    Use a password checker to prevent trivial passwords

    Use OS/400s Single Sign-On PowerTech can help!

    Weak or Com prom ised

    Passwords 3

    Weak or Com prom ised

  • 8/3/2019 Top 10 Security Risks AS400

    20/48

    > Why Single Sign-On (SSO)?

    Password resets are expensive Too many passwords risks disclosure

    Password synchronization schemes extend the

    problem IBM and Microsoft provide native support for

    SSO

    Password elimination is the most secureapproach

    Weak or Com prom ised

    Passwords 3

    User Ident i t y

  • 8/3/2019 Top 10 Security Risks AS400

    21/48

    User Ident i t y

    Thef t

    3 ways to steal an OS/400 user IDOS/400 Job Description

    Submit Job Command (SBMJOB)

    IBM APIs to Switch to the user

    > None of these methods requires youto know the users password

    4

    User Ident i t y

  • 8/3/2019 Top 10 Security Risks AS400

    22/48

    > Use an OS/400 job description tomasquerade as the user. A JOBD that has a User ID attached to it

    represents the ability to run a job as that user.

    No password required

    Only at QSECURITY level 30 and lower. SBMJOB CMD(CALL MYPGM)

    JOB(REPORT) JOBD(QGPL/QBATCH) USER(*JOBD)

    Solution? Move to QSECURITY level 40 or higher.

    User Ident i t y

    Thef t 4

    User Ident i t y

  • 8/3/2019 Top 10 Security Risks AS400

    23/48

    Use the Submit Job Command (SBMJOB)

    to masquerade as the user Specify the name of another user, and run

    using the assumed identity

    SBMJOB CMD(CALL MYPGM) JOB(REPORT) JOBD(QGPL/QBATCH) USER(SALLY)

    User Ident i t y

    Thef t 4

    User Ident i t y

  • 8/3/2019 Top 10 Security Risks AS400

    24/48

    Use IBM APIs to switch to the user No password required

    The following code will allow me tobecome someone else without knowingtheir password

    Program QSYS/QASSUMEPGM PARM(&USER)

    DCL &USER *CHAR 10

    DCL &HANDLE *CHAR 10

    DCL &ERROR *CHAR 4

    CHGVAR %BIN(&ERROR) 0CALL 'QSYGETPH +

    PARM(&USER *NOPWD &HANDLE &ERROR)

    CHGVAR %BIN(&ERROR) 0

    CALL 'QWTSETP PARM(&HANDLE &ERROR)

    ENDPGM

    4User Ident i t y

    Thef t

    The Open

  • 8/3/2019 Top 10 Security Risks AS400

    25/48

    Every OS/400 object specifies some kindof authority for a user called *PUBLIC?

    WHO IS *PUBLIC? Any user of this computer who does not have explicit authority

    to a given object.

    In the old days *PUBLIC wasEveryone in my company

    Then as we networked to more and more systems, *PUBLICbecame every one you do business with (Customers,Vendors, Partners, etc.)

    With virtually every network connected to every other network(its called The Internet!), *PUBLIC could be anyone in theWORLD that can connect to your network!!!

    In a perfect world, *PUBLIC should have littleor no authority to production applications.

    The Open

    Door Pol ic y 5

    The Open

  • 8/3/2019 Top 10 Security Risks AS400

    26/48

    *PUBLIC AUTHORITY TO LIBRARIES

    iSeries Security Study 2007 Source: The PowerTech Group Inc.

    The Open

    Door Pol ic y 5

    The Open

  • 8/3/2019 Top 10 Security Risks AS400

    27/48

    At a maximum, Business Applicationusers need no more than;

    *USE authority to static objects such as programs. *CHANGE Authority to dynamic objects such as datafiles.

    Ideally, dont give *PUBLIC even read(*USE) authority to anything

    Check out the QCRTAUT system value tosee what authority *PUBLIC is given by

    default to newly created objects.

    5The Open

    Door Pol ic y

    Promiscuous

  • 8/3/2019 Top 10 Security Risks AS400

    28/48

    Promiscuous

    Objec t Ow nersh ip

    All end users belong to a group profile that

    owns all of the application objects. Easy to administer security

    Assumes that all application access will takeplace through a predefined menu interface

    6

    Promiscuous

  • 8/3/2019 Top 10 Security Risks AS400

    29/48

    Why is this a problem?

    Users are no longer locked into green screeninterfaces and dumb terminals.

    There are numerous ways of getting at the data

    Command Line access DFU, DBU, EZView and other Data manipulation tools QUERY/400, SQL, and other query tools

    FTP, ODBC, Remote command and other network accesses. Make sure that youve got all the back doors (and

    Windows!) covered as well.

    6Promiscuous

    Objec t Ow nersh ip

    Librar ies and

  • 8/3/2019 Top 10 Security Risks AS400

    30/48

    A library list specifies the order in whichobjects and files are searched for.

    A user who can place objects into a librarycould bypass security checking programs Example:

    If the library list contains LIBa, LIBb, and LIBc And security checking program PROGZ exists in LIBC And user Fred has at least *USE + *ADD authority to LIBA User Fred could place a bogus version of PROGZ into LIBA

    that bypasses security Solution:

    Users only need *USE authority to libraries in their library list.

    This is especially true of libraries on the system portion ofthe library list (System Value QSYSLIBL)

    Librar ies and

    L ibrary Lis t s 7

    Librar ies and

  • 8/3/2019 Top 10 Security Risks AS400

    31/48

    *PUBLIC AUTHORITY TO LIBRARIES

    iSeries Security Study 2007 Source: The PowerTech Group Inc.

    Librar ies and

    L ibrary L is t s 7

    Librar ies and

  • 8/3/2019 Top 10 Security Risks AS400

    32/48

    Protect libraries first No more than *USE authority to production libraries

    *EXCLUDE for sensitive libraries

    User authorities to libraries: *EXCLUDE => Cannot access anything

    *USE => Read, change, or delete objects

    *USE plus *ADD => Place new objects into a library

    *ALL => Delete the library

    Library Lis t s 7

    C d Li Ab

  • 8/3/2019 Top 10 Security Risks AS400

    33/48

    The ability to execute commands allows auser to skirt traditional menu limitations

    Commands can be entered in a variety of ways: OS/400 command line (Call QCMD) OS/400 screens that display a command line (WRKOUTQ,

    WRKWTR etc.), or other applications with hidden command line

    access keys. Through the use of the attention key. Using FTP to issue a command remotely Using Client Access to issue a command remotely Using DDM to issue a command remotely

    8Com m and L ine Abuse

    Com m and L ine

  • 8/3/2019 Top 10 Security Risks AS400

    34/48

    Control users access to commands by Use the Limited Capability parameter (LMTCPB) on

    the OS/400 user profile to some interfaces Beware that other interfaces do not respect the

    LMTCPB parameter limitations

    Use an exit program to limit DDM, Client Access, andOPSNAV, and other Windows interfaces

    Some users require command line access(Programmers, Operators, Vendors, etc.)

    Make sure that they are monitored

    In t e r fac e Abuse 8

    Com m and L ine

  • 8/3/2019 Top 10 Security Risks AS400

    35/48

    In t e r fac e Abuse 8

    Syst em Value9

  • 8/3/2019 Top 10 Security Risks AS400

    36/48

    Weaknesses

    There are several system values must be setproperly to protect your system

    Set the system values to their most protective

    setting

    Then toggle them off/on as needed. Monitor system values to detect and alert you

    whenever they are changed.

    Ensure that those system values are changed back Monitor for toggle off / toggle on conditions Monitor while System Values are toggled off

    9

    Syst em Value9

  • 8/3/2019 Top 10 Security Risks AS400

    37/48

    Sign-On Control- regulate sign on to preventattacks

    QDSPSGNINF = 1 Display the signon information screen.

    QINACTITV = 30 Time out a screen after 30 idle minutes.

    QINACTMSGQ = *DSCJOB When job is timed out, disconnect job and show signon screen.

    QMAXSIGN = 3 Maximum invalid signon attempts allowed.

    QMAXSGNACN = 2 Disable User after N invalid signon attempts

    QRMTSIGN = *VERIFY Allow user to bypass legacy signon screen.

    Weaknesses 9

    Syst em Value9

  • 8/3/2019 Top 10 Security Risks AS400

    38/48

    > Malicious programs Prevent malicious programs from beingloaded to your system by setting thesesystem values:

    QALWOBJRST = *NONE Do not allow sensitive program restore.

    QFRCCVNRST = 1

    Force object conversion on restore. QVFYOBJRST = 3 Signed objects must be valid upon restore.

    Weaknesses 9

    Syst em Value9

  • 8/3/2019 Top 10 Security Risks AS400

    39/48

    > Operating system integrity

    QSECURITY 10 = Physical Security 20 = Password Security

    30 = Resource Security 40 = Operating System Security

    50 = Enhanced Operating System Security

    Do not allow programs to bypass OS security

    Weaknesses 9

    Syst em Value9

  • 8/3/2019 Top 10 Security Risks AS400

    40/48

    Operating System Integrity - QSECURITY

    iSeries Security Study 2007 Source: The PowerTech Group Inc.

    Weaknesses 9

    Pow erTec hs Open Sourc e

  • 8/3/2019 Top 10 Security Risks AS400

    41/48

    Pow erTec h s Open Sourc e

    Sec ur i t y Po l ic y

    Free for all attendees!www.powertech.com/securitypolicy.html

    What does Open Source mean?

    No Audi t10

  • 8/3/2019 Top 10 Security Risks AS400

    42/48

    Abi l i t y

    If you had a security problem, would youknow? Who did it? What happened?

    When it happened? How it was done? How to stop it from happening again?

    What if the data was not damaged, butonly stolen?

    10

    No Audi t

    Ab i l i t 10

  • 8/3/2019 Top 10 Security Risks AS400

    43/48

    In order to prevent security breaches, you

    must first be able to detect them

    Use the OS/400 security auditing journal(QAUDJRN) to help determine where yoursecurity stands Why?

    Its free (from IBM) Its a comprehensive gathering tool Its an irrefutable source of historical events.

    Abi l i t y 10

    No Audi t

    Ab i l i t 10

  • 8/3/2019 Top 10 Security Risks AS400

    44/48

    Turn on OS/400 security auditing by typing:CHGSECAUD QAUDCTL(*AUDLVL) +

    QAUDLVL(*AUTFAIL *CREATE *DELETE +*JOBDTA *NETCMN*OBJMGT +*OFCSRV *OPTICAL *PGMADP +*PGMFAIL *PRTDTA*SAVRST +*SECURITY *SERVICE *SPLFDTA +

    *SYSMGT ) +INLJRNRCV(SECURLIB/AUDRCV0001)

    This will generate a lot of audit trails Use toolstoolsto sift through the audit trails to find important

    events. If at all possible, save allallsecurity journal receivers.

    Make sure QAUDENDACN is *NOTIFY.

    Abi l i t y 10

    Moni t or ing Com pl ianc eon Syst em i

  • 8/3/2019 Top 10 Security Risks AS400

    45/48

    on Syst em i

    45

    Com pl ianc e Guide

  • 8/3/2019 Top 10 Security Risks AS400

    46/48

    46

    Best Prac t i c es Mapped t oCOBIT and ISO 17799 St andards

  • 8/3/2019 Top 10 Security Risks AS400

    47/48

    COBIT and ISO 17799 St andards

    47

  • 8/3/2019 Top 10 Security Risks AS400

    48/48

    Download an open sourceSecurity policy at

    www.powertech.com

    Questions?


Recommended