550 likes | 925 Views
Setting up SAFEGUARD: Safe and Easy A Users Perspective. Carl Weber GreenHouse Software & Consulting 14Oct2003, 14:45 – 15:45 MEA-18-U, Room C 1/2. And you think you have stress…. 7 years of process computer background prior to Tandem (HW & SW)
E N D
Setting up SAFEGUARD:Safe and EasyA Users Perspective Carl Weber GreenHouse Software & Consulting14Oct2003, 14:45 – 15:45 MEA-18-U, Room C 1/2
7 years of process computer background prior to Tandem (HW & SW) Started with Tandem Germany 1978 First cryptographic TAL procedure written in 1979 (causing 1st trouble with the US…) First contact to SAFEGUARD in 1985(known as OBI at that time; ask Tim Chou…) Since 1985 product responsibility for all security related Tandem products in Germany Brief Intro Carl Weber
Management of the two successful system evaluations at GISA (German Information Security Agency) 1989 and 1993 Participation in the NCSC evaluation incl. ceremony in Baltimore (1993) Left Tandem 1994 and started GreenHouse as Alliance Partner, specialized in- Security Tools and Products- Security Consulting & Education (from policy development up to implementation)- System programming (TAL/pTAL, PRIV code) Brief Intro Carl Weber
I still maintain a close contact to Cupertino and the SAFEGUARD development group by- E-Mail- At least a yearly visit in Cupertino Brief Intro Carl Weber
GreenHouse runs a K122 and S7000,connected by EXPAND over IP(Itanium system is planned for end 2004) Using most recent versions of GUARDIAN/NSK/OSS Investment necessary to offer good quality, services, and products(you need the right tools to do a good job!) Brief Intro GreenHouse
Development triggered in 1984 by:- Security Pacific Bank, LA- DoD agencies (indirect)- Roy Capaldo, Tandem (driving force Marketing)- Tim Chou, Tandem (technical expert, designer)with the target of reaching C2 equivalent security functionality SAFEGUARD History
Original development team:- Tim Chou, product and code design, coding, ‘heavy lifting’- Bill Lamb, developed SAFECOM; later owner of entire code- Tim Newton, manuals- Ian Earnest, QA- Matt Mathews, education- Kevin Coughlin, support- many more, part time from other development areas SAFEGUARD History
Bill Lamb still is in charge of SAFEGUARD He is around – talk to him to get more insight information! SAFEGUARD History
Security is another word for- Arrangement- Order- Organization General Security Statement
Identify Assets and Threats Topics to plan:- Awareness(assessment of what assets are at risk )- Accountability(who owns the asset and who needs access )- Appropriateness (what level of access and degree of auditing is needed )- Education(NOT product education, but: Why do we do security) General Security Statement
Have a Plan (Security Policy)describing the target to reach It is a generic plan, fitting all platforms in your company! It is a one page thing! It needs to be approved by the board of directors! General Security Statement
Make a Plandescribing the way to go Before installing mechanisms, bring order into your systeme.g. introduce and follow naming conventions Relate Security Functions to persons General Security Statement
Educate your employeesNOT product usage,but WHY you are doing it! General Security Statement
No Plan(s) – No Security! General Security Statement
SAFEGUARD is a tool to enforce order on your system It does NOT bring more security, but more granularity and new functionality!(an error 48 from GUARDIAN is as solid as an error 48 from SAFEGUARD!) Use SAFEGUARD and its features with sense of proportion General Security Statement
In case GUARDIAN security solves your requirements, do NOT add SAFEGUARD rules (ACLs)! Introducing and activating SAFEGUARD is:- 99% decision making (make the plan!)(who owns what; who needs access; who is responsible, etc.)- 1% real work with SAFECOM(normally the creation and execution of an OBEY file) General Security Statement
SAFEGUARD covers these functions:- Authentication (more than GUARDIAN)- Authorization (more than GUARDIAN)- Auditing (new)- Administration (much more than GUARDIAN) SAFEGUARD
Purchasing SAFEGUARD and paying a yearly license fee does NOT secure your system! You have to- Run- Configure and- MaintainSAFEGUARD as well! SAFEGUARD
Methods to run SAFEGUARD- Started ‘by hand’(strongly recommended for beginners)- Through the CIIN file at system cold load time (OK for experts; satisfies 99% of all customers)- Generated into the OS (sysgened)(only needed in high risk shops; may cause outages) Running SAFEGUARD
Command:[run] OSMP/NAME $ZSMP,NOWAIT,PRI 199,CPU 0/1 This creates the $ZSMP monitor process as well as $ZSnn processes, and- activates all SAFEGUARD default settings or- configured settings! Running SAFEGUARD
Configuring SAFEGUARD is essential SAFEGUARD without, or with insufficient, configuration is a massive security breach! Configuration areas are:- Management rights- Global settings- Audit file handling- Access Control Lists (ACL) Configuring SAFEGUARD
SAFEGUARD has its own internal security system, allowing different persons to manage- SAFEGUARD management- SAFEGUARD global configuration attributes- Users- Access rights (ACLs) Configuring SAFEGUARDManagement
ObjectTypesUsers with OBJECTTYPE access rights have the ability to introduce ACLs and/or Users! - OBJECTTYPE (owner of all OBJECTTYPEs)- USER (also controls Aliases and Groups)- DEVICE/SUBDEVICE- PROCESS/SUBPROCESS- VOLUME/SUBVOL/DISKFILE Introduce ALL OBJECTTYPES Configuring SAFEGUARDManagement
Security GroupsSecurity Group users have management access rights in SAFEGUARD Introduce the two Security Groups- System-Operator- Security-Administrator Configuring SAFEGUARDManagement
Audit SystemAllows definition of- audit service management- audit file handling- audit file size and location Configuring SAFEGUARDAudit Service
Audit Service ManagementWRITE-THROUGH CACHE ON | OFFEOF REFRESH ON | OFFRECOVERY RECYCLE [ FILES ] DENY GRANTS SUSPEND AUDIT Configuring SAFEGUARDAudit Service
File SizeChose a file size that spans at least one day.To get the right extent sizes, control the audit files for some time(see next page)Warning:The disk space for the audit files is always allocated Number of Audit FilesDepends on your disk space; but should have 5 files at least File LocationChose the least busy disk, having enough space; optionally make use of audit pools Configuring SAFEGUARDAudit Service
Auditing is some kind of religious question:- interested in fails (= hacks)?- interested in passes (= who really was it?) Invoke your Audit department to get your company rules! When you audit events – CHECK the audits as well! Keep audit files for some time(e.g. tape backups for 3 months) Configuring SAFEGUARDAudit Service
Global SAFEGUARD settings- Authentication attributes- Password attributes- ACL use and evaluation rules- Global CI- Global Auditing- Miscellaneous Configuring SAFEGUARDGlobal Settings
AUTHENTICATE-MAXIMUM-ATTEMPTS = 3 (or more) AUTHENTICATE-FAIL-TIMEOUT = 60 SECONDS (or more) AUTHENTICATE-FAIL-FREEZE = OFF When you raise the number of maximum attempts, raise the time out as well, e.g. 5 attempts within 10 minutes Configuring SAFEGUARDGlobal Settings - Authentication
PASSWORD-REQUIRED = OFF PASSWORD-HISTORY = 13 (or more) PASSWORD-ENCRYPT = ON PASSWORD-MINIMUM-LENGTH = 6 (or more) PASSWORD-MAY-CHANGE = 7 DAYS BEFORE-EXPIRATION PASSWORD-EXPIRY-GRACE = 45 DAYS AFTER-EXPIRATION Configuring SAFEGUARDGlobal Settings - Password
WARNING-MODE = OFF WARNING-FALLBACK-SECURITY = GUARDIAN Configuring SAFEGUARDGlobal Settings - WarningMode
DIRECTION-DEVICE = DEVICE-FIRST CHECK-DEVICE = ON COMBINATION-DEVICE = FIRST-ACL CHECK-SUBDEVICE = ON ACL-REQUIRED-DEVICE = OFF Configuring SAFEGUARDGlobal Settings - Device
DIRECTION-PROCESS = PROCESS-FIRST CHECK-PROCESS = ON COMBINATION-PROCESS = FIRST-ACL CHECK-SUBPROCESS = ON ACL-REQUIRED-PROCESS = OFF Configuring SAFEGUARDGlobal Settings - Process
DIRECTION-DISKFILE = FILENAME-FIRST CHECK-VOLUME = OFF COMBINATION-DISKFILE = FIRST-ACL CHECK-SUBVOLUME = ON ACL-REQUIRED-DISKFILE = OFF CHECK-FILENAME = ON CLEARONPURGE-DISKFILE = OFF Configuring SAFEGUARDGlobal Settings – Disk File
Configuring SAFEGUARDGlobal Settings – ACL Eval. These are my favorite settings!
These settings allow:- an easy understanding of ACLs- A clear structure- Protection against non allowed file and subvol creates Configuring SAFEGUARDGlobal Settings – ACL Eval.
AUDIT-OBJECT-ACCESS-PASS = NONE AUDIT-AUTHENTICATE-PASS = ALL AUDIT-OBJECT-ACCESS-FAIL = NONE AUDIT-AUTHENTICATE-FAIL = ALL AUDIT-OBJECT-MANAGE-PASS = ALL AUDIT-SUBJECT-MANAGE-PASS = ALL AUDIT-OBJECT-MANAGE-FAIL = All AUDIT-SUBJECT-MANAGE-FAIL = ALL AUDIT-DEVICE-ACCESS-PASS = NONE AUDIT-PROCESS-ACCESS-PASS = NONE AUDIT-DEVICE-ACCESS-FAIL = NONE AUDIT-PROCESS-ACCESS-FAIL = NONE AUDIT-DEVICE-MANAGE-PASS = ALL AUDIT-PROCESS-MANAGE-PASS = ALL AUDIT-DEVICE-MANAGE-FAIL = ALL AUDIT-PROCESS-MANAGE-FAIL = ALL AUDIT-DISKFILE-ACCESS-PASS = NONE AUDIT-DISKFILE-ACCESS-FAIL = NONE AUDIT-DISKFILE-MANAGE-PASS = ALL AUDIT-DISKFILE-MANAGE-FAIL = ALL Auditing can be configured on an individual object basis as well! Configuring SAFEGUARDGlobal Settings – Auditing
AUDIT-CLIENT-SERVICE = ON Configuring SAFEGUARDGlobal Settings – Audit Client
CI-PROG = $SYSTEM.SYSTEM.TACL CMON = OFF CI-LIB = * NONE * CMONERROR = ACCEPT CI-SWAP = * NONE * CMONTIMEOUT = 1 SECONDS CI-CPU = ANY BLINDLOGON = ON CI-PRI = 149 NAMELOGON = ON CI-PARAM-TEXT = Configuring SAFEGUARDGlobal Settings – CI
TERMINAL-EXCLUSIVE-ACCESS = OFF Configuring SAFEGUARDGlobal Settings – Terminal
It does make sense to have ACLs onapplication, SPOOLER and PATHWAY- (Sub-)Processes- Disk Files (file, subvol, volume) Do NOT put ACLs on SPI interfaces Do NOT secure the SAFEGUARD SPI interface!!! Configuring SAFEGUARDAccess Control Lists
I don’t know of DEVICES to be secured, except- X.25 lines- tape drives Use the highest possible level to minimize number of ACLs Configuring SAFEGUARDAccess Control Lists
Introduction of Terminals does make sense only with fixed named terminals. All other terminal types should use: $SYSTEM.SYSTEM.LOGONas initial resource, or service (IP) Configuring SAFEGUARDAccess Control Lists
Initial Command Interpreter- Requires a SAFEGUARD controlled terminal- Can be defined - on the User (first check) - on the Terminal (next check) - globally (last check) Configuring SAFEGUARDInitial Command Interpreter
Benefits:- A LOGON starts a pre-defined resource- the password handling can be done at logon time- LOGON- as well as LOGOFF-events are recorded Configuring SAFEGUARD Initial Command Interpreter
Never ever change global SAFEGUARD settings ‘on the fly’, or for test purposes:You for sure end up in big trouble! All that needs maintenance is:- Users (add, delete, alter)- ACLs (add, delete, alter)- Possibly Audit file sizes and locations- Rarely management rights Maintaining SAFEGUARD
Have a plan (Security Policy) in place BEFORE you start Relate security functions to persons Make a plan to run and configure SAFEGUARD Check audit information – at least keep it for some time (…for a post mortal analysis) Conclusion
Most important:Educate your employees!Not about security products, but about security as a method, and why you are going to use it! Conclusion