Developing Legacy Platform Security - San Francisco...

57
Philip Young, Information Security Specialist, Visa, Inc. Professional Techniques – T21 Developing Legacy Platform Security

Transcript of Developing Legacy Platform Security - San Francisco...

Page 1: Developing Legacy Platform Security - San Francisco …sfisaca.org/images/FC14Presentations/T21.pdf · 2014-10-06 · Developing Legacy Platform Security . 2 2014 Fall Conference

Philip Young, Information Security Specialist, Visa, Inc.

Professional Techniques – T21

Developing Legacy Platform Security

Page 2: Developing Legacy Platform Security - San Francisco …sfisaca.org/images/FC14Presentations/T21.pdf · 2014-10-06 · Developing Legacy Platform Security . 2 2014 Fall Conference

2 2 2014 Fall Conference - "Think Big“

October 13-15, 2014

About Me

• Philip Young

• Always interested in IT security

• Started with Audit

– Ernst & Young 2005 to 2008

– Grant Thornton 2008 to 2009

– Visa Inc. 2009 to 2013

• Transitioned to IT Security

– August 2013

– Brought in to lead Legacy System Security

Page 3: Developing Legacy Platform Security - San Francisco …sfisaca.org/images/FC14Presentations/T21.pdf · 2014-10-06 · Developing Legacy Platform Security . 2 2014 Fall Conference

3 3 2014 Fall Conference - "Think Big“

October 13-15, 2014

About Me

• Started researching

Mainframe Security

• Identified lack of

discussion and

awareness of these

systems publicly

• Recognized knowledge

gaps

Page 4: Developing Legacy Platform Security - San Francisco …sfisaca.org/images/FC14Presentations/T21.pdf · 2014-10-06 · Developing Legacy Platform Security . 2 2014 Fall Conference

4 4 2014 Fall Conference - "Think Big“

October 13-15, 2014

Spoken

Page 5: Developing Legacy Platform Security - San Francisco …sfisaca.org/images/FC14Presentations/T21.pdf · 2014-10-06 · Developing Legacy Platform Security . 2 2014 Fall Conference

Legacy?

Page 6: Developing Legacy Platform Security - San Francisco …sfisaca.org/images/FC14Presentations/T21.pdf · 2014-10-06 · Developing Legacy Platform Security . 2 2014 Fall Conference

6 2014 Fall Conference - "Think Big“

October 13-15, 2014 6

What comes to mind?

When you think legacy…

Page 7: Developing Legacy Platform Security - San Francisco …sfisaca.org/images/FC14Presentations/T21.pdf · 2014-10-06 · Developing Legacy Platform Security . 2 2014 Fall Conference

7 7 2014 Fall Conference - "Think Big“

October 13-15, 2014

Page 8: Developing Legacy Platform Security - San Francisco …sfisaca.org/images/FC14Presentations/T21.pdf · 2014-10-06 · Developing Legacy Platform Security . 2 2014 Fall Conference

8 8 2014 Fall Conference - "Think Big“

October 13-15, 2014

Page 9: Developing Legacy Platform Security - San Francisco …sfisaca.org/images/FC14Presentations/T21.pdf · 2014-10-06 · Developing Legacy Platform Security . 2 2014 Fall Conference

9 9 2014 Fall Conference - "Think Big“

October 13-15, 2014

Page 10: Developing Legacy Platform Security - San Francisco …sfisaca.org/images/FC14Presentations/T21.pdf · 2014-10-06 · Developing Legacy Platform Security . 2 2014 Fall Conference

10 10 2014 Fall Conference - "Think Big“

October 13-15, 2014

Page 11: Developing Legacy Platform Security - San Francisco …sfisaca.org/images/FC14Presentations/T21.pdf · 2014-10-06 · Developing Legacy Platform Security . 2 2014 Fall Conference

11 11 2014 Fall Conference - "Think Big“

October 13-15, 2014

Page 12: Developing Legacy Platform Security - San Francisco …sfisaca.org/images/FC14Presentations/T21.pdf · 2014-10-06 · Developing Legacy Platform Security . 2 2014 Fall Conference

12 12 2014 Fall Conference - "Think Big“

October 13-15, 2014

Page 13: Developing Legacy Platform Security - San Francisco …sfisaca.org/images/FC14Presentations/T21.pdf · 2014-10-06 · Developing Legacy Platform Security . 2 2014 Fall Conference

13 13 2014 Fall Conference - "Think Big“

October 13-15, 2014

Page 14: Developing Legacy Platform Security - San Francisco …sfisaca.org/images/FC14Presentations/T21.pdf · 2014-10-06 · Developing Legacy Platform Security . 2 2014 Fall Conference

14 14 2014 Fall Conference - "Think Big“

October 13-15, 2014

Legacy Terminology

Does your policy specifically outline

‘Legacy’?

–Exception to your policy for these

systems?

Should you have one in the first place?

–A blanket policy puts you at risk

Page 15: Developing Legacy Platform Security - San Francisco …sfisaca.org/images/FC14Presentations/T21.pdf · 2014-10-06 · Developing Legacy Platform Security . 2 2014 Fall Conference

15 15 2014 Fall Conference - "Think Big“

October 13-15, 2014

Risks with Legacy Platforms

• Lack of institutional knowledge

– Audit/IS may lack requisite knowledge to

adequately assess these systems

– Brain Drain of qualified individuals

• No clear security requirements

• Assumed Secure by enterprise

Page 16: Developing Legacy Platform Security - San Francisco …sfisaca.org/images/FC14Presentations/T21.pdf · 2014-10-06 · Developing Legacy Platform Security . 2 2014 Fall Conference

16 16 2014 Fall Conference - "Think Big“

October 13-15, 2014

Page 17: Developing Legacy Platform Security - San Francisco …sfisaca.org/images/FC14Presentations/T21.pdf · 2014-10-06 · Developing Legacy Platform Security . 2 2014 Fall Conference

17 17 2014 Fall Conference - "Think Big“

October 13-15, 2014

Page 18: Developing Legacy Platform Security - San Francisco …sfisaca.org/images/FC14Presentations/T21.pdf · 2014-10-06 · Developing Legacy Platform Security . 2 2014 Fall Conference

18 18 2014 Fall Conference - "Think Big“

October 13-15, 2014

Interesting Factoids

That’s me!

Page 19: Developing Legacy Platform Security - San Francisco …sfisaca.org/images/FC14Presentations/T21.pdf · 2014-10-06 · Developing Legacy Platform Security . 2 2014 Fall Conference

19 19 2014 Fall Conference - "Think Big“

October 13-15, 2014

Key Activities

• Understand the Operating System

– Know the OS like you know Windows/Linux

• Develop Security Requirements

– Baseline against these requirements

• Integrate in to Standard Information Security

(IS) Policies

– Patching

– Logging/Monitoring

– Configuration Compliance

Page 20: Developing Legacy Platform Security - San Francisco …sfisaca.org/images/FC14Presentations/T21.pdf · 2014-10-06 · Developing Legacy Platform Security . 2 2014 Fall Conference

Mainframe OS: z/OS

Page 21: Developing Legacy Platform Security - San Francisco …sfisaca.org/images/FC14Presentations/T21.pdf · 2014-10-06 · Developing Legacy Platform Security . 2 2014 Fall Conference

21 21 2014 Fall Conference - "Think Big“

October 13-15, 2014

z/OS

• Primary mainframe OS

– Used by 90% Fortune 100 organizations

• Current version:

– z/OS V2R1 – Released this year

Page 22: Developing Legacy Platform Security - San Francisco …sfisaca.org/images/FC14Presentations/T21.pdf · 2014-10-06 · Developing Legacy Platform Security . 2 2014 Fall Conference

22 22 2014 Fall Conference - "Think Big“

October 13-15, 2014

Brain Drain

Page 23: Developing Legacy Platform Security - San Francisco …sfisaca.org/images/FC14Presentations/T21.pdf · 2014-10-06 · Developing Legacy Platform Security . 2 2014 Fall Conference

23 23 2014 Fall Conference - "Think Big“

October 13-15, 2014

Brain Drain

RACF Security administrators under 50

RACF Security Administrators over 50

www.rshconsulting.com/surveys/RSH_Consulting__RACF_Survey_014__Age_RACF-L_Participants.pdf

Page 24: Developing Legacy Platform Security - San Francisco …sfisaca.org/images/FC14Presentations/T21.pdf · 2014-10-06 · Developing Legacy Platform Security . 2 2014 Fall Conference

24 24 2014 Fall Conference - "Think Big“

October 13-15, 2014

Training/Access

• Very difficult to come by

• z/OS has 11,000 pages worth of documents

you can read!

– Entire books dedicated to RACF, let alone

underlying operating system.

– Very few in-person or online training for auditors

or security professionals

Page 25: Developing Legacy Platform Security - San Francisco …sfisaca.org/images/FC14Presentations/T21.pdf · 2014-10-06 · Developing Legacy Platform Security . 2 2014 Fall Conference

25 25 2014 Fall Conference - "Think Big“

October 13-15, 2014

Training: Master the Mainframe

• Teaches coding/developments and operating

system concepts

• Only covers development work

• No IT Security or Audit focus

Page 26: Developing Legacy Platform Security - San Francisco …sfisaca.org/images/FC14Presentations/T21.pdf · 2014-10-06 · Developing Legacy Platform Security . 2 2014 Fall Conference

26 26 2014 Fall Conference - "Think Big“

October 13-15, 2014

Understand z/OS

Uses LPARs and TSOs; DATASETs

and OMVSes; TN3270s and

RACFs; JCLs and APFs

Any Questions?

Page 27: Developing Legacy Platform Security - San Francisco …sfisaca.org/images/FC14Presentations/T21.pdf · 2014-10-06 · Developing Legacy Platform Security . 2 2014 Fall Conference

27 27 2014 Fall Conference - "Think Big“

October 13-15, 2014

LPAR

• Logical PARtition = VM

• The mainframe hardware can be

partitioned to run multiple

instances

–I.E. SYS1 & VM9 are what you

might name your LPARs

Page 28: Developing Legacy Platform Security - San Francisco …sfisaca.org/images/FC14Presentations/T21.pdf · 2014-10-06 · Developing Legacy Platform Security . 2 2014 Fall Conference

28 28 2014 Fall Conference - "Think Big“

October 13-15, 2014

TSO

• Time Sharing Option

• Command Prompt, primary interface in to

z/OS

• Looks like this:

READY

Page 29: Developing Legacy Platform Security - San Francisco …sfisaca.org/images/FC14Presentations/T21.pdf · 2014-10-06 · Developing Legacy Platform Security . 2 2014 Fall Conference

29 29 2014 Fall Conference - "Think Big“

October 13-15, 2014

Page 30: Developing Legacy Platform Security - San Francisco …sfisaca.org/images/FC14Presentations/T21.pdf · 2014-10-06 · Developing Legacy Platform Security . 2 2014 Fall Conference

30 30 2014 Fall Conference - "Think Big“

October 13-15, 2014

Page 31: Developing Legacy Platform Security - San Francisco …sfisaca.org/images/FC14Presentations/T21.pdf · 2014-10-06 · Developing Legacy Platform Security . 2 2014 Fall Conference

31 31 2014 Fall Conference - "Think Big“

October 13-15, 2014

Datasets

• No ‘FILES’ on the mainframe just DATASETS

• Starts with an High Level Qualifier then

remaining ‘qualifiers’

SoF.SSN2012.FTP.LOG

HLQ Remaining ‘Qualifiers’

Page 32: Developing Legacy Platform Security - San Francisco …sfisaca.org/images/FC14Presentations/T21.pdf · 2014-10-06 · Developing Legacy Platform Security . 2 2014 Fall Conference

32 32 2014 Fall Conference - "Think Big“

October 13-15, 2014

OMVS

• Open Multiple Virtual Storage

• Aka UNIX, a required component of the

OS

• Required for certain activities:

–Networking

– FTP

–Web Services

Page 33: Developing Legacy Platform Security - San Francisco …sfisaca.org/images/FC14Presentations/T21.pdf · 2014-10-06 · Developing Legacy Platform Security . 2 2014 Fall Conference

33 33 2014 Fall Conference - "Think Big“

October 13-15, 2014

Page 34: Developing Legacy Platform Security - San Francisco …sfisaca.org/images/FC14Presentations/T21.pdf · 2014-10-06 · Developing Legacy Platform Security . 2 2014 Fall Conference

34 34 2014 Fall Conference - "Think Big“

October 13-15, 2014

TN3270

• Telnet console used to access z/OS

• An extension on Telnet

–And therefore ‘clear text’

–Technically in EBCDIC

• Can support SSL encryption!

Page 35: Developing Legacy Platform Security - San Francisco …sfisaca.org/images/FC14Presentations/T21.pdf · 2014-10-06 · Developing Legacy Platform Security . 2 2014 Fall Conference

35 35 2014 Fall Conference - "Think Big“

October 13-15, 2014

Page 36: Developing Legacy Platform Security - San Francisco …sfisaca.org/images/FC14Presentations/T21.pdf · 2014-10-06 · Developing Legacy Platform Security . 2 2014 Fall Conference

36 36 2014 Fall Conference - "Think Big“

October 13-15, 2014

RACF

• Resource Access Control Facility – By IBM

• Manages all access right provisioning across

the entire operating system

• One dataset contains all security information!

• Also contains usernames and password hashes

• Can be replaced by ACF2/TS – Access Control Facility 2 (Computer Associates)

– Top Secret (Computer Associates)

Page 37: Developing Legacy Platform Security - San Francisco …sfisaca.org/images/FC14Presentations/T21.pdf · 2014-10-06 · Developing Legacy Platform Security . 2 2014 Fall Conference

37 37 2014 Fall Conference - "Think Big“

October 13-15, 2014

JCL

• Job Control Language

• Primary interface to submitting commands

– Input Queue

– Output Queue

Page 38: Developing Legacy Platform Security - San Francisco …sfisaca.org/images/FC14Presentations/T21.pdf · 2014-10-06 · Developing Legacy Platform Security . 2 2014 Fall Conference

38 38 2014 Fall Conference - "Think Big“

October 13-15, 2014

JOB CARD

Program

Parameters

Typo

Page 39: Developing Legacy Platform Security - San Francisco …sfisaca.org/images/FC14Presentations/T21.pdf · 2014-10-06 · Developing Legacy Platform Security . 2 2014 Fall Conference

39 39 2014 Fall Conference - "Think Big“

October 13-15, 2014

APF

• Authorized Program Facility

• Programs with this defined can bypass

memory access restrictions

– Bypass RACF

– Access restricted files/actions

Page 40: Developing Legacy Platform Security - San Francisco …sfisaca.org/images/FC14Presentations/T21.pdf · 2014-10-06 · Developing Legacy Platform Security . 2 2014 Fall Conference

40 40 2014 Fall Conference - "Think Big“

October 13-15, 2014

Many Many More

• I could spend months on z/OS

• Get access yourself!

–Leverage z/OS RDz&T program

–Get access to your development

mainframes

• These systems are accessible and

available

Page 41: Developing Legacy Platform Security - San Francisco …sfisaca.org/images/FC14Presentations/T21.pdf · 2014-10-06 · Developing Legacy Platform Security . 2 2014 Fall Conference

Build z/OS Requirements

Page 42: Developing Legacy Platform Security - San Francisco …sfisaca.org/images/FC14Presentations/T21.pdf · 2014-10-06 · Developing Legacy Platform Security . 2 2014 Fall Conference

42 42 2014 Fall Conference - "Think Big“

October 13-15, 2014

Using Standards

No single all encompassing guide

• ISACA: A good guide exists, yet it is

incomplete (doesn’t cover OMVS). Other

guides exists but are from 2003

• NIST: No z/OS guides exists

• SANS: RACF and ACF2 guides exists but do

not cover the rest of the operating systems

Page 43: Developing Legacy Platform Security - San Francisco …sfisaca.org/images/FC14Presentations/T21.pdf · 2014-10-06 · Developing Legacy Platform Security . 2 2014 Fall Conference

43 43 2014 Fall Conference - "Think Big“

October 13-15, 2014

Best Available

z/OS DOD DISA STIG

–Department of Defense (DoD)

– Defense Information Systems Agency (DISA)

– Security Technology Implementation Guide (STIG)

•Created for z/OS!

–Covers UNIX

–Covers TCP/IP

–Covers TSO

–Cover RACF/ACF2/TopSecret

Page 44: Developing Legacy Platform Security - San Francisco …sfisaca.org/images/FC14Presentations/T21.pdf · 2014-10-06 · Developing Legacy Platform Security . 2 2014 Fall Conference

44 44 2014 Fall Conference - "Think Big“

October 13-15, 2014

However…

• Controls are too detailed

• Covers areas not applicable to

enterprises

• DoD specific software/items

• Requires Customization

It’s manageable, only 300+ controls!

Page 45: Developing Legacy Platform Security - San Francisco …sfisaca.org/images/FC14Presentations/T21.pdf · 2014-10-06 · Developing Legacy Platform Security . 2 2014 Fall Conference

45 45 2014 Fall Conference - "Think Big“

October 13-15, 2014

Develop New Security Requirements

• Use DoD STIG to develop current security

requirements

– Document any/all deviations

• Review with Subject Matter Experts

– Conduct baseline against current configuration

• Establish realistic implementation timelines

– Certain controls may have significant impact on

system resources

– i.e. implementing SYSLOG may impact storage,

networking, etc.

Page 46: Developing Legacy Platform Security - San Francisco …sfisaca.org/images/FC14Presentations/T21.pdf · 2014-10-06 · Developing Legacy Platform Security . 2 2014 Fall Conference

46 46 2014 Fall Conference - "Think Big“

October 13-15, 2014

Implement Automation

• Automate configuration compliance review

• zSecure (IBM) and Vanguard both support

automated control testing based on the DoD

STIG.

• Report and follow-up on any deviations from

the standard

Page 47: Developing Legacy Platform Security - San Francisco …sfisaca.org/images/FC14Presentations/T21.pdf · 2014-10-06 · Developing Legacy Platform Security . 2 2014 Fall Conference

Integrate in to Standard IS Processes

Page 48: Developing Legacy Platform Security - San Francisco …sfisaca.org/images/FC14Presentations/T21.pdf · 2014-10-06 · Developing Legacy Platform Security . 2 2014 Fall Conference

48 48 2014 Fall Conference - "Think Big“

October 13-15, 2014

Integrating

• Include mainframe systems in standard IS

processes, including:

– Deviation from established Security Requirements

– Logging and Monitoring (SIEM)

– Patching

– Vulnerability Scanning

– Penetration Testing

– Application Source Code Review

Page 49: Developing Legacy Platform Security - San Francisco …sfisaca.org/images/FC14Presentations/T21.pdf · 2014-10-06 · Developing Legacy Platform Security . 2 2014 Fall Conference

49 49 2014 Fall Conference - "Think Big“

October 13-15, 2014

Deviation

• New requirement published and effective

• Any system which cannot meet the current

requirements must have a documented

rationale for not following the requirements

• Including:

– Risk Mitigation

– Timeline to meet standard

Page 50: Developing Legacy Platform Security - San Francisco …sfisaca.org/images/FC14Presentations/T21.pdf · 2014-10-06 · Developing Legacy Platform Security . 2 2014 Fall Conference

50 50 2014 Fall Conference - "Think Big“

October 13-15, 2014

Logging and Monitoring

• z/OS uses SMF and SYSLOG for system

logging

• Export data to SIEM for central monitoring

– SMF can be exported on a periodic basis or sent in

real time with IBM products

– SYSLOG data can be sent to central syslog servers

Page 51: Developing Legacy Platform Security - San Francisco …sfisaca.org/images/FC14Presentations/T21.pdf · 2014-10-06 · Developing Legacy Platform Security . 2 2014 Fall Conference

51 51 2014 Fall Conference - "Think Big“

October 13-15, 2014

Logging and Monitoring

• Setup appropriate alerting based on the

platform.

• z/OS Example:

– Changes to z/OS configuration datasets

– Access to development code

– JCL sent through FTP

– TSO brute force attempts

– Opening of ports

– Disabling dataset auditing/syslog

etc

Page 52: Developing Legacy Platform Security - San Francisco …sfisaca.org/images/FC14Presentations/T21.pdf · 2014-10-06 · Developing Legacy Platform Security . 2 2014 Fall Conference

52 52 2014 Fall Conference - "Think Big“

October 13-15, 2014

Patching

• Ensure patching follows standard

enterprise patching procedures

• z/OS:

–APARs are released as they are made

applicable to your environment

– Follow your standard patching requirements

to ensure z/OS patches are installed in a

timely manner

Page 53: Developing Legacy Platform Security - San Francisco …sfisaca.org/images/FC14Presentations/T21.pdf · 2014-10-06 · Developing Legacy Platform Security . 2 2014 Fall Conference

53 53 2014 Fall Conference - "Think Big“

October 13-15, 2014

Vulnerability Scanning/Pen Test

• Typically Excluded from these scans/testing

• If production is too fragile test against

development and QA environments

• Vulnerability scanning will only identify

common issues. Likely not z/OS specific issues

• Penetration Testing with properly trained

individuals will!

Page 54: Developing Legacy Platform Security - San Francisco …sfisaca.org/images/FC14Presentations/T21.pdf · 2014-10-06 · Developing Legacy Platform Security . 2 2014 Fall Conference

54 54 2014 Fall Conference - "Think Big“

October 13-15, 2014

Application Source Code Review

• Ensure Mainframe application follow standard

Secure Software Development Lifecycle

(SSDLC) program

– Despite being developed prior to SSDLC

critical/core application MUST be reviewed

• Foreign architecture may pose challenging

– Manual review required

– Current tools (e.g. Veracode) do not support most

mainframe code types

Page 55: Developing Legacy Platform Security - San Francisco …sfisaca.org/images/FC14Presentations/T21.pdf · 2014-10-06 · Developing Legacy Platform Security . 2 2014 Fall Conference

Wrapping Up

Page 56: Developing Legacy Platform Security - San Francisco …sfisaca.org/images/FC14Presentations/T21.pdf · 2014-10-06 · Developing Legacy Platform Security . 2 2014 Fall Conference

56 56 2014 Fall Conference - "Think Big“

October 13-15, 2014

It Takes Time

• If you’re starting from scratch it will take years

– Dealing with politics/entrenched processes

– Lack of documentation

– Organic growth over decades

• Patience and perseverance is key

• You won’t get it right the first time

– These systems are complex, you will miss things

on your first pass

Page 57: Developing Legacy Platform Security - San Francisco …sfisaca.org/images/FC14Presentations/T21.pdf · 2014-10-06 · Developing Legacy Platform Security . 2 2014 Fall Conference

57 57 2014 Fall Conference - "Think Big“

October 13-15, 2014

Questions?