Fact or Fiction: IBM i has Never Been Hacked

32
Fact or Fiction: IBM i has Never Been Hacked Carol Woodbury VP of Global Security Services

Transcript of Fact or Fiction: IBM i has Never Been Hacked

FactorFiction:IBMihasNeverBeenHacked

Carol WoodburyVP of Global Security

Services

Agenda– BringingRealitytotheSituation

WhyareWeTalkingAboutThis?

An“AS/400”washacked– asdocumentedinthearticle,“smokeontheWater[plant]inthe“DataBreachDigest”fromVerizon.

WhatHappened?

Ahackerwasabletomakeuseofaknownvulnerabilityinthepayment(creditcard)software

Over2.5millionrecordswereexfiltrated

TheAS/400administrator’suseridandpasswordwerestoredincleartext(anddiscovered)inan.inifileonawebserverrunningontheAS/400.ThesewereusedtogainaccesstotheSupervisoryControlandDataAcquisition(SCADA)applicationwhichcontrolsthecommunity’swatersupply.

Themixtureofchemicalsgoingintothewatersupplywasmanipulated,affectingtimestoreplenishwatersupplies

Nonetworksegmentationexisted.Theorganization’sAS/400wasdirectlyattachedtotheInternetandtheinternalnetworkwasexposed.

Others

CalltheFBIoryourcountry’sinvestigativebranch!

WasthisIncidentaFailureofAS/400,iSeries,IBMi?

“IThoughtWeWereAlreadySecure!”

IBM i has a well-deserved reputation as one of the most securable operating systems available.

But, securable does not imply you simply plug in the system and take no further action.

It takes a joint effort by:IBM (who supplies the OS),Your software vendors (who supply the application),And YOU (who has ultimate responsibility for the server and data)

Securable Secure

So,whatwastheCause?

Failureto:UsethefeaturesreadilyavailableinIBMiFollowanysortofsecurity‘bestpractices’

Thewrite-upclearlypointedoutthatthesingleAS/400administratormadenoconsiderationforthesecurityimplicationsoftheconfigurationsettingschosen

KeepapplicationspatchedUsecommonsense!

TypesofHackers

Drive-byExploitingknownvulnerabilitiesTargetedattack

Nation-state,Professionalhackers,Hackivists

SecurityIncidentsbyAttackType,Time,&Impact

https://www.ibm.com/security/xforce/xfisi/

PonemonInstitute– 2016CostofInsiderThreats

ThreetypesofinsiderthreatsAcarelessornegligentemployeeorcontractorAcriminalormaliciousinsiderAcredentialthief

2016CostofInsiderThreats– Interestingfacts

Totalnumberofbenchmarkedorganizations– 54Totalnumberofinsiderincidents– 874Percentagebytype:

Negligence- 68%(averageperincident$206,933)Criminalinsider– 22%(averagecostperincident$347,130)Credentialtheft– 10%(averagecostperincident$493,093)

HelpSystemsCorporateOverview.Allrightsreserved.

ExamplesofMisconfigurationfromtheIBMiworld

ModifiedIBMiProfiles

AdditionalspecialauthoritiesareoftengrantedtoIBMi-providedprofiles:QSYSOPRQUSERQPGMR

Orprivateauthoritiesaregrantedor*PUBLICauthorityischangedto*USEorgranter.

IBMi-suppliedProfileswithaPassword

IBMi-suppliedprofileshaveshippedwithoutapasswordformany,manyyears.WhileQSECOFRmusthaveapassword,theothersshouldnot.Well-knownprofiles:QUSERQSYSOPRQSRVQSRVBASQPGMR

New*ALLOBJProfiles

Nomonitoringorrecognition/approvalofnewprofileswith*ALLOBJ(andotherspecialauthorities)ServiceaccountsCopiedprofilesVendorprofiles

Takecontrolofvendoraccess!

DefaultPasswords

PasswordsthesameastheuserprofilenameProfilecreationprocessServiceaccountsVendorprofilesNopasswordrules

Specify:QPWDRULESandinclude*LMTPRFNAMEand*ALLCRTCHG(V7R2)

ServiceAccounts

Serviceaccountsareoftenautomaticallycreatedwith*ALLOBJ(andoften,allspecialauthorities)becausenooneissurewhatauthorityisrequired.InV7R3,usetheauthoritycollectionfunctiontodeterminetheauthorityrequired.Inpriorreleases,maketheserviceaccountamemberoftheapplicationowningprofileifitneeds*ALLauthoritytoapplicationobjects

Thisisabetteroptionthangrantingtheserviceaccount*ALLOBJspecialauthority.

DeviceTime-out

Nodevicetime-outimplemented

DevelopmentNotSecuredLikeProduction

Whetherauditorslikeit(ornot)productiondataoftenresidesonDevelopmentLPARs.DevelopmentisrarelysecuredthesameasProduction

Developersoftenhave*ALLOBJObjectauthoritiesrarelymatch

OptionsRCACtomaskthedata(V7R2)

http://www.redbooks.ibm.com/redpieces/pdfs/redp5110.pdfFIELDPROCtoencryptthecolumn(V7R1)

LinomaCryto Complete

TestingWithoutConsiderationtoSecurity

Testingnewfunctionwithoutsecurityinmindthenscaredtochangetheprofilewhenmovingintoproduction(especiallywithdeadlineslooming.)Testprofileswilloftenhavetoomuchauthority– justifiedbecauseyouneedtofirstgettheapplicationtowork– thenyou’llthinkaboutsecurity

Whendoesthathappen….?

AuthoritiesLeftAfterDebuggingaFailure

Failuresareoftenattributedtoan“authorityproblem.”Authoritiesgetaddedtodebugaproblemandneverremovedwhenitprovesnottobetheproblem.

*ALLOBJisadded*PUBLICauthorityisopenedupAuthoritiesareaddedtoanauthorizationlist

Sharesto/rootorQSYS.LIB

Sharing/rootsharesQSYS.LIB

/QSYS.LIBcontainsalllibrariesonthesystem.

NotPatchingKnownVulnerabilities

Integrity/SecurityPTFsJavagroupPTFsAnythingtodowithOpenSourceMovingfromSSLtoTLS1.2

UnencryptedSessions

FTPODBCDDMTelnetPassthruSNAconnections

User:CJWPwd:cjw

Salary:CJWSSN:123-11-1234

Think‘Sniffing’Doesn’tHappen…?

Thenyouhaven’tmetthisguy

ToCombatCredentialSniffing

EncryptsessionsUseMFA(Multi-factorauthentication)

WebApplicationsRunningonIBMi

Impressionthatcommonexposurescan’toccuronIBMiorbestpracticesforwebprogrammingdon’tapply.

Fiction!

DoAnyofTheseSituationsApplytoYourOrganization?

Ifso,arethesecuritycontrolsyouhaveinplacesufficienttoprotectthedataandprocessestheorganizationdependson?

SecurityControls

Valueofthedatatoyourorganization

HelpSystems’Solution-BasedApproach

DataSecurityLifeCycle

Questions?

www.helpsystems.com/professional-security-serviceswww.helpsystems.com

800-328-1000 | [email protected]