Share 2015 - 5 Myths that can put your Mainframe at risk (v1.3)

Rui Miguel Feio
Rui Miguel FeioSenior Technical Lead at RSM Partners
5	
  Myths	
  That	
  Can	
  Put	
  Your	
  Mainframe	
  
At	
  Risk	
  
Rui	
  Miguel	
  Feio	
  
Security	
  Lead	
  
RSM	
  Partners	
  
Agenda	
  
•  Introduc.on	
  
•  Myth	
  #1	
  –	
  The	
  mainframe	
  is	
  dead	
  
•  Myth	
  #2	
  –	
  No	
  one	
  hacks	
  the	
  mainframe	
  
•  Myth	
  #3	
  –	
  The	
  mainframe	
  is	
  isolated	
  from	
  the	
  rest	
  of	
  the	
  world	
  
•  Myth	
  #4	
  –	
  “We	
  don’t	
  use	
  Unix	
  System	
  Services”	
  
•  Myth	
  #5	
  –	
  Outsourcing	
  will	
  solve	
  all	
  the	
  problems	
  
•  Ques.ons	
  
Introduc.on	
  
•  Rui	
  Miguel	
  Feio	
  
–  Security	
  lead	
  at	
  RSM	
  Partners	
  (UK)	
  
–  I	
  am	
  a	
  mainframe	
  technician	
  specialising	
  in	
  mainframe	
  security	
  
–  Experience	
  in	
  other	
  plaUorms	
  as	
  well	
  
–  I	
  have	
  been	
  working	
  with	
  mainframes	
  for	
  the	
  past	
  16	
  years	
  
–  Happy	
  to	
  take	
  ques.ons	
  as	
  we	
  go	
  
Myth	
  #1	
  
The	
  mainframe	
  is	
  dead	
  
•  Since	
  the	
  advent	
  of	
  the	
  PC	
  in	
  the	
  1980’s	
  the	
  mainframe	
  has	
  been	
  
set	
  for	
  ex.nc.on.	
  
•  “The	
  PC	
  is	
  now	
  as	
  powerful	
  as	
  a	
  mainframe!”	
  
•  Only	
  ‘old’	
  people	
  know	
  about	
  mainframes.	
  
Myth	
  #1	
  
•  IBM	
  keeps	
  bringing	
  out	
  new	
  mainframes:	
  
•  z13	
  –	
  Jan	
  2015	
  
•  zEnterprise	
  BC12	
  (zBC12)	
  –	
  Jul	
  2013	
  
•  zEnterprise	
  EC12	
  (zEC12)	
  –	
  Aug	
  2012	
  
•  zEnterprise	
  114	
  (z114)	
  –	
  Jul	
  2011	
  
•  zEnterprise	
  196	
  (z196)	
  –	
  Jul	
  2010	
  
•  z10	
  Enterprise	
  Class	
  (EC)	
  –	
  Feb	
  2008	
  
•  z9	
  Enterprise	
  Class	
  (EC)	
  –	
  Sep	
  2005	
  
•  z890	
  –	
  Apr	
  2004	
  
•  z990	
  –	
  May	
  2003	
  
•  ...	
  
	
  
Myth	
  #1	
  –	
  Some	
  Facts	
  
•  Mainframe	
  as	
  a	
  whole	
  contributes	
  to	
  25%	
  of	
  IBM’s	
  revenue	
  and	
  
35%	
  of	
  its	
  opera.ng	
  profit*	
  
•  96	
  of	
  the	
  world’s	
  top	
  100	
  banks	
  and	
  90%	
  of	
  the	
  world’s	
  largest	
  
insurance	
  companies	
  s.ll	
  use	
  mainframes	
  
•  85%	
  of	
  all	
  mission-­‐cri.cal	
  applica.ons	
  run	
  on	
  COBOL	
  and	
  the	
  
mainframe**	
  
*Toni	
  Sacconaghi	
  of	
  Bernstein	
  Research	
  
**Microfocus	
  
Myth	
  #1	
  –	
  Some	
  Facts	
  
•  Keeping	
  in	
  sync	
  with	
  the	
  new	
  technologies:	
  
–  Enterprise	
  Linux	
  Server:	
  
•  hip://www-­‐03.ibm.com/systems/z/os/linux/els.html	
  
–  Enterprise	
  Cloud	
  Compu.ng:	
  
•  hip://www-­‐03.ibm.com/systems/uk/z/solu.ons/cloud/	
  
–  Enterprise	
  Mobility:	
  
•  hip://www-­‐03.ibm.com/systems/z/solu.ons/mobile.html	
  
–  Enterprise	
  Security:	
  
•  hip://www-­‐03.ibm.com/systems/z/solu.ons/security.html	
  
–  Business	
  Analy.cs	
  and	
  Big	
  Data:	
  
•  hip://www-­‐03.ibm.com/systems/z/solu.ons/data.html	
  
Myth	
  #1	
  –	
  Some	
  Facts	
  
•  Lack	
  of	
  understanding:	
  
–  What	
  the	
  mainframe	
  is	
  and	
  what	
  it	
  can	
  do	
  
•  Lack	
  of	
  investment:	
  
–  New	
  solu.ons	
  for	
  the	
  mainframe	
  
–  Training	
  
•  Lack	
  of	
  resources:	
  
–  Not	
  hiring	
  new	
  resources	
  
–  Replacing	
  exis.ng	
  resources	
  
Myth	
  #1	
  –	
  Leads	
  to	
  Risks	
  
Myth	
  #2	
  
No	
  one	
  hacks	
  the	
  mainframe	
  
•  “The	
  mainframe	
  is	
  the	
  most	
  secure	
  plaUorm	
  in	
  the	
  world”	
  
•  “Who’s	
  gonna	
  hack	
  the	
  mainframe?!?”	
  
•  “You	
  need	
  to	
  be	
  a	
  mainframer	
  to	
  be	
  able	
  to	
  use	
  the	
  mainframe”	
  
Myth	
  #2	
  
•  Although	
  highly	
  securable,	
  the	
  mainframe	
  is	
  not	
  secure	
  by	
  default	
  
•  Like	
  any	
  plaUorm,	
  the	
  mainframe	
  needs	
  to	
  adapt	
  and	
  
security	
  needs	
  to	
  be	
  constantly	
  reviewed	
  
•  People	
  with	
  no	
  mainframe	
  background	
  are	
  geong	
  interested…	
  
•  hip://soldieroffortran.org	
  
•  hip://mainframed767.tumblr.com	
  
Myth	
  #2	
  –	
  Some	
  Facts	
  
•  Guess	
  what?	
  The	
  mainframe	
  can	
  be	
  hacked!	
  
–  Cyber	
  aiack	
  on	
  up	
  to	
  100	
  banks	
  -­‐	
  es.mated	
  $1bn	
  (£648m)	
  in	
  
losses	
  (2015)	
  
–  Swedish	
  Nordea	
  bank	
  –	
  personal	
  data,	
  money	
  (2013)	
  
–  IT	
  firm	
  Logica	
  –	
  more	
  than	
  10,000	
  social	
  security	
  numbers	
  
(2012)	
  
Myth	
  #2	
  –	
  Some	
  Facts	
  
•  Have	
  you	
  considered	
  the	
  ‘inside	
  threat’?	
  
–  Recent	
  case	
  in	
  the	
  UK	
  
–  Senior	
  Applica.ons	
  developer	
  
–  Detailed	
  knowledge	
  of	
  the	
  applica.on	
  
–  Exploited	
  a	
  known	
  security	
  control	
  
–  Defrauded	
  his	
  employer	
  of	
  over	
  £2,000,000!	
  
Myth	
  #2	
  –	
  Some	
  Facts	
  
Security	
  
Risks	
  &	
  
Exposures	
  
Lack	
  of	
  
investment	
  
Lack	
  of	
  
training	
  
Lack	
  of	
  
resources	
  
Lack	
  of	
  
understanding	
  
Too	
  much	
  
confidence	
  
Myth	
  #2	
  –	
  Leads	
  to	
  Risks	
  
Myth	
  #3	
  
The	
  mainframe	
  is	
  isolated	
  
from	
  the	
  rest	
  of	
  the	
  world	
  
•  There	
  is	
  s.ll	
  this	
  idea	
  that	
  the	
  mainframe	
  is	
  independent	
  of	
  
everything	
  else.	
  	
  
•  In	
  a	
  mee.ng	
  discussing	
  security	
  aspects	
  with	
  a	
  director	
  of	
  the	
  
company	
  we’ve	
  men.oned	
  their	
  mainframe.	
  His	
  reac.on	
  was:	
  
–  “Mainframe?	
  What	
  mainframe?”	
  
Myth	
  #3	
  
Guess	
  what?	
  The	
  mainframe	
  is	
  only	
  a	
  piece	
  of	
  the	
  big	
  picture!	
  
Myth	
  #3	
  –	
  Some	
  Facts	
  
•  The	
  mainframe	
  is	
  not	
  isolated!	
  
–  Hackers	
  can	
  target	
  the	
  mainframe	
  directly	
  
–  Hackers	
  can	
  target	
  other	
  devices	
  in	
  the	
  network	
  to	
  get	
  to	
  the	
  
mainframe	
  
–  Beware	
  of	
  IoT	
  and	
  BYOD	
  
•  If	
  you	
  don’t	
  know	
  you	
  have	
  a	
  mainframe	
  then	
  you	
  have	
  a	
  BIG	
  
problem!!	
  	
  
Myth	
  #3	
  –	
  Leads	
  to	
  Risks	
  
Myth	
  #4	
  
“We	
  don’t	
  use	
  Unix	
  System	
  
Services”	
  
•  Again,	
  and	
  again	
  we	
  hear	
  clients	
  saying:	
  
–  “We	
  don’t	
  use	
  Unix	
  System	
  Services”	
  
–  “We	
  don’t	
  need	
  to	
  know	
  Unix	
  System	
  Services”	
  
–  “We	
  don’t	
  need	
  to	
  deal	
  with	
  Unix	
  System	
  Services”	
  
–  “I’m	
  a	
  mainframer!	
  I	
  only	
  deal	
  with	
  MVS!”	
  
Myth	
  #4	
  
•  Unix	
  System	
  Services	
  is	
  part	
  of	
  z/OS	
  whether	
  you	
  like	
  it	
  or	
  not	
  
•  You	
  may	
  not	
  know	
  Unix	
  System	
  Services	
  but	
  you	
  need	
  Unix	
  System	
  
Services!	
  
Myth	
  #4	
  –	
  Some	
  Facts	
  
•  Unix	
  System	
  Services	
  (USS)	
  is	
  used	
  by:	
  
–  TCP/IP	
  
–  DB2	
  
–  CICS	
  
–  IMS	
  
–  Websphere	
  MQ	
  
–  Oracle	
  Web	
  Server	
  
–  …	
  
•  There’s	
  no	
  point	
  in	
  ignoring	
  Unix	
  System	
  Services!!	
  
	
  
Myth	
  #4	
  –	
  Some	
  Facts	
  
•  Ignoring	
  USS	
  doesn’t	
  it	
  make	
  it	
  go	
  away	
  
•  If	
  not	
  properly	
  dealt	
  with	
  USS	
  can	
  be	
  a	
  major	
  security	
  risk	
  
•  Hackers	
  have	
  a	
  deep	
  understanding	
  of	
  Unix.	
  Where	
  do	
  you	
  think	
  
they	
  will	
  start	
  at	
  when	
  trying	
  to	
  hack	
  the	
  mainframe?	
  
Myth	
  #4	
  –	
  Leads	
  to	
  Risks	
  
Myth	
  #5	
  
Outsourcing	
  will	
  solve	
  all	
  
the	
  problems	
  
•  Companies	
  see	
  outsourcing	
  as	
  a	
  way	
  to	
  save	
  money	
  
•  On	
  the	
  other	
  hand	
  outsourcers	
  want	
  to	
  make	
  money	
  
•  Can	
  you	
  see	
  a	
  problem	
  here?	
  
Myth	
  #5	
  
•  ‘Blinded’	
  with	
  the	
  idea	
  of	
  saving	
  money	
  most	
  of	
  the	
  .me	
  a	
  
company:	
  
–  Assumes	
  everything	
  will	
  be	
  covered	
  by	
  the	
  outsource	
  
–  Doesn’t	
  read	
  the	
  the	
  documenta.on	
  provided	
  
–  Does	
  not	
  review	
  their	
  own	
  documents	
  (processes,	
  procedures,	
  
etc)	
  
–  Does	
  not	
  ask	
  pertaining	
  ques.ons	
  	
  
–  Fails	
  to	
  assume	
  responsibility	
  (IT	
  infrastructure	
  has	
  a	
  direct	
  
impact	
  in	
  the	
  business)	
  
Myth	
  #5	
  –	
  Some	
  Facts	
  
•  Most	
  of	
  the	
  .mes	
  the	
  outsourcer	
  will:	
  
–  Provide	
  technical	
  and	
  non-­‐technical	
  documenta.on	
  constructed	
  
with	
  a	
  greater	
  emphasis	
  in	
  legal	
  terms	
  
–  Technical	
  documenta.on	
  does	
  not	
  describe	
  how	
  things	
  are	
  
done	
  (processes	
  and	
  procedures)	
  	
  
–  Allocate	
  the	
  same	
  technical	
  resource	
  to	
  more	
  than	
  one	
  client	
  
–  Charge	
  for	
  every	
  piece	
  of	
  work	
  not	
  covered	
  by	
  the	
  agreement	
  
(remember	
  the	
  lack	
  of	
  processes?)	
  
Myth	
  #5	
  –	
  Some	
  Facts	
  
•  In	
  order	
  to	
  make	
  money	
  the	
  outsourcer	
  will:	
  
-­‐  Save	
  money	
  on	
  training	
  
-­‐  Save	
  money	
  on	
  the	
  technical	
  team:	
  
-­‐  Technical	
  resources	
  shared	
  amongst	
  different	
  clients	
  
-­‐  Reduce	
  the	
  number	
  of	
  technical	
  individuals	
  
-­‐  Replace	
  experienced	
  members	
  by	
  cheaper	
  inexperienced	
  
personnel	
  
-­‐  Only	
  cover	
  the	
  minimum	
  contracted	
  services	
  
-­‐  Charge	
  for	
  any	
  extra	
  service	
  including	
  security	
  
Myth	
  #5	
  –	
  Leads	
  to	
  Risks	
  
•  The	
  company	
  itself	
  s.ll	
  wan.ng	
  to	
  save	
  money:	
  
–  Will	
  only	
  address	
  and	
  pay	
  for	
  what	
  is	
  really	
  required	
  –	
  typically	
  
audit	
  findings	
  
–  Will	
  not	
  review	
  processes	
  (internal	
  and	
  from	
  the	
  outsourcer)	
  
–  Will	
  not	
  review	
  reports	
  with	
  the	
  aien.on	
  they	
  deserve	
  (e.g.	
  
monitoring,	
  aler.ng,	
  access)	
  
–  Risk	
  wise	
  –	
  “We	
  have	
  a	
  mainframe.	
  No	
  one	
  hacks	
  the	
  
mainframe.”	
  
Myth	
  #5	
  –	
  Leads	
  to	
  Risks	
  
Conclusion	
  
Conclusion	
  
•  The	
  mainframe	
  is	
  going	
  nowhere!	
  
•  The	
  mainframe	
  can	
  and	
  has	
  already	
  been	
  hacked!!	
  	
  
•  The	
  mainframe	
  is	
  just	
  another	
  plaUorm	
  of	
  the	
  company’s	
  
ecosystem.	
  
•  Unix	
  System	
  Services	
  is	
  part	
  and	
  in	
  use	
  by	
  the	
  mainframe.	
  Get	
  used	
  
to	
  it!!	
  
•  Outsourcing	
  can	
  be	
  helpful	
  but	
  beware	
  of	
  the	
  piUalls!	
  	
  
Ques.ons	
  
	
  
References	
  &	
  Sources	
  
•  IBM - http://www-03.ibm.com/systems/z/solutions.html
•  Bernstein Research - https://www.bernsteinresearch.com
•  The Economist - http://www.economist.com
•  Bloomberg - http://www.bloomberg.com
•  The New York Times - http://www.nytimes.com
•  Network Computing - http://www.networkcomputing.com
•  Null Space Blog - http://blog.nullspace.io/mainframes.html
•  Wikipedia - http://en.wikipedia.org
•  Microfocus - http://online.microfocus.com/
•  My own blog – http://www.ruifeio.com/
	
  
Rui	
  Miguel	
  Feio	
  
RSM	
  Partners	
  	
  
ruif@rsmpartners.com	
  
mobile:	
  +44	
  (0)	
  7570	
  911459	
  
www.rsmpartners.com	
  
Contact	
  
1 of 35

More Related Content

What's hot(20)

Network and Endpoint Security v1.0 (2017)Network and Endpoint Security v1.0 (2017)
Network and Endpoint Security v1.0 (2017)
Rui Miguel Feio1.5K views
2017 - Data Privacy and GDPR (v1.1)2017 - Data Privacy and GDPR (v1.1)
2017 - Data Privacy and GDPR (v1.1)
Rui Miguel Feio460 views
Keynote at the Cyber Security Summit Prague 2015Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015
Claus Cramon Houmann752 views
Application Security Done RightApplication Security Done Right
Application Security Done Right
pvanwoud1.1K views
Presentation infra and_datacentrre_dialogue_v2Presentation infra and_datacentrre_dialogue_v2
Presentation infra and_datacentrre_dialogue_v2
Claus Cramon Houmann439 views

Similar to Share 2015 - 5 Myths that can put your Mainframe at risk (v1.3)

Mickey pacsec2016_finalMickey pacsec2016_final
Mickey pacsec2016_finalPacSecJP
1.4K views33 slides
Login cat   tekmonks - v4Login cat   tekmonks - v4
Login cat tekmonks - v4TEKMONKS
118 views41 slides
Hunt for the red DAHunt for the red DA
Hunt for the red DANeil Lines
1.5K views118 slides

Similar to Share 2015 - 5 Myths that can put your Mainframe at risk (v1.3)(20)

Mickey pacsec2016_finalMickey pacsec2016_final
Mickey pacsec2016_final
PacSecJP1.4K views
Login cat   tekmonks - v4Login cat   tekmonks - v4
Login cat tekmonks - v4
TEKMONKS118 views
Login cat   tekmonks - v4Login cat   tekmonks - v4
Login cat tekmonks - v4
Rohit Kapoor443 views
Hunt for the red DAHunt for the red DA
Hunt for the red DA
Neil Lines1.5K views
Computer SecurityComputer Security
Computer Security
Greater Noida Institute Of Technology132 views
Chapter 1-1.pptxChapter 1-1.pptx
Chapter 1-1.pptx
biniyamgashaw22 views
Hackers Cracker Network IntruderHackers Cracker Network Intruder
Hackers Cracker Network Intruder
Erdo Deshiant Garnaby359 views
Session2 2 김휘강 codegate2(hkkim)Session2 2 김휘강 codegate2(hkkim)
Session2 2 김휘강 codegate2(hkkim)
Korea University1.3K views
How to become Hackers .How to become Hackers .
How to become Hackers .
Greater Noida Institute Of Technology69 views

More from Rui Miguel Feio(10)

Recently uploaded(20)

Web Dev - 1 PPT.pdfWeb Dev - 1 PPT.pdf
Web Dev - 1 PPT.pdf
gdsczhcet49 views
ChatGPT and AI for Web DevelopersChatGPT and AI for Web Developers
ChatGPT and AI for Web Developers
Maximiliano Firtman161 views
ThroughputThroughput
Throughput
Moisés Armani Ramírez31 views
METHOD AND SYSTEM FOR PREDICTING OPTIMAL LOAD FOR WHICH THE YIELD IS MAXIMUM ...METHOD AND SYSTEM FOR PREDICTING OPTIMAL LOAD FOR WHICH THE YIELD IS MAXIMUM ...
METHOD AND SYSTEM FOR PREDICTING OPTIMAL LOAD FOR WHICH THE YIELD IS MAXIMUM ...
Prity Khastgir IPR Strategic India Patent Attorney Amplify Innovation24 views

Share 2015 - 5 Myths that can put your Mainframe at risk (v1.3)

  • 1. 5  Myths  That  Can  Put  Your  Mainframe   At  Risk   Rui  Miguel  Feio   Security  Lead   RSM  Partners  
  • 2. Agenda   •  Introduc.on   •  Myth  #1  –  The  mainframe  is  dead   •  Myth  #2  –  No  one  hacks  the  mainframe   •  Myth  #3  –  The  mainframe  is  isolated  from  the  rest  of  the  world   •  Myth  #4  –  “We  don’t  use  Unix  System  Services”   •  Myth  #5  –  Outsourcing  will  solve  all  the  problems   •  Ques.ons  
  • 3. Introduc.on   •  Rui  Miguel  Feio   –  Security  lead  at  RSM  Partners  (UK)   –  I  am  a  mainframe  technician  specialising  in  mainframe  security   –  Experience  in  other  plaUorms  as  well   –  I  have  been  working  with  mainframes  for  the  past  16  years   –  Happy  to  take  ques.ons  as  we  go  
  • 4. Myth  #1   The  mainframe  is  dead  
  • 5. •  Since  the  advent  of  the  PC  in  the  1980’s  the  mainframe  has  been   set  for  ex.nc.on.   •  “The  PC  is  now  as  powerful  as  a  mainframe!”   •  Only  ‘old’  people  know  about  mainframes.   Myth  #1  
  • 6. •  IBM  keeps  bringing  out  new  mainframes:   •  z13  –  Jan  2015   •  zEnterprise  BC12  (zBC12)  –  Jul  2013   •  zEnterprise  EC12  (zEC12)  –  Aug  2012   •  zEnterprise  114  (z114)  –  Jul  2011   •  zEnterprise  196  (z196)  –  Jul  2010   •  z10  Enterprise  Class  (EC)  –  Feb  2008   •  z9  Enterprise  Class  (EC)  –  Sep  2005   •  z890  –  Apr  2004   •  z990  –  May  2003   •  ...     Myth  #1  –  Some  Facts  
  • 7. •  Mainframe  as  a  whole  contributes  to  25%  of  IBM’s  revenue  and   35%  of  its  opera.ng  profit*   •  96  of  the  world’s  top  100  banks  and  90%  of  the  world’s  largest   insurance  companies  s.ll  use  mainframes   •  85%  of  all  mission-­‐cri.cal  applica.ons  run  on  COBOL  and  the   mainframe**   *Toni  Sacconaghi  of  Bernstein  Research   **Microfocus   Myth  #1  –  Some  Facts  
  • 8. •  Keeping  in  sync  with  the  new  technologies:   –  Enterprise  Linux  Server:   •  hip://www-­‐03.ibm.com/systems/z/os/linux/els.html   –  Enterprise  Cloud  Compu.ng:   •  hip://www-­‐03.ibm.com/systems/uk/z/solu.ons/cloud/   –  Enterprise  Mobility:   •  hip://www-­‐03.ibm.com/systems/z/solu.ons/mobile.html   –  Enterprise  Security:   •  hip://www-­‐03.ibm.com/systems/z/solu.ons/security.html   –  Business  Analy.cs  and  Big  Data:   •  hip://www-­‐03.ibm.com/systems/z/solu.ons/data.html   Myth  #1  –  Some  Facts  
  • 9. •  Lack  of  understanding:   –  What  the  mainframe  is  and  what  it  can  do   •  Lack  of  investment:   –  New  solu.ons  for  the  mainframe   –  Training   •  Lack  of  resources:   –  Not  hiring  new  resources   –  Replacing  exis.ng  resources   Myth  #1  –  Leads  to  Risks  
  • 10. Myth  #2   No  one  hacks  the  mainframe  
  • 11. •  “The  mainframe  is  the  most  secure  plaUorm  in  the  world”   •  “Who’s  gonna  hack  the  mainframe?!?”   •  “You  need  to  be  a  mainframer  to  be  able  to  use  the  mainframe”   Myth  #2  
  • 12. •  Although  highly  securable,  the  mainframe  is  not  secure  by  default   •  Like  any  plaUorm,  the  mainframe  needs  to  adapt  and   security  needs  to  be  constantly  reviewed   •  People  with  no  mainframe  background  are  geong  interested…   •  hip://soldieroffortran.org   •  hip://mainframed767.tumblr.com   Myth  #2  –  Some  Facts  
  • 13. •  Guess  what?  The  mainframe  can  be  hacked!   –  Cyber  aiack  on  up  to  100  banks  -­‐  es.mated  $1bn  (£648m)  in   losses  (2015)   –  Swedish  Nordea  bank  –  personal  data,  money  (2013)   –  IT  firm  Logica  –  more  than  10,000  social  security  numbers   (2012)   Myth  #2  –  Some  Facts  
  • 14. •  Have  you  considered  the  ‘inside  threat’?   –  Recent  case  in  the  UK   –  Senior  Applica.ons  developer   –  Detailed  knowledge  of  the  applica.on   –  Exploited  a  known  security  control   –  Defrauded  his  employer  of  over  £2,000,000!   Myth  #2  –  Some  Facts  
  • 15. Security   Risks  &   Exposures   Lack  of   investment   Lack  of   training   Lack  of   resources   Lack  of   understanding   Too  much   confidence   Myth  #2  –  Leads  to  Risks  
  • 16. Myth  #3   The  mainframe  is  isolated   from  the  rest  of  the  world  
  • 17. •  There  is  s.ll  this  idea  that  the  mainframe  is  independent  of   everything  else.     •  In  a  mee.ng  discussing  security  aspects  with  a  director  of  the   company  we’ve  men.oned  their  mainframe.  His  reac.on  was:   –  “Mainframe?  What  mainframe?”   Myth  #3  
  • 18. Guess  what?  The  mainframe  is  only  a  piece  of  the  big  picture!   Myth  #3  –  Some  Facts  
  • 19. •  The  mainframe  is  not  isolated!   –  Hackers  can  target  the  mainframe  directly   –  Hackers  can  target  other  devices  in  the  network  to  get  to  the   mainframe   –  Beware  of  IoT  and  BYOD   •  If  you  don’t  know  you  have  a  mainframe  then  you  have  a  BIG   problem!!     Myth  #3  –  Leads  to  Risks  
  • 20. Myth  #4   “We  don’t  use  Unix  System   Services”  
  • 21. •  Again,  and  again  we  hear  clients  saying:   –  “We  don’t  use  Unix  System  Services”   –  “We  don’t  need  to  know  Unix  System  Services”   –  “We  don’t  need  to  deal  with  Unix  System  Services”   –  “I’m  a  mainframer!  I  only  deal  with  MVS!”   Myth  #4  
  • 22. •  Unix  System  Services  is  part  of  z/OS  whether  you  like  it  or  not   •  You  may  not  know  Unix  System  Services  but  you  need  Unix  System   Services!   Myth  #4  –  Some  Facts  
  • 23. •  Unix  System  Services  (USS)  is  used  by:   –  TCP/IP   –  DB2   –  CICS   –  IMS   –  Websphere  MQ   –  Oracle  Web  Server   –  …   •  There’s  no  point  in  ignoring  Unix  System  Services!!     Myth  #4  –  Some  Facts  
  • 24. •  Ignoring  USS  doesn’t  it  make  it  go  away   •  If  not  properly  dealt  with  USS  can  be  a  major  security  risk   •  Hackers  have  a  deep  understanding  of  Unix.  Where  do  you  think   they  will  start  at  when  trying  to  hack  the  mainframe?   Myth  #4  –  Leads  to  Risks  
  • 25. Myth  #5   Outsourcing  will  solve  all   the  problems  
  • 26. •  Companies  see  outsourcing  as  a  way  to  save  money   •  On  the  other  hand  outsourcers  want  to  make  money   •  Can  you  see  a  problem  here?   Myth  #5  
  • 27. •  ‘Blinded’  with  the  idea  of  saving  money  most  of  the  .me  a   company:   –  Assumes  everything  will  be  covered  by  the  outsource   –  Doesn’t  read  the  the  documenta.on  provided   –  Does  not  review  their  own  documents  (processes,  procedures,   etc)   –  Does  not  ask  pertaining  ques.ons     –  Fails  to  assume  responsibility  (IT  infrastructure  has  a  direct   impact  in  the  business)   Myth  #5  –  Some  Facts  
  • 28. •  Most  of  the  .mes  the  outsourcer  will:   –  Provide  technical  and  non-­‐technical  documenta.on  constructed   with  a  greater  emphasis  in  legal  terms   –  Technical  documenta.on  does  not  describe  how  things  are   done  (processes  and  procedures)     –  Allocate  the  same  technical  resource  to  more  than  one  client   –  Charge  for  every  piece  of  work  not  covered  by  the  agreement   (remember  the  lack  of  processes?)   Myth  #5  –  Some  Facts  
  • 29. •  In  order  to  make  money  the  outsourcer  will:   -­‐  Save  money  on  training   -­‐  Save  money  on  the  technical  team:   -­‐  Technical  resources  shared  amongst  different  clients   -­‐  Reduce  the  number  of  technical  individuals   -­‐  Replace  experienced  members  by  cheaper  inexperienced   personnel   -­‐  Only  cover  the  minimum  contracted  services   -­‐  Charge  for  any  extra  service  including  security   Myth  #5  –  Leads  to  Risks  
  • 30. •  The  company  itself  s.ll  wan.ng  to  save  money:   –  Will  only  address  and  pay  for  what  is  really  required  –  typically   audit  findings   –  Will  not  review  processes  (internal  and  from  the  outsourcer)   –  Will  not  review  reports  with  the  aien.on  they  deserve  (e.g.   monitoring,  aler.ng,  access)   –  Risk  wise  –  “We  have  a  mainframe.  No  one  hacks  the   mainframe.”   Myth  #5  –  Leads  to  Risks  
  • 32. Conclusion   •  The  mainframe  is  going  nowhere!   •  The  mainframe  can  and  has  already  been  hacked!!     •  The  mainframe  is  just  another  plaUorm  of  the  company’s   ecosystem.   •  Unix  System  Services  is  part  and  in  use  by  the  mainframe.  Get  used   to  it!!   •  Outsourcing  can  be  helpful  but  beware  of  the  piUalls!    
  • 34. References  &  Sources   •  IBM - http://www-03.ibm.com/systems/z/solutions.html •  Bernstein Research - https://www.bernsteinresearch.com •  The Economist - http://www.economist.com •  Bloomberg - http://www.bloomberg.com •  The New York Times - http://www.nytimes.com •  Network Computing - http://www.networkcomputing.com •  Null Space Blog - http://blog.nullspace.io/mainframes.html •  Wikipedia - http://en.wikipedia.org •  Microfocus - http://online.microfocus.com/ •  My own blog – http://www.ruifeio.com/  
  • 35. Rui  Miguel  Feio   RSM  Partners     ruif@rsmpartners.com   mobile:  +44  (0)  7570  911459   www.rsmpartners.com   Contact