SlideShare a Scribd company logo
z/Assure Vulnerability Analysis
               Enterprise Solution



                            By Robert Fragola
                                 www.kr-inc.com



1   © Key Resources, Inc. 2012
Compliance Requirements
     SOX requires publically traded companies to
      put controls into place to protect reporting and
      financial information
     PCI Requirement 11.3 Guidance --
      Vulnerability scans and penetration tests will
      expose any remaining vulnerabilities that
      could later be found and exploited by an
      attacker.
     NIST 800-53 –The organization includes, as
      part of a security-control assessment,
      malicious user testing and penetration testing
2    © Key Resources, Inc. 2012
What is an Integrity - Based Software
     Vulnerability?
     A weakness in z/OS systems, that allows the exploitation
      of products from Independent Software Vendor (ISV)
      and/or in-house developed authorized interfaces (SVCs
      and PCs) as well as (APF) authorized applications.
     Vulnerabilities can compromise all data on your system as
      well as the system itself
      - Disrupt System Availability
      - View and Modify Sensitive Information

     It can allow an Internal attacker to circumvent RACF,
      ACF2 or Top Secret’s installation controls
      - Cause Compliance Violations
      - Severely Damage the Firm’s Reputation


3       © Key Resources, Inc. 2012
Exploiting Integrity - Based
    Software Vulnerabilities

     An Exploit is a way of taking advantage
      of a software Vulnerability
     Bypassing the installation-security
      controls
     Gain unauthorized access to data
      without proper permission and
     Without any logging (SMF)

4    © Key Resources, Inc. 2012
Big Three Security Systems
     RACF developed by IBM and introduced in 1976
     ACF2 authored by Barry Schrager, Mainframe
      Hall of Fame member, founder of SKK and
      introduced in 1978 (now owned by CA)
     Top Secret developed by CGA Allen and
      introduced in 1981 (now owned by CA)
     ACF2, Top Secret and RACF depend on system
      integrity because any program that can leverage
      a system integrity vulnerability can get access to
      any data it wants.

       “There can be no system security without
5                        operating system integrity”
      © Key Resources, Inc. 2012
According to Gartner

     “The IBM z/OS mainframe continues to be an
     important platform for many enterprises, hosting
     about 90% of their mission-critical applications.
     Enterprises may not take the same steps to
     address configuration errors and poor identity
     and entitlements administration on the
     mainframe as they do on other OSs. Thus, the
     incidence of high-risk vulnerabilities is
     astonishingly high, and enterprises often lack
     formal programs to identify and remediate
     these.”
       © Key Resources, Inc. 2012
6
     Gartner Research Note G00172909
Vulnerabilities May Have Been
    Added
      During routine maintenance activities or
       the installation of new ISV products or
       locally developed authorized code

      By well meaning Systems Programmers
       who wanted a programming function

      Who did not think of the implications

      Who have long since left or retired

7     © Key Resources, Inc. 2012
z/Assure a New IBM z/OS
    Vulnerability Analysis Solution

     Created by Preeminent Security Developers
     z/Assure is Independent of ACF2, RACF and
      Top Secret
     Performs Penetration Tests on z/OS systems,
      as well as ISV,3rd Party and In-house
      Developed Applications
     Ensures Compliance Standards and Protects
      Your Most Important Resource – Your Data
8    Absolutely 2012 other product like this on the
       © Key Resources, Inc. no
Eliminating Integrity - Based
    Software Vulnerabilities

      Must be Identified using the VAT Enterprise
      Solution

      Remediated by the Code Owner

      Over Time, New Vulnerabilities could be
      Introduced

      On-going Identification and Remediation is
      required using the z/Assure Solution
9     © Key Resources, Inc. 2012
Vulnerability Exploit Demonstration



      z/OS 1.11


      No extra-ordinary security authority is
        required

      Security System is RACF (it does not
        matter – exploit would work with ACF2
        or Top Secret with minor changes)
10   © Key Resources, Inc. 2012
Access a Dataset




11    © Key Resources, Inc. 2012
Denied by RACF – 913
     ABEND!!




12   © Key Resources, Inc. 2012
Run an Exploit




13    © Key Resources, Inc. 2012
Now in RACF PRIVILEGED!!




14    © Key Resources, Inc. 2012
Access the Dataset Again




15    © Key Resources, Inc. 2012
Now Have Access!!




16    © Key Resources, Inc. 2012
The Exploiter Has Complete
 Control


      The Exploiter may be a knowledgeable
        insider (high level of technical expertise)

      They could be an insiders with low
        levels of technical expertise who
        obtained the exploit from knowledgeable
        outsiders

17   © Key Resources, Inc. 2012
But, you say:

       These attacks would not be from
         insiders

       Insiders are a trusted bunch of people


       Well …



18    © Key Resources, Inc. 2012
2008 Strategic Counsel Survey
       Commissioned by CA Technologies

       Internal Breaches are Rising
         2003 – 15% of breaches
         2006 – 42% of breaches
         2008 – 44% of breaches

       The biggest security threats are from the
          inside!

       And, they are increasing!
19    © Key Resources, Inc. 2012
2010 CSO Magazine Survey
      2010 CyberSecurity Watch Survey

      “…the most costly or damaging attacks
      are caused by insiders”

      Almost three quarters (72%), on the
      average, of insider incidents are handled
      internally without legal action or the
      involvement of law enforcement

20    © Key Resources, Inc. 2012
Is My Firm At Risk?


           Yes, Because You Have IBM, ISV,
                and In-House Developed
                 Systems that Contain
                     Vulnerabilities




21     © Key Resources, Inc. 2012
How Well Does z/Assure Work?

      At a recent assessment we found 15 vulnerabilities
         in IBM and ISV code
        On average over 50% of the reported vulnerabilities
         are zero day vulnerabilities
        A single vulnerability will compromise all data as
         well as the system itself
        Vulnerabilities were found in software from premiere
         software vendors such as: IBM, CA, BMC, EMC
         and Compuware
        Vulnerabilities are also normally found in In-house
         Developed Applications, Authorized Interfaces and
         System Exits

22       © Key Resources, Inc. 2012
How Can You Take Advantage of the
 z/Assure Enterprise Solution?
     Option1 Assessment:

      Initial on-site Assessment using the
     z/Assure Solution
      Manually review installation added
     authorized code such as: SVCs, PCs and
     Exits
      Produces initial list of Integrity-based
     vulnerabilities
      Provide z/Assure training for your staff

23   © Key Resources, Inc. 2012
How Can You Take Advantage of the
 z/Assure Solution?
     Option 2 Enterprise Deployment:

     Customer licenses z/Assure enterprise class
     license
     Annual license fee charged by the number of
     LPARs protected by the z/Assure Solution
     Typically installed in hardening systems




24   © Key Resources, Inc. 2012
Questions and Next Steps:


                       z/Assure                 Enterprise
Solution
                                    www.kr-inc.com
                                    914 393-7000




  25   © Key Resources, Inc. 2012

More Related Content

What's hot

Protecting Industrial Control Systems V1.2, Ahmad Alanazy, 2012
Protecting Industrial Control Systems V1.2, Ahmad Alanazy, 2012Protecting Industrial Control Systems V1.2, Ahmad Alanazy, 2012
Protecting Industrial Control Systems V1.2, Ahmad Alanazy, 2012
Ahmed Al Enizi
 
Protect Against Security Breaches by Securing Endpoints with Multi-Factor Aut...
Protect Against Security Breaches by Securing Endpoints with Multi-Factor Aut...Protect Against Security Breaches by Securing Endpoints with Multi-Factor Aut...
Protect Against Security Breaches by Securing Endpoints with Multi-Factor Aut...
CA Technologies
 
How to Close the SecOps Gap
How to Close the SecOps GapHow to Close the SecOps Gap
How to Close the SecOps Gap
BMC Software
 
edgescan vulnerability stats report (2019)
edgescan vulnerability stats report (2019) edgescan vulnerability stats report (2019)
edgescan vulnerability stats report (2019)
Eoin Keary
 
Everything You Need To Know About Ivanti Security Controls
Everything You Need To Know About Ivanti Security ControlsEverything You Need To Know About Ivanti Security Controls
Everything You Need To Know About Ivanti Security Controls
Ivanti
 
IIA August Briefing_15AUG2015
IIA August Briefing_15AUG2015IIA August Briefing_15AUG2015
IIA August Briefing_15AUG2015Robert Baldi
 
What the New OWASP Top 10 2013 and Latest X-Force Report Mean for App Sec
What the New OWASP Top 10 2013 and Latest X-Force Report Mean for App SecWhat the New OWASP Top 10 2013 and Latest X-Force Report Mean for App Sec
What the New OWASP Top 10 2013 and Latest X-Force Report Mean for App Sec
IBM Security
 
Technical debt in cyber ark [agile practitioners-2015]
Technical debt in cyber ark [agile practitioners-2015]Technical debt in cyber ark [agile practitioners-2015]
Technical debt in cyber ark [agile practitioners-2015]
AgilePractitionersIL
 
Threat Modeling for the Internet of Things
Threat Modeling for the Internet of ThingsThreat Modeling for the Internet of Things
Threat Modeling for the Internet of Things
Eric Vétillard
 
Ibm app security assessment_ds
Ibm app security assessment_dsIbm app security assessment_ds
Ibm app security assessment_dsArun Gopinath
 
Automotive Cybersecurity: The Gap Still Exists
Automotive Cybersecurity: The Gap Still ExistsAutomotive Cybersecurity: The Gap Still Exists
Automotive Cybersecurity: The Gap Still Exists
OnBoard Security, Inc. - a Qualcomm Company
 
Vulnerability Assessment Presentation
Vulnerability Assessment PresentationVulnerability Assessment Presentation
Vulnerability Assessment Presentation
Lionel Medina
 
Symantec Endpoint Protection
Symantec Endpoint ProtectionSymantec Endpoint Protection
Symantec Endpoint Protection
Symantec
 
Escrow Presentation
Escrow PresentationEscrow Presentation
Escrow Presentationlucydavidson
 
Software Security Engineering
Software Security EngineeringSoftware Security Engineering
Software Security EngineeringMarco Morana
 
The impact of consumerization
The impact of consumerizationThe impact of consumerization
The impact of consumerization
Michel de Goede
 
Transforming your Security Products at the Endpoint
Transforming your Security Products at the EndpointTransforming your Security Products at the Endpoint
Transforming your Security Products at the Endpoint
Ivanti
 
Car Cybersecurity: The Gap Still Exists
Car Cybersecurity: The Gap Still ExistsCar Cybersecurity: The Gap Still Exists
Car Cybersecurity: The Gap Still Exists
Security Innovation
 
Network Security - Real and Present Dangers
Network Security - Real and Present DangersNetwork Security - Real and Present Dangers
Network Security - Real and Present Dangers
Peter Wood
 
Secure SDLC in mobile software development.
Secure SDLC in mobile software development.Secure SDLC in mobile software development.
Secure SDLC in mobile software development.
Mykhailo Antonishyn
 

What's hot (20)

Protecting Industrial Control Systems V1.2, Ahmad Alanazy, 2012
Protecting Industrial Control Systems V1.2, Ahmad Alanazy, 2012Protecting Industrial Control Systems V1.2, Ahmad Alanazy, 2012
Protecting Industrial Control Systems V1.2, Ahmad Alanazy, 2012
 
Protect Against Security Breaches by Securing Endpoints with Multi-Factor Aut...
Protect Against Security Breaches by Securing Endpoints with Multi-Factor Aut...Protect Against Security Breaches by Securing Endpoints with Multi-Factor Aut...
Protect Against Security Breaches by Securing Endpoints with Multi-Factor Aut...
 
How to Close the SecOps Gap
How to Close the SecOps GapHow to Close the SecOps Gap
How to Close the SecOps Gap
 
edgescan vulnerability stats report (2019)
edgescan vulnerability stats report (2019) edgescan vulnerability stats report (2019)
edgescan vulnerability stats report (2019)
 
Everything You Need To Know About Ivanti Security Controls
Everything You Need To Know About Ivanti Security ControlsEverything You Need To Know About Ivanti Security Controls
Everything You Need To Know About Ivanti Security Controls
 
IIA August Briefing_15AUG2015
IIA August Briefing_15AUG2015IIA August Briefing_15AUG2015
IIA August Briefing_15AUG2015
 
What the New OWASP Top 10 2013 and Latest X-Force Report Mean for App Sec
What the New OWASP Top 10 2013 and Latest X-Force Report Mean for App SecWhat the New OWASP Top 10 2013 and Latest X-Force Report Mean for App Sec
What the New OWASP Top 10 2013 and Latest X-Force Report Mean for App Sec
 
Technical debt in cyber ark [agile practitioners-2015]
Technical debt in cyber ark [agile practitioners-2015]Technical debt in cyber ark [agile practitioners-2015]
Technical debt in cyber ark [agile practitioners-2015]
 
Threat Modeling for the Internet of Things
Threat Modeling for the Internet of ThingsThreat Modeling for the Internet of Things
Threat Modeling for the Internet of Things
 
Ibm app security assessment_ds
Ibm app security assessment_dsIbm app security assessment_ds
Ibm app security assessment_ds
 
Automotive Cybersecurity: The Gap Still Exists
Automotive Cybersecurity: The Gap Still ExistsAutomotive Cybersecurity: The Gap Still Exists
Automotive Cybersecurity: The Gap Still Exists
 
Vulnerability Assessment Presentation
Vulnerability Assessment PresentationVulnerability Assessment Presentation
Vulnerability Assessment Presentation
 
Symantec Endpoint Protection
Symantec Endpoint ProtectionSymantec Endpoint Protection
Symantec Endpoint Protection
 
Escrow Presentation
Escrow PresentationEscrow Presentation
Escrow Presentation
 
Software Security Engineering
Software Security EngineeringSoftware Security Engineering
Software Security Engineering
 
The impact of consumerization
The impact of consumerizationThe impact of consumerization
The impact of consumerization
 
Transforming your Security Products at the Endpoint
Transforming your Security Products at the EndpointTransforming your Security Products at the Endpoint
Transforming your Security Products at the Endpoint
 
Car Cybersecurity: The Gap Still Exists
Car Cybersecurity: The Gap Still ExistsCar Cybersecurity: The Gap Still Exists
Car Cybersecurity: The Gap Still Exists
 
Network Security - Real and Present Dangers
Network Security - Real and Present DangersNetwork Security - Real and Present Dangers
Network Security - Real and Present Dangers
 
Secure SDLC in mobile software development.
Secure SDLC in mobile software development.Secure SDLC in mobile software development.
Secure SDLC in mobile software development.
 

Similar to Key Resources - z/Assure Sales Presentation

Top Strategies to Capture Security Intelligence for Applications
Top Strategies to Capture Security Intelligence for ApplicationsTop Strategies to Capture Security Intelligence for Applications
Top Strategies to Capture Security Intelligence for Applications
Denim Group
 
Top 10 Ways To Win Budget For Application Security - Cenzic.2013.05.22
Top 10 Ways To Win Budget For Application Security - Cenzic.2013.05.22Top 10 Ways To Win Budget For Application Security - Cenzic.2013.05.22
Top 10 Ways To Win Budget For Application Security - Cenzic.2013.05.22
Cenzic
 
Web Application Security: Connecting the Dots
Web Application Security: Connecting the DotsWeb Application Security: Connecting the Dots
Web Application Security: Connecting the Dots
InnoTech
 
From SIEM to SA: The Path Forward
From SIEM to SA: The Path ForwardFrom SIEM to SA: The Path Forward
From SIEM to SA: The Path Forward
EMC
 
Managing Your Application Security Program with the ThreadFix Ecosystem
Managing Your Application Security Program with the ThreadFix EcosystemManaging Your Application Security Program with the ThreadFix Ecosystem
Managing Your Application Security Program with the ThreadFix Ecosystem
Denim Group
 
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
SecPod Technologies
 
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future
IBM
 
Cyber Warfare e scenari di mercato
Cyber Warfare e scenari di mercatoCyber Warfare e scenari di mercato
Cyber Warfare e scenari di mercato
HP Enterprise Italia
 
Closing Mainframe Integrity Gaps
Closing Mainframe Integrity GapsClosing Mainframe Integrity Gaps
Closing Mainframe Integrity GapsRay Overby
 
CLASS 2016 - Palestra José Antunes
CLASS 2016 - Palestra José AntunesCLASS 2016 - Palestra José Antunes
CLASS 2016 - Palestra José Antunes
TI Safe
 
Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...
Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...
Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...
IBM Security
 
An Introduction to zOS Real-time Infrastructure and Security Practices
An Introduction to zOS Real-time Infrastructure and Security PracticesAn Introduction to zOS Real-time Infrastructure and Security Practices
An Introduction to zOS Real-time Infrastructure and Security PracticesJerry Harding
 
Industrial Cyber Security: What You Don't Know Might Hurt You (And Others...)
Industrial Cyber Security: What You Don't Know Might Hurt You (And Others...)Industrial Cyber Security: What You Don't Know Might Hurt You (And Others...)
Industrial Cyber Security: What You Don't Know Might Hurt You (And Others...)
Tripwire
 
JavaZone 2023: CVE 101: A Developer's Guide to the World of Application Security
JavaZone 2023: CVE 101: A Developer's Guide to the World of Application SecurityJavaZone 2023: CVE 101: A Developer's Guide to the World of Application Security
JavaZone 2023: CVE 101: A Developer's Guide to the World of Application Security
Theresa Mammarella
 
Security Trends and Risk Mitigation for the Public Sector
Security Trends and Risk Mitigation for the Public SectorSecurity Trends and Risk Mitigation for the Public Sector
Security Trends and Risk Mitigation for the Public Sector
IBMGovernmentCA
 
Bridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical DataBridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical Data
IBM Security
 
Rochester Security Event
Rochester Security EventRochester Security Event
Rochester Security Eventcalebbarlow
 
Stopping the Adobe, Apple and Java Software Updater Insanity
Stopping the Adobe, Apple and Java Software Updater InsanityStopping the Adobe, Apple and Java Software Updater Insanity
Stopping the Adobe, Apple and Java Software Updater Insanity
Lumension
 

Similar to Key Resources - z/Assure Sales Presentation (20)

Top Strategies to Capture Security Intelligence for Applications
Top Strategies to Capture Security Intelligence for ApplicationsTop Strategies to Capture Security Intelligence for Applications
Top Strategies to Capture Security Intelligence for Applications
 
Top 10 Ways To Win Budget For Application Security - Cenzic.2013.05.22
Top 10 Ways To Win Budget For Application Security - Cenzic.2013.05.22Top 10 Ways To Win Budget For Application Security - Cenzic.2013.05.22
Top 10 Ways To Win Budget For Application Security - Cenzic.2013.05.22
 
Web Application Security: Connecting the Dots
Web Application Security: Connecting the DotsWeb Application Security: Connecting the Dots
Web Application Security: Connecting the Dots
 
From SIEM to SA: The Path Forward
From SIEM to SA: The Path ForwardFrom SIEM to SA: The Path Forward
From SIEM to SA: The Path Forward
 
Managing Your Application Security Program with the ThreadFix Ecosystem
Managing Your Application Security Program with the ThreadFix EcosystemManaging Your Application Security Program with the ThreadFix Ecosystem
Managing Your Application Security Program with the ThreadFix Ecosystem
 
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
 
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future
 
Cyber Warfare e scenari di mercato
Cyber Warfare e scenari di mercatoCyber Warfare e scenari di mercato
Cyber Warfare e scenari di mercato
 
Closing Mainframe Integrity Gaps
Closing Mainframe Integrity GapsClosing Mainframe Integrity Gaps
Closing Mainframe Integrity Gaps
 
CLASS 2016 - Palestra José Antunes
CLASS 2016 - Palestra José AntunesCLASS 2016 - Palestra José Antunes
CLASS 2016 - Palestra José Antunes
 
Introduction to Application Security Testing
Introduction to Application Security TestingIntroduction to Application Security Testing
Introduction to Application Security Testing
 
Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...
Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...
Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...
 
An Introduction to zOS Real-time Infrastructure and Security Practices
An Introduction to zOS Real-time Infrastructure and Security PracticesAn Introduction to zOS Real-time Infrastructure and Security Practices
An Introduction to zOS Real-time Infrastructure and Security Practices
 
Industrial Cyber Security: What You Don't Know Might Hurt You (And Others...)
Industrial Cyber Security: What You Don't Know Might Hurt You (And Others...)Industrial Cyber Security: What You Don't Know Might Hurt You (And Others...)
Industrial Cyber Security: What You Don't Know Might Hurt You (And Others...)
 
JavaZone 2023: CVE 101: A Developer's Guide to the World of Application Security
JavaZone 2023: CVE 101: A Developer's Guide to the World of Application SecurityJavaZone 2023: CVE 101: A Developer's Guide to the World of Application Security
JavaZone 2023: CVE 101: A Developer's Guide to the World of Application Security
 
Security Trends and Risk Mitigation for the Public Sector
Security Trends and Risk Mitigation for the Public SectorSecurity Trends and Risk Mitigation for the Public Sector
Security Trends and Risk Mitigation for the Public Sector
 
User_Access_IIA-LA_3-9-2016
User_Access_IIA-LA_3-9-2016User_Access_IIA-LA_3-9-2016
User_Access_IIA-LA_3-9-2016
 
Bridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical DataBridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical Data
 
Rochester Security Event
Rochester Security EventRochester Security Event
Rochester Security Event
 
Stopping the Adobe, Apple and Java Software Updater Insanity
Stopping the Adobe, Apple and Java Software Updater InsanityStopping the Adobe, Apple and Java Software Updater Insanity
Stopping the Adobe, Apple and Java Software Updater Insanity
 

Recently uploaded

LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 

Recently uploaded (20)

LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 

Key Resources - z/Assure Sales Presentation

  • 1. z/Assure Vulnerability Analysis Enterprise Solution By Robert Fragola www.kr-inc.com 1 © Key Resources, Inc. 2012
  • 2. Compliance Requirements  SOX requires publically traded companies to put controls into place to protect reporting and financial information  PCI Requirement 11.3 Guidance -- Vulnerability scans and penetration tests will expose any remaining vulnerabilities that could later be found and exploited by an attacker.  NIST 800-53 –The organization includes, as part of a security-control assessment, malicious user testing and penetration testing 2 © Key Resources, Inc. 2012
  • 3. What is an Integrity - Based Software Vulnerability?  A weakness in z/OS systems, that allows the exploitation of products from Independent Software Vendor (ISV) and/or in-house developed authorized interfaces (SVCs and PCs) as well as (APF) authorized applications.  Vulnerabilities can compromise all data on your system as well as the system itself - Disrupt System Availability - View and Modify Sensitive Information  It can allow an Internal attacker to circumvent RACF, ACF2 or Top Secret’s installation controls - Cause Compliance Violations - Severely Damage the Firm’s Reputation 3 © Key Resources, Inc. 2012
  • 4. Exploiting Integrity - Based Software Vulnerabilities  An Exploit is a way of taking advantage of a software Vulnerability  Bypassing the installation-security controls  Gain unauthorized access to data without proper permission and  Without any logging (SMF) 4 © Key Resources, Inc. 2012
  • 5. Big Three Security Systems  RACF developed by IBM and introduced in 1976  ACF2 authored by Barry Schrager, Mainframe Hall of Fame member, founder of SKK and introduced in 1978 (now owned by CA)  Top Secret developed by CGA Allen and introduced in 1981 (now owned by CA)  ACF2, Top Secret and RACF depend on system integrity because any program that can leverage a system integrity vulnerability can get access to any data it wants. “There can be no system security without 5 operating system integrity” © Key Resources, Inc. 2012
  • 6. According to Gartner “The IBM z/OS mainframe continues to be an important platform for many enterprises, hosting about 90% of their mission-critical applications. Enterprises may not take the same steps to address configuration errors and poor identity and entitlements administration on the mainframe as they do on other OSs. Thus, the incidence of high-risk vulnerabilities is astonishingly high, and enterprises often lack formal programs to identify and remediate these.” © Key Resources, Inc. 2012 6 Gartner Research Note G00172909
  • 7. Vulnerabilities May Have Been Added  During routine maintenance activities or the installation of new ISV products or locally developed authorized code  By well meaning Systems Programmers who wanted a programming function  Who did not think of the implications  Who have long since left or retired 7 © Key Resources, Inc. 2012
  • 8. z/Assure a New IBM z/OS Vulnerability Analysis Solution  Created by Preeminent Security Developers  z/Assure is Independent of ACF2, RACF and Top Secret  Performs Penetration Tests on z/OS systems, as well as ISV,3rd Party and In-house Developed Applications  Ensures Compliance Standards and Protects Your Most Important Resource – Your Data 8  Absolutely 2012 other product like this on the © Key Resources, Inc. no
  • 9. Eliminating Integrity - Based Software Vulnerabilities  Must be Identified using the VAT Enterprise Solution  Remediated by the Code Owner  Over Time, New Vulnerabilities could be Introduced  On-going Identification and Remediation is required using the z/Assure Solution 9 © Key Resources, Inc. 2012
  • 10. Vulnerability Exploit Demonstration  z/OS 1.11  No extra-ordinary security authority is required  Security System is RACF (it does not matter – exploit would work with ACF2 or Top Secret with minor changes) 10 © Key Resources, Inc. 2012
  • 11. Access a Dataset 11 © Key Resources, Inc. 2012
  • 12. Denied by RACF – 913 ABEND!! 12 © Key Resources, Inc. 2012
  • 13. Run an Exploit 13 © Key Resources, Inc. 2012
  • 14. Now in RACF PRIVILEGED!! 14 © Key Resources, Inc. 2012
  • 15. Access the Dataset Again 15 © Key Resources, Inc. 2012
  • 16. Now Have Access!! 16 © Key Resources, Inc. 2012
  • 17. The Exploiter Has Complete Control  The Exploiter may be a knowledgeable insider (high level of technical expertise)  They could be an insiders with low levels of technical expertise who obtained the exploit from knowledgeable outsiders 17 © Key Resources, Inc. 2012
  • 18. But, you say:  These attacks would not be from insiders  Insiders are a trusted bunch of people  Well … 18 © Key Resources, Inc. 2012
  • 19. 2008 Strategic Counsel Survey  Commissioned by CA Technologies  Internal Breaches are Rising  2003 – 15% of breaches  2006 – 42% of breaches  2008 – 44% of breaches  The biggest security threats are from the inside!  And, they are increasing! 19 © Key Resources, Inc. 2012
  • 20. 2010 CSO Magazine Survey  2010 CyberSecurity Watch Survey  “…the most costly or damaging attacks are caused by insiders”  Almost three quarters (72%), on the average, of insider incidents are handled internally without legal action or the involvement of law enforcement 20 © Key Resources, Inc. 2012
  • 21. Is My Firm At Risk? Yes, Because You Have IBM, ISV, and In-House Developed Systems that Contain Vulnerabilities 21 © Key Resources, Inc. 2012
  • 22. How Well Does z/Assure Work?  At a recent assessment we found 15 vulnerabilities in IBM and ISV code  On average over 50% of the reported vulnerabilities are zero day vulnerabilities  A single vulnerability will compromise all data as well as the system itself  Vulnerabilities were found in software from premiere software vendors such as: IBM, CA, BMC, EMC and Compuware  Vulnerabilities are also normally found in In-house Developed Applications, Authorized Interfaces and System Exits 22 © Key Resources, Inc. 2012
  • 23. How Can You Take Advantage of the z/Assure Enterprise Solution? Option1 Assessment:  Initial on-site Assessment using the z/Assure Solution  Manually review installation added authorized code such as: SVCs, PCs and Exits  Produces initial list of Integrity-based vulnerabilities  Provide z/Assure training for your staff 23 © Key Resources, Inc. 2012
  • 24. How Can You Take Advantage of the z/Assure Solution? Option 2 Enterprise Deployment: Customer licenses z/Assure enterprise class license Annual license fee charged by the number of LPARs protected by the z/Assure Solution Typically installed in hardening systems 24 © Key Resources, Inc. 2012
  • 25. Questions and Next Steps: z/Assure Enterprise Solution www.kr-inc.com 914 393-7000 25 © Key Resources, Inc. 2012