SlideShare ist ein Scribd-Unternehmen logo
1 von 14
Safety Review
of a
NonStop Data Center
by Peter Haase
Summary
 Lessons learned from a safety review
last year are combined
with some new ideas on
how to protect NonStop applications
against malware and spyware.
“Safety Review of a NonStop Data Center”
 „NonStop Data Center“
 „Review“
 „Safety“
 Review Procedure
 Review Checklist
 Audit Trail Analysis
 Risk: Denial of Service
 Risk: Malware
 Risk: Spyware
 References
NonStop Data Center
 Unit with several NonStop Systems
 Guardian, Pathway, TMF, Enscribe, SQL/MP
 Operated by an infrastructue-as-a-service supplier
Review
 Part of an Audit on a banking application
 Control of outsourced data processing
 8 Items to control according to German Law
 Access control on building and rooms
 Access control on hardware and operating system
 Access rights
 Data transmission and transport
 Data entry
 Contractor
 Availability
 Data Separation
Safety
 Availability
 NonStop and RDF
 Replication tools for non-audited files
 Emergency planning
 The Denial-of-Service problem
 Integrity
 TMF and audited files
 Audit trail analysis
 Confidentiality
 Guardian Security and SAFEGUARD
 SECOM
ID mapping and command level security
 Protection against Malware and Spyware
Review Procedures
 Project Management
 Before Start of Review
 Guidelines for Documentation
 Tools for Checking and Auditing
 Checklists and Standards
 Start of Review
 Charts of involved organisations
 Available Documentation
 Past issues / Special risks
 Review
 Design
 Operation
Review Checklists
Availability Integrity Confidentiality Emergency
Planning
Inventory HW, SW,
Subsystems,
Data files
SW version,
Data Dictionary
PROGID, LICENSE,
system interfaces
Planning
Monitoring HW, SW,
critical events
Audited DB,
Audit Trail Analysis,
Runtime Lib,
ENSCRIBE data
Session log, 4-eyes,
SAFEGUARD audit,
SECOM log
Tests and
Training
Control Performance
and Tuning,
DoS Risk
System and
subsystem
configuration,
Malware Risk
Deleted data files,
Backup data,
Users: super.* and *.super,
Spyware Risk
Confidential
data
Audit Trail Analysis
 Find Long-running transactions
 Find transactions that have damaged a database
 Locate specific data field/column changes
 Detect bugs in applications
 Search for unauthorized transactions
Risk: Denial of Service
 Compiler, Binder, Debugger on Production System
 TAL examples:
 corrupting a cpu
 ?Source $system.system.extdecs0 (alter_priority_)
Proc Test Main;
Begin While 1 do begin alter_priority_(199); End;
 corrupting a volume
 ?Source $system.system.extdecs0 (file_create_)
Proc Test Main;
Begin String .system[0:35] := „$system“; Int Len := 7;
While 1 do begin file_Create_(SYSTEM:36,Len); End
 But, same effects possible by TACL programming
Risk: Malware
 Security for files belonging to functional user
 Data and program files
 Especially: *CSTM and *LOCL and *CTL files
 Default: no echo from FUP
 Command „Password“ in TACLCSTM deletes current password
 User and security setting
for PATHWAY Management
 SET PATHWAY OWNER <group>, <user>
 SET PATHWAY SECURITY “<O or U>"
Risk: Spyware
 LINKMON server class access security
SET SERVER OWNER <group>, <user>
SET SERVER SECURITY “<O or U>"
 But, access to server processes is still possible.
 Default:
Any process can open a process and send a message.
 Possible Solutions
 Adding logic to server program for checking requestors
 SAFEGUARD ACLs on the process name
 SAFEGUARD active and tool PS-Shell
References
 Product CS-TP-SPY (Audit Trail Analysis) of
CS-Software Gmbh
Dr. Werner Alexi
Schiersteiner Straße 31, 65187 Wiesbaden, Germany
E-Mail: info@cs-software-gmbh.de
 Ideas and Tools of
GreenHouse Software & Consulting
Ingenieurbuero Karl-Heinz Weber
Heinrichstrasse 12, 45711 Datteln-Horneburg, Germany
E-Mail: info@greenhouse.de
 My list of 117 Greenhouse Tools as a give-away
Peter Haase
 Peter Haase
Programmer, Trainer, Consultant for HP NonStop since 1981
 D-56820 Mesenich/Moselle , Kirchstr. 12
 +49-2673-98600
 +49-171-8442242
 info@peterhaase.de
 www.peterhaase.de

Weitere ähnliche Inhalte

Andere mochten auch

Exhibit m email satish to kyko re inalytix and ibs ownership 031113
Exhibit m   email satish to kyko re inalytix and ibs ownership 031113Exhibit m   email satish to kyko re inalytix and ibs ownership 031113
Exhibit m email satish to kyko re inalytix and ibs ownership 031113
mh37o
 
Acepto o no acepto
Acepto o no aceptoAcepto o no acepto
Acepto o no acepto
alegna301
 
Jll2013 l’évolution du passionné des logiciels libres de débutant à expert
Jll2013 l’évolution du passionné des logiciels libres   de débutant à expertJll2013 l’évolution du passionné des logiciels libres   de débutant à expert
Jll2013 l’évolution du passionné des logiciels libres de débutant à expert
LinuQ
 

Andere mochten auch (10)

An introduction to customer panels
An introduction to customer panelsAn introduction to customer panels
An introduction to customer panels
 
Foreground検知
Foreground検知Foreground検知
Foreground検知
 
O Mundo 2020 visto em 2004 - Dossier Marketeer
O Mundo 2020 visto em 2004 - Dossier MarketeerO Mundo 2020 visto em 2004 - Dossier Marketeer
O Mundo 2020 visto em 2004 - Dossier Marketeer
 
Anatomía radiológica del tórax. rev chil enf respir 2012
Anatomía radiológica del tórax. rev chil enf respir 2012Anatomía radiológica del tórax. rev chil enf respir 2012
Anatomía radiológica del tórax. rev chil enf respir 2012
 
Exhibit m email satish to kyko re inalytix and ibs ownership 031113
Exhibit m   email satish to kyko re inalytix and ibs ownership 031113Exhibit m   email satish to kyko re inalytix and ibs ownership 031113
Exhibit m email satish to kyko re inalytix and ibs ownership 031113
 
Sos Piracy Short Lr 2011
Sos Piracy Short Lr 2011Sos Piracy Short Lr 2011
Sos Piracy Short Lr 2011
 
Curso de Verano. Los delitos tecnológicos.
Curso de Verano. Los delitos tecnológicos.Curso de Verano. Los delitos tecnológicos.
Curso de Verano. Los delitos tecnológicos.
 
me me me take me!
me me me take me!me me me take me!
me me me take me!
 
Acepto o no acepto
Acepto o no aceptoAcepto o no acepto
Acepto o no acepto
 
Jll2013 l’évolution du passionné des logiciels libres de débutant à expert
Jll2013 l’évolution du passionné des logiciels libres   de débutant à expertJll2013 l’évolution du passionné des logiciels libres   de débutant à expert
Jll2013 l’évolution du passionné des logiciels libres de débutant à expert
 

Mehr von Peter Haase (10)

Digitalisierung - Datenschutz - IT-Sicherheit
Digitalisierung - Datenschutz - IT-SicherheitDigitalisierung - Datenschutz - IT-Sicherheit
Digitalisierung - Datenschutz - IT-Sicherheit
 
EU General Data Protection Regulation
EU General Data Protection RegulationEU General Data Protection Regulation
EU General Data Protection Regulation
 
Sicherheitsprüfung für HP NonStop Systeme
Sicherheitsprüfung für HP NonStop SystemeSicherheitsprüfung für HP NonStop Systeme
Sicherheitsprüfung für HP NonStop Systeme
 
Mod06 new development tools
Mod06 new development toolsMod06 new development tools
Mod06 new development tools
 
Mod05 application migration
Mod05 application migrationMod05 application migration
Mod05 application migration
 
Mod04 debuggers
Mod04 debuggersMod04 debuggers
Mod04 debuggers
 
Mod03 linking and accelerating
Mod03 linking and acceleratingMod03 linking and accelerating
Mod03 linking and accelerating
 
Mod02 compilers
Mod02 compilersMod02 compilers
Mod02 compilers
 
Mod01 tns e overview
Mod01 tns e overviewMod01 tns e overview
Mod01 tns e overview
 
Mod00 introduction
Mod00 introductionMod00 introduction
Mod00 introduction
 

Kürzlich hochgeladen

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Kürzlich hochgeladen (20)

"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 

Safety Review of a NonStop Data Center

  • 1. Safety Review of a NonStop Data Center by Peter Haase
  • 2. Summary  Lessons learned from a safety review last year are combined with some new ideas on how to protect NonStop applications against malware and spyware.
  • 3. “Safety Review of a NonStop Data Center”  „NonStop Data Center“  „Review“  „Safety“  Review Procedure  Review Checklist  Audit Trail Analysis  Risk: Denial of Service  Risk: Malware  Risk: Spyware  References
  • 4. NonStop Data Center  Unit with several NonStop Systems  Guardian, Pathway, TMF, Enscribe, SQL/MP  Operated by an infrastructue-as-a-service supplier
  • 5. Review  Part of an Audit on a banking application  Control of outsourced data processing  8 Items to control according to German Law  Access control on building and rooms  Access control on hardware and operating system  Access rights  Data transmission and transport  Data entry  Contractor  Availability  Data Separation
  • 6. Safety  Availability  NonStop and RDF  Replication tools for non-audited files  Emergency planning  The Denial-of-Service problem  Integrity  TMF and audited files  Audit trail analysis  Confidentiality  Guardian Security and SAFEGUARD  SECOM ID mapping and command level security  Protection against Malware and Spyware
  • 7. Review Procedures  Project Management  Before Start of Review  Guidelines for Documentation  Tools for Checking and Auditing  Checklists and Standards  Start of Review  Charts of involved organisations  Available Documentation  Past issues / Special risks  Review  Design  Operation
  • 8. Review Checklists Availability Integrity Confidentiality Emergency Planning Inventory HW, SW, Subsystems, Data files SW version, Data Dictionary PROGID, LICENSE, system interfaces Planning Monitoring HW, SW, critical events Audited DB, Audit Trail Analysis, Runtime Lib, ENSCRIBE data Session log, 4-eyes, SAFEGUARD audit, SECOM log Tests and Training Control Performance and Tuning, DoS Risk System and subsystem configuration, Malware Risk Deleted data files, Backup data, Users: super.* and *.super, Spyware Risk Confidential data
  • 9. Audit Trail Analysis  Find Long-running transactions  Find transactions that have damaged a database  Locate specific data field/column changes  Detect bugs in applications  Search for unauthorized transactions
  • 10. Risk: Denial of Service  Compiler, Binder, Debugger on Production System  TAL examples:  corrupting a cpu  ?Source $system.system.extdecs0 (alter_priority_) Proc Test Main; Begin While 1 do begin alter_priority_(199); End;  corrupting a volume  ?Source $system.system.extdecs0 (file_create_) Proc Test Main; Begin String .system[0:35] := „$system“; Int Len := 7; While 1 do begin file_Create_(SYSTEM:36,Len); End  But, same effects possible by TACL programming
  • 11. Risk: Malware  Security for files belonging to functional user  Data and program files  Especially: *CSTM and *LOCL and *CTL files  Default: no echo from FUP  Command „Password“ in TACLCSTM deletes current password  User and security setting for PATHWAY Management  SET PATHWAY OWNER <group>, <user>  SET PATHWAY SECURITY “<O or U>"
  • 12. Risk: Spyware  LINKMON server class access security SET SERVER OWNER <group>, <user> SET SERVER SECURITY “<O or U>"  But, access to server processes is still possible.  Default: Any process can open a process and send a message.  Possible Solutions  Adding logic to server program for checking requestors  SAFEGUARD ACLs on the process name  SAFEGUARD active and tool PS-Shell
  • 13. References  Product CS-TP-SPY (Audit Trail Analysis) of CS-Software Gmbh Dr. Werner Alexi Schiersteiner Straße 31, 65187 Wiesbaden, Germany E-Mail: info@cs-software-gmbh.de  Ideas and Tools of GreenHouse Software & Consulting Ingenieurbuero Karl-Heinz Weber Heinrichstrasse 12, 45711 Datteln-Horneburg, Germany E-Mail: info@greenhouse.de  My list of 117 Greenhouse Tools as a give-away
  • 14. Peter Haase  Peter Haase Programmer, Trainer, Consultant for HP NonStop since 1981  D-56820 Mesenich/Moselle , Kirchstr. 12  +49-2673-98600  +49-171-8442242  info@peterhaase.de  www.peterhaase.de