SlideShare ist ein Scribd-Unternehmen logo
1 von 24
Downloaden Sie, um offline zu lesen
Castle Walls Under Digital Siege:
Risk-based Security and z/OS
Kevin Segreti
Mainframe
Union Bank of California
MFT09S
@jcherrington
#CAWorld
Jeff Cherrington
CA Technologies
2 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Abstract
The mainframe remains the most securable
platform in the data center. However, like
medieval castles, their walls are no longer
impregnable. Learn more about how applying
risk-based security to z/OS helps you anticipate
attacks and compromises before they occur, so
you can enhance your walls of protection to
your mission-critical data.
Kevin Segreti
Union Bank of
California
Assistant Vice
President
Jeff
Cherrington
CA Technologies
Sr. Director, Mainframe
Security
3 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Agenda
WHAT DO CASTLES HAVE TO DO WITH THE MAINFRAME?
ARMS RACE – CIRCA THE MIDDLE AGES
QUESTION & ANSWER
SAPPERS AND SOCIAL ENGINEERING
WHY THE NORDEA HACK IS THE MAINFRAME GUNPOWDER
PROTECTING YOUR CASTLE – A RISK-BASED APPROACH
1
2
3
4
5
6
4 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
How History Bears on Protecting the Mainframe Today
Those who cannot
remember the past are
doomed to repeat it.
George Santayana
A smart [person]
learns from their own
mistakes; a wise [person]
learns from the
mistakes of others.
Only a fool learns from
his own mistakes.
The wise [person]
learns from the
mistakes of others.
Paraphrased
from
Anonymous
Otto von Bismark
“
”
“
”
“
”
5 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Comparing Castles and Mainframes
Purpose Castle Mainframe
Accumulation of Wealth
Centralized repository for the most
valuable assets of the day
Centralized repository of the critical assets
that define an enterprise’s value
Administration
Focal point for information aggregation,
focus for analysis of gathered intelligence
for decision making
Focal point for information aggregation,
focus for analysis gathered intelligence
for decision making
Protection
Progressively more sophisticated
architecture protecting against
progressively more sophisticated attacks
Progressively more sophisticated
architecture protecting against
progressively more sophisticated attacks
6 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
What Can the History of Castle Technology
Tell Us About Managing the Mainframe
Arms Race did not originate in
the 20th century.
Castle fortifications and counters
developed by attackers to
overcome them replicate the last
50 years of the mainframe in
many ways.
Learning from that history
offers direction for the future
of the mainframe.
7 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
The Beginning – Walls and a Single Gate…
Earliest Mainframe
Isolated in the glass house
with physical access control
Earliest Castles
Forts – a single wall with a guarded gate
© International Business Machines Corporation (IBM)
8 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Some Direct Correlations
Mainframe
CA ACF2 and, later, IBM RACF and CA Top
Secret set the standard for “gate-keeping”
of electronic resources.
Castles
Still required entry and exit of people,
requiring guards at the gates.
9 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Mainframe
Forcing entry onto the network
gave access to the console.
Castles
Rams battered the gates and, once
down, the castle was open.
Earliest Attacks – Bluntest of Forces
10 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Escalation – Higher, Thicker Walls Lead to
More Sophisticated Engineering of Attacks
Castle builders reinforced gates,
heightened-thicken walls…
Attackers devised more sophisticated
means of brute force
11 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
What’s a Sapper?
Direct brute force was not the only or, sometimes,
even the most effective means for opening a breach
in the castle wall.
Soldiers – miners, really –
called “sappers”
tunneled beneath the walls
to weaken their foundations.
12 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Social Engineers are Mainframe “Sappers”
 While the precise mechanics of
large scale breaches seldom
come fully to light, nor quickly
 Still, some report or speculate
that social engineering to obtain
credentials lies at the root of
recent major breaches
Data Source: Click on image to link to the informationisbeautiful.net web page
13 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
 Mainframe external
security managers offer no
greater protection against
social engineering than
other IAMs
 Once a privileged
account is compromised,
the foundation of all
protections is destroyed
Social Engineers Tunnel Underneath
Mainframe Protections
14 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Some Direct Correlations
Mainframe
As connectivity increased, we surrounded
the mainframe with firewalls.
Castles
Once walls alone were not
enough, moats were added.
Request a
web page
Stateful Packet
Inspection Firewall
This was requested by
a computer on the home
network, deliver it.
This was not requested
by a computer on the
home network, drop it..
1
3
2
2
Internet
Here’s the web file
transfer you asked for.
1
Here’s the web page
you asked for.
15 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Gunpowder Changed Everything
 The advent of gunpowder reduced
the cost of attack, while increasing
its efficiency
 Even the mightiest castle could no
longer be considered impregnable
16 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
How the Nordea Hack is the Mainframe’s Gunpowder
Even the mightiest castle could no longer
be considered impregnable…
Pirate Bay co-founder Gottfrid Svartholm Warg was
charged with hacking the IBM mainframe of Logica, a
Swedish IT firm that provided tax services to the Swedish
government, and the IBM mainframe of the Swedish
Nordea bank, the Swedish public prosecutor said.
"This is the biggest investigation into data intrusion ever
performed in Sweden," said public prosecutor Henrik
Olin.
Besides Svartholm Warg, the prosecution charged three
other Swedish citizens.
17 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
What Do These People Have in Common?
18 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Matching Tools To Threats
 Threat of data breach – data-centric protection
supplementing user and resource management
 Threat of network attack – increased perimeter
defenses and more frequent penetration testing
 Threat of compromised privileged user accounts
– Event drive alerts for sensitive transactions
– Frequent, automated analysis of user activity
– Additional authentication factors
Protection of Mainframe Assets
Must Be a Risk-based Approach
18 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
19 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Focused shifted from solely keeping
attackers out, to identifying attackers
before they arrived
 Identifying attacks before they occur required
new strategies, techniques, and tools…
Protecting Castles’ Contents Changed
19 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
20 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Recommended Sessions
SESSION # TITLE DATE/TIME
Tech Talk
Isn’t one authentication mechanism on z Systems™
enough?
11/18 – 4:30pm
Mainframe Content Center
Mainframe
Theater
Panel Discussion: Is Complacency Around Mainframe
Security a Disaster Waiting to Happen?
11/18 – 3:45pm
Mainframe Theater
Tech Talk
The Known Unknown – Finding lost, abandoned, and
hidden regulated data on the Mainframe
11/19 – 12:15pm
Mainframe Content Center
MFX26S
How to Increase User Accountability by Eliminating the
Default User in Unix System Services
11/19 – 1:00pm
Breakers I
MFX47S
Top 10 things you shout NOT forget when evaluating
your security implementation
11/19 – 2:00pm
Breakers I
21 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Follow Conversations in the Mainframe Content Center
CA Data Content Discovery
CA ACF2 ™ for z/OS
CA Top Secret® for z/OS
CA Cleanup
CA Auditor
Product X
Theater # location
Advanced Authentication –
Nov 18th @ 4:30pm
The Known Unknown -
Nov 19th @ 12:15pm
22 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Q & A
23 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
For Informational Purposes Only
Terms of this Presentation
© 2015 CA. All rights reserved. All trademarks referenced herein belong to their respective companies. The presentation provided at CA
World 2015 is intended for information purposes only and does not form any type of warranty. Some of the specific slides with customer
references relate to customer's specific use and experience of CA products and solutions so actual results may vary.
Certain information in this presentation may outline CA’s general product direction. This presentation shall not serve to (i) affect the rights
and/or obligations of CA or its licensees under any existing or future license agreement or services agreement relating to any CA software
product; or (ii) amend any product documentation or specifications for any CA software product. This presentation is based on current
information and resource allocations as of November 18, 2015, and is subject to change or withdrawal by CA at any time without notice. The
development, release and timing of any features or functionality described in this presentation remain at CA’s sole discretion.
Notwithstanding anything in this presentation to the contrary, upon the general availability of any future CA product release referenced in
this presentation, CA may make such release available to new licensees in the form of a regularly scheduled major product release. Such
release may be made available to licensees of the product who are active subscribers to CA maintenance and support, on a when and if-
available basis. The information in this presentation is not deemed to be incorporated into any contract.
24 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
For More Information
To learn more, please visit:
http://cainc.to/Nv2VOe
CA World ’15

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Ready, Set, Shop! The Pressure is on For Your Applications to Perform Flawl...
Ready, Set, Shop! The Pressure is on For Your Applications to Perform Flawl...Ready, Set, Shop! The Pressure is on For Your Applications to Perform Flawl...
Ready, Set, Shop! The Pressure is on For Your Applications to Perform Flawl...
 
Get the Most From Your Software Licenses with CA Software Asset Management
Get the Most From Your Software Licenses with CA Software Asset ManagementGet the Most From Your Software Licenses with CA Software Asset Management
Get the Most From Your Software Licenses with CA Software Asset Management
 
Is Complacency Around Mainframe Security a Disaster Waiting to Happen?
Is Complacency Around Mainframe Security a Disaster Waiting to Happen?Is Complacency Around Mainframe Security a Disaster Waiting to Happen?
Is Complacency Around Mainframe Security a Disaster Waiting to Happen?
 
Maximizing Your CA IDMS™ Investment for the New Application Economy (Part 2)
Maximizing Your CA IDMS™ Investment for the New Application Economy (Part 2)Maximizing Your CA IDMS™ Investment for the New Application Economy (Part 2)
Maximizing Your CA IDMS™ Investment for the New Application Economy (Part 2)
 
Accelerate Dev Test with Microsoft® Azure™ and CA Service Virtualization on D...
Accelerate Dev Test with Microsoft® Azure™ and CA Service Virtualization on D...Accelerate Dev Test with Microsoft® Azure™ and CA Service Virtualization on D...
Accelerate Dev Test with Microsoft® Azure™ and CA Service Virtualization on D...
 
New Mainframe IT Analytics: Actionable Insight into Root Cause Analysis of Pe...
New Mainframe IT Analytics: Actionable Insight into Root Cause Analysis of Pe...New Mainframe IT Analytics: Actionable Insight into Root Cause Analysis of Pe...
New Mainframe IT Analytics: Actionable Insight into Root Cause Analysis of Pe...
 
CA Performance Management 2.6 Deep Dive
CA Performance Management 2.6 Deep DiveCA Performance Management 2.6 Deep Dive
CA Performance Management 2.6 Deep Dive
 
TechTalk: Reduce Risk with Canary Deployments
TechTalk: Reduce Risk with Canary DeploymentsTechTalk: Reduce Risk with Canary Deployments
TechTalk: Reduce Risk with Canary Deployments
 
CA InterTest™ : The Answer to Faster Application Development With High Qualit...
CA InterTest™ : The Answer to Faster Application Development With High Qualit...CA InterTest™ : The Answer to Faster Application Development With High Qualit...
CA InterTest™ : The Answer to Faster Application Development With High Qualit...
 
See Mainframe Data in a New Way With CA File Master™ Plus
See Mainframe Data in a New Way With CA File Master™ PlusSee Mainframe Data in a New Way With CA File Master™ Plus
See Mainframe Data in a New Way With CA File Master™ Plus
 
See Inside the Middleware Black Box
See Inside the Middleware Black Box See Inside the Middleware Black Box
See Inside the Middleware Black Box
 
Technology Primer: Monitor Microservices, Containers, Cloud Foundry and Node ...
Technology Primer: Monitor Microservices, Containers, Cloud Foundry and Node ...Technology Primer: Monitor Microservices, Containers, Cloud Foundry and Node ...
Technology Primer: Monitor Microservices, Containers, Cloud Foundry and Node ...
 
Pre-Con Education: How to Deliver a "5-Star" Mobile App Experience With CA ...
Pre-Con Education: How to Deliver a "5-Star" Mobile App Experience With CA ...Pre-Con Education: How to Deliver a "5-Star" Mobile App Experience With CA ...
Pre-Con Education: How to Deliver a "5-Star" Mobile App Experience With CA ...
 
Tech Talk: Harness the Power of Innovations Like Microservice Architecture an...
Tech Talk: Harness the Power of Innovations Like Microservice Architecture an...Tech Talk: Harness the Power of Innovations Like Microservice Architecture an...
Tech Talk: Harness the Power of Innovations Like Microservice Architecture an...
 
Moving to New Processes to Collaborate With You to Deliver Product Enhancemen...
Moving to New Processes to Collaborate With You to Deliver Product Enhancemen...Moving to New Processes to Collaborate With You to Deliver Product Enhancemen...
Moving to New Processes to Collaborate With You to Deliver Product Enhancemen...
 
Hands-On Lab: CA Spectrum® 10.0 Deep Dive – 64-Bit, Network Virtualization an...
Hands-On Lab: CA Spectrum® 10.0 Deep Dive – 64-Bit, Network Virtualization an...Hands-On Lab: CA Spectrum® 10.0 Deep Dive – 64-Bit, Network Virtualization an...
Hands-On Lab: CA Spectrum® 10.0 Deep Dive – 64-Bit, Network Virtualization an...
 
Case Study: University of Chicago Achieves High Availability through a Centr...
Case Study:  University of Chicago Achieves High Availability through a Centr...Case Study:  University of Chicago Achieves High Availability through a Centr...
Case Study: University of Chicago Achieves High Availability through a Centr...
 
Knock, Knock…The Internet of Things wants to come in?
Knock, Knock…The Internet of Things wants to come in? Knock, Knock…The Internet of Things wants to come in?
Knock, Knock…The Internet of Things wants to come in?
 
Vision and Roadmap: Learn How Application Release Solutions Help You Lead th...
Vision and Roadmap: Learn How Application Release Solutions Help You Lead th...Vision and Roadmap: Learn How Application Release Solutions Help You Lead th...
Vision and Roadmap: Learn How Application Release Solutions Help You Lead th...
 
Modernizing COBOL Applications with CA GEN
Modernizing COBOL Applications with CA GENModernizing COBOL Applications with CA GEN
Modernizing COBOL Applications with CA GEN
 

Andere mochten auch

Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
Aeman Khan
 

Andere mochten auch (20)

Digital marketing presentation - security risks for websites
Digital marketing presentation - security risks for websitesDigital marketing presentation - security risks for websites
Digital marketing presentation - security risks for websites
 
SplunkLive! Amsterdam 2015 - Analytics based security breakout
SplunkLive! Amsterdam 2015 - Analytics based security breakoutSplunkLive! Amsterdam 2015 - Analytics based security breakout
SplunkLive! Amsterdam 2015 - Analytics based security breakout
 
How marketing technology can amp your digital marketing 2017
How marketing technology can amp your digital marketing 2017How marketing technology can amp your digital marketing 2017
How marketing technology can amp your digital marketing 2017
 
The Disruptive nature of digital technology
The Disruptive nature of digital technologyThe Disruptive nature of digital technology
The Disruptive nature of digital technology
 
Final Year Project Guidance
Final Year Project GuidanceFinal Year Project Guidance
Final Year Project Guidance
 
THE GENERATION OF COMPUTER
THE GENERATION OF COMPUTERTHE GENERATION OF COMPUTER
THE GENERATION OF COMPUTER
 
Computer generations
Computer generationsComputer generations
Computer generations
 
Chapter 3 Computer Crimes
Chapter 3 Computer  CrimesChapter 3 Computer  Crimes
Chapter 3 Computer Crimes
 
TWO-FACTOR DATA SECURITY PROTECTION MECHANISM FOR CLOUD STORAGE SYSTEM
TWO-FACTOR DATA SECURITY PROTECTION MECHANISM FOR CLOUD STORAGE SYSTEMTWO-FACTOR DATA SECURITY PROTECTION MECHANISM FOR CLOUD STORAGE SYSTEM
TWO-FACTOR DATA SECURITY PROTECTION MECHANISM FOR CLOUD STORAGE SYSTEM
 
Computer crime
 Computer crime Computer crime
Computer crime
 
Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
 
Security & protection in operating system
Security & protection in operating systemSecurity & protection in operating system
Security & protection in operating system
 
Visual and Creative Thinking:What We Learned From Peter Pan and Willy Wonka
Visual and Creative Thinking:What We Learned From Peter Pan and Willy WonkaVisual and Creative Thinking:What We Learned From Peter Pan and Willy Wonka
Visual and Creative Thinking:What We Learned From Peter Pan and Willy Wonka
 
Computer generation
Computer generationComputer generation
Computer generation
 
Generations of computer
Generations of computerGenerations of computer
Generations of computer
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
CSS Grid Layout for Topconf, Linz
CSS Grid Layout for Topconf, LinzCSS Grid Layout for Topconf, Linz
CSS Grid Layout for Topconf, Linz
 
Cyber security
Cyber securityCyber security
Cyber security
 

Ähnlich wie Castle Walls Under Digital Siege: Risk-based Security for z/OS

CA Unified Infrastructure Management Network Performance Management Capabili...
 CA Unified Infrastructure Management Network Performance Management Capabili... CA Unified Infrastructure Management Network Performance Management Capabili...
CA Unified Infrastructure Management Network Performance Management Capabili...
CA Technologies
 

Ähnlich wie Castle Walls Under Digital Siege: Risk-based Security for z/OS (20)

Protecting the Software-Defined Data Center from Data Breach
Protecting the Software-Defined Data Center from Data BreachProtecting the Software-Defined Data Center from Data Breach
Protecting the Software-Defined Data Center from Data Breach
 
Ten Things You Should not Forget in Mainframe Security
Ten Things You Should not Forget in Mainframe Security Ten Things You Should not Forget in Mainframe Security
Ten Things You Should not Forget in Mainframe Security
 
Case Study: Intel Corporation - The Benefits of, and Need for Agile Operation...
Case Study: Intel Corporation - The Benefits of, and Need for Agile Operation...Case Study: Intel Corporation - The Benefits of, and Need for Agile Operation...
Case Study: Intel Corporation - The Benefits of, and Need for Agile Operation...
 
Hands-On Labs: Introduction to CA Unified Infrastructure Management
Hands-On Labs: Introduction to CA Unified Infrastructure Management Hands-On Labs: Introduction to CA Unified Infrastructure Management
Hands-On Labs: Introduction to CA Unified Infrastructure Management
 
The Known Unknown—Finding Lost, Abandoned and Hidden Regulated or Sensitive D...
The Known Unknown—Finding Lost, Abandoned and Hidden Regulated or Sensitive D...The Known Unknown—Finding Lost, Abandoned and Hidden Regulated or Sensitive D...
The Known Unknown—Finding Lost, Abandoned and Hidden Regulated or Sensitive D...
 
Tech Talk: Preventing Data Breaches with Risk-Aware Session Management
Tech Talk: Preventing Data Breaches with Risk-Aware Session ManagementTech Talk: Preventing Data Breaches with Risk-Aware Session Management
Tech Talk: Preventing Data Breaches with Risk-Aware Session Management
 
CLASS 2016 - Palestra Vitor Eduardo Lace Maganha
CLASS 2016 - Palestra Vitor Eduardo Lace MaganhaCLASS 2016 - Palestra Vitor Eduardo Lace Maganha
CLASS 2016 - Palestra Vitor Eduardo Lace Maganha
 
Locating Unmanaged but Regulated Data on System z: CA Data Content Discovery
Locating Unmanaged but Regulated Data on System z: CA Data Content DiscoveryLocating Unmanaged but Regulated Data on System z: CA Data Content Discovery
Locating Unmanaged but Regulated Data on System z: CA Data Content Discovery
 
CA Single Sign-On (CA SSO), The Innocent Bystander
CA Single Sign-On (CA SSO),The Innocent BystanderCA Single Sign-On (CA SSO),The Innocent Bystander
CA Single Sign-On (CA SSO), The Innocent Bystander
 
CA UIM for z Systems Technical Deep Dive: Get the Right People Solving Probl...
CA UIM for z Systems Technical  Deep Dive: Get the Right People Solving Probl...CA UIM for z Systems Technical  Deep Dive: Get the Right People Solving Probl...
CA UIM for z Systems Technical Deep Dive: Get the Right People Solving Probl...
 
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...
 
Technology Primer: Building Applications the New-Fashioned Way
Technology Primer: Building Applications the New-Fashioned WayTechnology Primer: Building Applications the New-Fashioned Way
Technology Primer: Building Applications the New-Fashioned Way
 
Fleet Concerns
Fleet ConcernsFleet Concerns
Fleet Concerns
 
See It Live - Single Pane of Glass Enterprise Monitoring with CA Unified Infr...
See It Live - Single Pane of Glass Enterprise Monitoring with CA Unified Infr...See It Live - Single Pane of Glass Enterprise Monitoring with CA Unified Infr...
See It Live - Single Pane of Glass Enterprise Monitoring with CA Unified Infr...
 
CA Unified Infrastructure Management Network Performance Management Capabili...
 CA Unified Infrastructure Management Network Performance Management Capabili... CA Unified Infrastructure Management Network Performance Management Capabili...
CA Unified Infrastructure Management Network Performance Management Capabili...
 
Security Opening Keynote Address: Security Drives DIGITAL TRANSFORMATION in...
Security Opening Keynote Address: Security Drives DIGITAL TRANSFORMATION in...Security Opening Keynote Address: Security Drives DIGITAL TRANSFORMATION in...
Security Opening Keynote Address: Security Drives DIGITAL TRANSFORMATION in...
 
Infrastructure Performance Management: Flexibility Combining Breadth, Depth ...
Infrastructure Performance Management: Flexibility Combining Breadth, Depth ...Infrastructure Performance Management: Flexibility Combining Breadth, Depth ...
Infrastructure Performance Management: Flexibility Combining Breadth, Depth ...
 
Building Up Network Security: Intrusion Prevention and Sourcefire
Building Up Network Security: Intrusion Prevention and SourcefireBuilding Up Network Security: Intrusion Prevention and Sourcefire
Building Up Network Security: Intrusion Prevention and Sourcefire
 
Stop the Blame Game with Increased Visibility of your Mobile-to-Mainframe IT ...
Stop the Blame Game with Increased Visibility of your Mobile-to-Mainframe IT ...Stop the Blame Game with Increased Visibility of your Mobile-to-Mainframe IT ...
Stop the Blame Game with Increased Visibility of your Mobile-to-Mainframe IT ...
 
Taking IT Analytics to the Next Level
Taking IT Analytics to the Next LevelTaking IT Analytics to the Next Level
Taking IT Analytics to the Next Level
 

Mehr von CA Technologies

Mehr von CA Technologies (20)

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
 

Kürzlich hochgeladen

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Kürzlich hochgeladen (20)

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 

Castle Walls Under Digital Siege: Risk-based Security for z/OS

  • 1. Castle Walls Under Digital Siege: Risk-based Security and z/OS Kevin Segreti Mainframe Union Bank of California MFT09S @jcherrington #CAWorld Jeff Cherrington CA Technologies
  • 2. 2 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Abstract The mainframe remains the most securable platform in the data center. However, like medieval castles, their walls are no longer impregnable. Learn more about how applying risk-based security to z/OS helps you anticipate attacks and compromises before they occur, so you can enhance your walls of protection to your mission-critical data. Kevin Segreti Union Bank of California Assistant Vice President Jeff Cherrington CA Technologies Sr. Director, Mainframe Security
  • 3. 3 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Agenda WHAT DO CASTLES HAVE TO DO WITH THE MAINFRAME? ARMS RACE – CIRCA THE MIDDLE AGES QUESTION & ANSWER SAPPERS AND SOCIAL ENGINEERING WHY THE NORDEA HACK IS THE MAINFRAME GUNPOWDER PROTECTING YOUR CASTLE – A RISK-BASED APPROACH 1 2 3 4 5 6
  • 4. 4 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD How History Bears on Protecting the Mainframe Today Those who cannot remember the past are doomed to repeat it. George Santayana A smart [person] learns from their own mistakes; a wise [person] learns from the mistakes of others. Only a fool learns from his own mistakes. The wise [person] learns from the mistakes of others. Paraphrased from Anonymous Otto von Bismark “ ” “ ” “ ”
  • 5. 5 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Comparing Castles and Mainframes Purpose Castle Mainframe Accumulation of Wealth Centralized repository for the most valuable assets of the day Centralized repository of the critical assets that define an enterprise’s value Administration Focal point for information aggregation, focus for analysis of gathered intelligence for decision making Focal point for information aggregation, focus for analysis gathered intelligence for decision making Protection Progressively more sophisticated architecture protecting against progressively more sophisticated attacks Progressively more sophisticated architecture protecting against progressively more sophisticated attacks
  • 6. 6 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD What Can the History of Castle Technology Tell Us About Managing the Mainframe Arms Race did not originate in the 20th century. Castle fortifications and counters developed by attackers to overcome them replicate the last 50 years of the mainframe in many ways. Learning from that history offers direction for the future of the mainframe.
  • 7. 7 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD The Beginning – Walls and a Single Gate… Earliest Mainframe Isolated in the glass house with physical access control Earliest Castles Forts – a single wall with a guarded gate © International Business Machines Corporation (IBM)
  • 8. 8 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Some Direct Correlations Mainframe CA ACF2 and, later, IBM RACF and CA Top Secret set the standard for “gate-keeping” of electronic resources. Castles Still required entry and exit of people, requiring guards at the gates.
  • 9. 9 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Mainframe Forcing entry onto the network gave access to the console. Castles Rams battered the gates and, once down, the castle was open. Earliest Attacks – Bluntest of Forces
  • 10. 10 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Escalation – Higher, Thicker Walls Lead to More Sophisticated Engineering of Attacks Castle builders reinforced gates, heightened-thicken walls… Attackers devised more sophisticated means of brute force
  • 11. 11 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD What’s a Sapper? Direct brute force was not the only or, sometimes, even the most effective means for opening a breach in the castle wall. Soldiers – miners, really – called “sappers” tunneled beneath the walls to weaken their foundations.
  • 12. 12 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Social Engineers are Mainframe “Sappers”  While the precise mechanics of large scale breaches seldom come fully to light, nor quickly  Still, some report or speculate that social engineering to obtain credentials lies at the root of recent major breaches Data Source: Click on image to link to the informationisbeautiful.net web page
  • 13. 13 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD  Mainframe external security managers offer no greater protection against social engineering than other IAMs  Once a privileged account is compromised, the foundation of all protections is destroyed Social Engineers Tunnel Underneath Mainframe Protections
  • 14. 14 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Some Direct Correlations Mainframe As connectivity increased, we surrounded the mainframe with firewalls. Castles Once walls alone were not enough, moats were added. Request a web page Stateful Packet Inspection Firewall This was requested by a computer on the home network, deliver it. This was not requested by a computer on the home network, drop it.. 1 3 2 2 Internet Here’s the web file transfer you asked for. 1 Here’s the web page you asked for.
  • 15. 15 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Gunpowder Changed Everything  The advent of gunpowder reduced the cost of attack, while increasing its efficiency  Even the mightiest castle could no longer be considered impregnable
  • 16. 16 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD How the Nordea Hack is the Mainframe’s Gunpowder Even the mightiest castle could no longer be considered impregnable… Pirate Bay co-founder Gottfrid Svartholm Warg was charged with hacking the IBM mainframe of Logica, a Swedish IT firm that provided tax services to the Swedish government, and the IBM mainframe of the Swedish Nordea bank, the Swedish public prosecutor said. "This is the biggest investigation into data intrusion ever performed in Sweden," said public prosecutor Henrik Olin. Besides Svartholm Warg, the prosecution charged three other Swedish citizens.
  • 17. 17 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD What Do These People Have in Common?
  • 18. 18 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Matching Tools To Threats  Threat of data breach – data-centric protection supplementing user and resource management  Threat of network attack – increased perimeter defenses and more frequent penetration testing  Threat of compromised privileged user accounts – Event drive alerts for sensitive transactions – Frequent, automated analysis of user activity – Additional authentication factors Protection of Mainframe Assets Must Be a Risk-based Approach 18 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
  • 19. 19 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Focused shifted from solely keeping attackers out, to identifying attackers before they arrived  Identifying attacks before they occur required new strategies, techniques, and tools… Protecting Castles’ Contents Changed 19 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
  • 20. 20 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Recommended Sessions SESSION # TITLE DATE/TIME Tech Talk Isn’t one authentication mechanism on z Systems™ enough? 11/18 – 4:30pm Mainframe Content Center Mainframe Theater Panel Discussion: Is Complacency Around Mainframe Security a Disaster Waiting to Happen? 11/18 – 3:45pm Mainframe Theater Tech Talk The Known Unknown – Finding lost, abandoned, and hidden regulated data on the Mainframe 11/19 – 12:15pm Mainframe Content Center MFX26S How to Increase User Accountability by Eliminating the Default User in Unix System Services 11/19 – 1:00pm Breakers I MFX47S Top 10 things you shout NOT forget when evaluating your security implementation 11/19 – 2:00pm Breakers I
  • 21. 21 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Follow Conversations in the Mainframe Content Center CA Data Content Discovery CA ACF2 ™ for z/OS CA Top Secret® for z/OS CA Cleanup CA Auditor Product X Theater # location Advanced Authentication – Nov 18th @ 4:30pm The Known Unknown - Nov 19th @ 12:15pm
  • 22. 22 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Q & A
  • 23. 23 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD For Informational Purposes Only Terms of this Presentation © 2015 CA. All rights reserved. All trademarks referenced herein belong to their respective companies. The presentation provided at CA World 2015 is intended for information purposes only and does not form any type of warranty. Some of the specific slides with customer references relate to customer's specific use and experience of CA products and solutions so actual results may vary. Certain information in this presentation may outline CA’s general product direction. This presentation shall not serve to (i) affect the rights and/or obligations of CA or its licensees under any existing or future license agreement or services agreement relating to any CA software product; or (ii) amend any product documentation or specifications for any CA software product. This presentation is based on current information and resource allocations as of November 18, 2015, and is subject to change or withdrawal by CA at any time without notice. The development, release and timing of any features or functionality described in this presentation remain at CA’s sole discretion. Notwithstanding anything in this presentation to the contrary, upon the general availability of any future CA product release referenced in this presentation, CA may make such release available to new licensees in the form of a regularly scheduled major product release. Such release may be made available to licensees of the product who are active subscribers to CA maintenance and support, on a when and if- available basis. The information in this presentation is not deemed to be incorporated into any contract.
  • 24. 24 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD For More Information To learn more, please visit: http://cainc.to/Nv2VOe CA World ’15