ALL >> Computers >> View Article
Securing Ftp With Z/os Security Profiles
Maintaining control over who accesses the data on mainframe systems is crucial. IBM's RACF and CA's ACF2 and Top Secret can keep a system fairly secure. But by themselves they are not adequate to protect against dangerous FTP functions. As mainframe handles critical business data and applications, it is very important to have security measures and controls in place. Especially, with z/OS FTP, there are high probabilities of data snooping, which can be avoided using a suitable security software.
FTP with traditional RACF dataset protection
Traditional RACF rules regarding dataset security may restrict users to read-only access. But with FTP, if users can read a file, they can offload that file for their personal use. They can copy your data to a flash drive, or email it anywhere in the world. Thus, restrictions on dataset access fall short of what is needed when standard FTP is available on the mainframe.
Snooping issue with FTP session
Traditionally, mainframe users are a small number of trusted people whose activities are limited by the applications they use. But with standard FTP, almost ...
... anyone with a user ID can get on the mainframe and snoop around. Any hacker who manages to get a user ID can use a '/u' command, for example, to list the contents of that user's workspaces, and maybe retrieve files.
The SITE command and the issues
z/OS FTP SITE commands are not standardized; they vary from server to server. They are useful for handling things like file permissions and group memberships. However, they can also allow dangerous operations over the network. For example, with the FILETYPE=JES command, an FTP client can submit jobs to, and pull reports from, the JES queue. SITE can also be used to change permission bits for a file, or to list detailed information about the storage devices on the network.
Treating FTP functions as protectable resources
Thus, basic protection mechanisms are not enough to secure z/OS FTP and make it a true enterprise-class protocol. You can solve that problem, however, by implementing software that wraps around FTP resources and protects them with RACF security profiles. It will create a link between z/OS FTP servers and z/OS security that will restrict the usage of unwanted FTP commands.
By using security software for z/OS FTP, the mainframe administrator can selectively restrict access to FTP functions and commands. He can allow FTP users to transfer the files they need, while preventing them from using FTP to snoop around. Thus you can make RACF into a complete security solution for protecting your mainframe system from malicious behavior through FTP.
Since 1982, Software Diversified Services is providing first-quality software and technical support for IBM mainframes and VM, VSE, mainframe ftp and z/OS systems. SDS mainframe software provides security, encryption, compression for mainframe data, OSA express monitoring, secure file transfer (SFTP), SNA and IP network management and automation.
Add Comment
Computers Articles
1. How To Develop An App From Scratch In 13 StepsAuthor: goodcoders
2. 7 Steps To Create A Safe Mobile App
Author: goodcoders
3. Why Do Businesses Need Vendor Management Software?
Author: Kiran
4. React Native App Development By Alvi Software
Author: Alvi Software
5. Custome
Author: Owner
6. Few Good Insights To Follow With Pc Gaming In Australia!
Author: Jack Williams
7. Transform Your Online Store With Australia's Leading Ecommerce Developers
Author: themerchantbuddy
8. How To Choose The Right Technology For Your mobile App?
Author: goodcoders
9. The Rise Of User Centered Web Design
Author: goodcoders
10. Reasons Why Laravel Perfect For Web Development?
Author: goodcoders
11. Ssd Vs Sas Vs Sata Drives: Which Is Better For Your Dedicated Server Hardware?
Author: The CyberTech
12. Raid Servers And Data Protection: Common Myths About Raid Servers
Author: The CyberTech
13. Top 8 Do's And Don’ts When Dealing With A Corrupted Sd Card
Author: The CyberTech
14. Nvme Vs Ssd: What To Choose For Your Storage Solutions?
Author: The CyberTech
15. 8 Common Data Recovery Myths Exposed!
Author: The CyberTech