Virtual Security Zones on z/vm

Similar documents
Virtual Security Zones

Session zse4187 Virtual Security Zones on z/vm

Virtual Security Zones on z/vm

Security Zones on z/vm

Redpaper. Security Zones on IBM System z: Defining and Enforcing Multiple Security Zones. Introduction. Alan Altmark

The z/vm Virtual Switch Advancing the Art of Virtual Networking

z/vm Virtual Switch: The Basics

z/vm Security and Integrity

High Availability and Automatic Network Failover of the z/vm VSWITCH

HiperSockets for System z Newest Functions

RACF/VM: Protecting your z/vm system from vandals and other cyberspace miscreants

z/vm Security Essentials

z/vm 6.3 Installation or Migration or Upgrade Hands-on Lab Sessions

z/vm Live Guest Relocation Planning and Use

z/vm Live Guest Relocation - Planning and Use

IBM Client Center z/vm 6.2 Single System Image (SSI) & Life Guest Relocation (LGR) DEMO

Dynamic Routing: Exploiting HiperSockets and Real Network Devices

z/vm 6.3 A Quick Introduction

SHARE in Pittsburgh Session 15801

IBM ^ iseries Logical Partition Isolation and Integrity

Understanding VLANs when Sharing OSA Ports on System z

ZVM20: z/vm PAV and HyperPAV Support

Introduction to RACF on z/vm

Best Practices for WebSphere Application Server on System z Linux

Ensemble Enabling z/vm V6.2 and Linux for System z

Dynamic Routing: Exploiting HiperSockets and Real Network Devices

z/vm: The Value of zseries Virtualization Technology for Linux

z/vm Single System Image and Guest Mobility Preview

z/vm Data Collection for zpcr and zcp3000 Collecting the Right Input Data for a zcp3000 Capacity Planning Model

ZVM17: z/vm Device Support Overview

IBM Cloud Manager with OpenStack: z/vm Integration Considerations

IBM i Version 7.2. Systems management Logical partitions IBM

z/vm Evaluation Edition

Enterprise Workload Manager Overview and Implementation

Migration Roadmap for LANRES For z/vm Customers - Where to go from here?

IBM Tivoli Directory Server for z/os. Saheem Granados, CISSP IBM Monday, August 6,

Roundtable: Shaping the Future of z/os System Programmer Tasks Discussion

System z Virtualization and Linux Workshop Bootcamp System z Hardware / Architecture

z/vm TCP/IP Configuration Miguel Delapaz z/vm TCP/IP Development Sunday, 20 April 2008

Introduction to. z/vm and Linux on System z. Malcolm Beattie Linux Technical Consultant, IBM UK. From a presentation by Ralf Schiefelbein, IBM Germany

SAP on IBM z Systems. Customer Conference. April 12-13, 2016 IBM Germany Research & Development

IBM zenterprise Unified Resource Manager Overview

VM Parallel Access Volume (PAV) and HyperPAV Support

z/os 2.1 HCD HMCwide Dynamic Activate

V6R1 System i Navigator: What s New

z/osmf 2.1 User experience Session: 15122

The Basics of Using z/vm

IBM Tape Manager for z/vm and DFSMSRMS z/vm in a TS7700 Tape Grid Environment

Linux Platform Options Selecting Linux on IBM System z9 and zseries

iseries Tech Talk Linux on iseries Technical Update 2004

L12. Linux Platform Options Selecting Linux on IBM System z9 and zseries. Jim Elliott San Francisco, CA. September 19-23, 2005

Session V61. Systems Management on z/vm Christine Casey z/vm Development - IBM Endicott, NY. IBM System z Expo September 17-21, 2007 San Antonio, TX

z/osmf 2.1 Advanced Programming

CSE For High Availability and System Management

Advanced Configuration and Auditing with RACF on z/vm

CSE For High Availability and System Management

Session 9112 z/vm TCP/IP Stack Configuration

z/os Data Set Encryption In the context of pervasive encryption IBM z systems IBM Corporation

Running Linux-HA on a IBM System z

WebSphere Application Server Base Performance

13196: HiperSockets on System zec12 Overview

Server for IBM i. Dawn May Presentation created by Tim Rowe, 2008 IBM Corporation

Computing as a Service

Introduction to Virtualization: z/vm Basic Concepts and Terminology

KVM for IBM z Systems

IBM Geographically Dispersed Resiliency for Power Systems. Version Release Notes IBM

RACF Advanced Configuration and Auditing on z/vm Bruce Hayden IBM Advanced Technical Skills Endicott, NY

17655: Discussion: The New z/os Interface for the Touch Generation

Finding your Way The z/vm Website, Documentation and Other Hints for the New User

Greg Daynes z/os Software Deployment

High Availability for Linux on IBM System z Servers

Deploying Windows Server 2003 Internet Authentication Service (IAS) with Virtual Local Area Networks (VLANs)

IBM Cluster Systems Management V1.7 extends hardware and operating system support

IBM Multi-Factor Authentication in a Linux on IBM Z environment - Example with z/os MFA infrastructure

The zenterprise Unified Resource Manager IBM Corporation

Name : Mark Gambino Venue : Communications Subcommittee

System z: Checklist for Establishing Group Capacity Profiles

IBM zenterprise System

Advanced Technical Skills (ATS) North America. John Burg Brad Snyder Materials created by John Fitch and Jim Shaw IBM Washington Systems Center

Setting up IBM zaware Step by Step

RACF Advanced Configuration and Auditing on z/vm

Introduction to Virtualization: z/vm Basic Concepts and Terminology

Planning and Migrating to z/vm Single System Image (SSI)

Lab Exercise: z/osmf Incident Log Session ID: Part of 15814, 15815, and 15604

Now Available in z/os V2R2 JES3: OUTDISP

Active Energy Manager. Image Management. TPMfOSD BOFM. Automation Status Virtualization Discovery

Cloud on z Systems Solution Overview: IBM Cloud Manager with OpenStack

A Pragmatic Path to Compliance. Jaffa Law

IBM Application Runtime Expert for i

Mary Komor Development Tools Subcommittee

Running Docker applications on Linux on the Mainframe

How Smarter Systems Deliver Smarter Economics and Optimized Business Continuity

A Look into Linux on System z with DB2 LUW

Implementation of Red Hat Linux on z: User Experiences at Isracard

IBM Virtualization Engine TS7700 Series Best Practices. Usage with Linux on System z 1.0

Behind the Glitz - Is Life Better on Another Database Platform?

IBM Security QRadar Version Forwarding Logs Using Tail2Syslog Technical Note

Considerations for Deploying Cisco Expressway Solutions on a Business Edition Server

Table of Contents 1 VLAN Configuration 1-1

z/vm Platform Update Steve Wilkins IBM Endicott z/vm Development CAVMEN User Group Meeting October 20, 2011 Version 6

Transcription:

Virtual Security Zones on z/vm Session 16479 Alan Altmark Senior Managing z/vm Consultant IBM Systems Lab Services

Trademarks The following are trademarks of the International Business Machines Corporation in the United States and/or other countries. IBM* IBM logo* System Storage* System z* System z9* System z10* z9* z10 z/os* z/vm* zenterprise* * Registered trademarks of IBM Corporation The following are trademarks or registered trademarks of other companies. Intel is a trademark of Intel Corporation in the United States, other countries, or both. Java and all Java-related trademarks and logos are trademarks of Sun Microsystems, Inc., in the United States and other countries Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both. UNIX is a registered trademark of The Open Group in the United States and other countries. Microsoft, Windows and Windows NT are registered trademarks of Microsoft Corporation. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries. * All other products may be trademarks or registered trademarks of their respective companies. Notes: All customer examples cited or described in this presentation are presented as illustrations of the manner in which some customers have used IBM products and the results they may have achieved. Actual environmental costs and performance characteristics will vary depending on individual customer configurations and conditions. This publication was produced in the United States. IBM may not offer the products, services or features discussed in this document in other countries, and the information may be subject to change without notice. Consult your local IBM business contact for information on the product or services available in your area. All statements regarding IBM's future direction and intent are subject to change or withdrawal without notice, and represent goals and objectives only. Information about non-ibm products is obtained from the manufacturers of those products or their published announcements. IBM has not tested those products and cannot confirm the performance, compatibility, or any other claims related to non-ibm products. Questions on the capabilities of non-ibm products should be addressed to the suppliers of those products. Prices subject to change without notice. Contact your IBM representative or Business Partner for the most current pricing in your geography. Copyright IBM Corporation 2008-2014 2

Agenda Introduction Securing System z hardware A multi-zone network VLANs and traffic separation Enforcing the rules Copyright IBM Corporation 2008-2014 3

The Myth of Mainframe Security Copyright IBM Corporation 2008-2014 4

The Reality of Mainframe Security Copyright IBM Corporation 2008-2014 5

Securing the Hardware Copyright IBM Corporation 2008-2014 6

z/vm Security begins with System z security Protect the HMC Don t share user IDs but don t be afraid to connect it to your internal network Limit span of control as ropriate; add roles Protect the I/O configuration Create a separate LPAR that is authorized to modify the I/O configuration Give partitions access only to devices they require Copyright IBM Corporation 2008-2014 7

System z Hardware Security LPAR 1 LPAR 2 LPAR 3 z/vm production z/os production Dynamic I/O configuration management authority Minimal z/os or z/vm PR/SM I/O device access is controlled by PR/SM Ethernet HiperSockets Copyright IBM Corporation 2008-2014 8

Warning: Shared Open Systems Adapters LPAR 1 LPAR 3 LPAR 2 Application Zone Application Zone Data Zone PR/SM? A shared OSA creates a short circuit between LPARs unless QDIO data connection isolation is used Copyright IBM Corporation 2008-2014 9

Warning: HiperSockets LPAR 1 LPAR 2 LPAR 3 Application Zone Application Zone Data Zone PR/SM? A HiperSocket is a LAN segment. Treat is like one. Copyright IBM Corporation 2008-2014 10

Multi-zone Networks Copyright IBM Corporation 2008-2014 11

Multi-zone Network DMZ / Applications db Data network A DMZ (demilitarized zone) is the name given to the subnet that insulates critical network components (servers) from a public network. Copyright IBM Corporation 2008-2014 12

Multi-zone Network on System z Web / DMZ Applications db Data System z network Copyright IBM Corporation 2008-2014 13

Firewalls Where, oh, where has my firewall gone? Copyright IBM Corporation 2008-2014 14

Inboard (internal) firewalls data System z data data Internet Copyright IBM Corporation 2008-2014 15

Outboard (external) firewalls data data data Internet Copyright IBM Corporation 2008-2014 16

Guest LANs with HiperSockets LPAR 1 LPAR 2 z/vm z/os DB2 PR/SM HiperSockets Internet = Firewall Router Copyright IBM Corporation 2008-2014 17

HiperSockets & z/os packet filters LPAR 1 LPAR 2 z/vm z/os DB2 Comms Server packet filter PR/SM HiperSockets Internet = Firewall Router 18 Copyright IBM Corporation 2008-2014

VLAN Separation Copyright IBM Corporation 2008-2014 19

VLAN-unaware VSWITCH Linux1 SET VSWITCH FLOOR2 GRANT LINUXn Linux2 Linux3 Linux4 Virtual access port FLOOR2 Physical access port on VLAN 10 Cisco Corp Copyright IBM Corporation 2008-2014 20

VLAN-aware VSWITCH SET VSWITCH FLOOR1 GRANT ROUTER PORTTYPE TRUNK VLAN 10 20 Linux1 Router Linux3 SET VSWITCH FLOOR1 GRANT LINUX3 PORTTYPE ACCESS VLAN 20 Virtual trunk port Virtual access port FLOOR1 VLAN 10 VLAN 20 Physical trunk port Cisco Corp Copyright IBM Corporation 2008-2014 21

Access vs. Trunk 80 00 20 7A 3F 3E Destination MAC 80 00 20 20 3A AE Source MAC 08 00 Type IP, ARP, etc. Payload 00 20 20 3A CRC Ethernet Header 14 bytes Data 46-1500 bytes Ethernet Type II Frame Trailer 4 bytes 64 1518 bytes Access port and Trunk port When used on a trunk port, the switch will associate it with the native VLAN ID (VID) 80 00 20 7A 3F 3E Destination MAC 80 00 20 20 3A AE Source MAC 81 00 TPID 000A VID 08 00 Type IP, ARP, etc. Payload 00 20 20 3A CRC Ethernet Header 14 bytes Data 46-1500 bytes Tagged Ethernet Type II Frame (discarded by access port) Trailer 4 bytes 68 1522 bytes Trunk port Copyright IBM Corporation 2008-2014 22

Network with VSWITCH (fully shared) LPAR 1 LPAR 2 z/vm db db db z/os DB2 VSWITCH To internet With 1 VSWITCH, 3 VLANs, and a multi-domain firewall Copyright IBM Corporation 2008-2014 23

Multi-zone Network with VSWITCH (red zone physical isolation) LPAR 1 LPAR 2 z/vm db db db z/os DB2 VSWITCH INTERNET APPDATA To internet With 2 VSWITCHes, 3 VLANs, and a multi-domain firewall Copyright IBM Corporation 2008-2014 24

Enforcing the Separation Copyright IBM Corporation 2008-2014 25

Turn off backchannel communications No user-defined Guest LANs VMLAN LIMIT TRANSIENT 0 No virtual CTC MODIFY COMMAND DEFINE IBMCLASS G PRIVCLASS M No IUCV Use explicit IUCV authorization in the directory, not IUCV ALLOW or IUCV ANY No secondary consoles MODIFY COMMAND SET SUBCMD SECUSER IBMCLASS G PRIVCLASS M But what else might there be? Copyright IBM Corporation 2008-2014 26

Turn off backchannel communications VMCF MODIFY DIAGNOSE DIAG068 IBMCLASS G PRIVCLASS M ESA/XC mode address space sharing DCSS New interfaces added by APAR or new releases Google less than class g by Rob van der Heij Too hard for some folks Consider RACF Mandatory Access Controls instead SELinux provide the same capabilities for Linux Copyright IBM Corporation 2008-2014 27

Multi-Zoning with RACF Mandatory access controls override end user controls Users are assigned to one or more named projects Minidisks, guest LANs, VSWITCHes, and VLAN IDs, NSSes, DCSSes, spool files all represent data in those same projects Users can only access data in their assigned projects Overrides user- or admin-given permissions Copyright IBM Corporation 2008-2014 28

Multi-Zoning with RACF A Security Label combines the concepts of Security clearance (secret, top secret, eyes only) Information zones Information zones ly to any place data may exist disks, networks, and other users Security clearance Ensures servers cannot see extra-sensitive data in their information zone Prevents copying of data to medium that is readable by servers with lower security clearance ( No write down ) Not prevalent since there is no equivalent in distributed networking solutions Label dominance is established based on intersection of zones and security clearance Not just a simple string comparison Copyright IBM Corporation 2008-2014 29

Multi-zone z/vm LPAR with RACF Security Label Enforcement Backup Linux 1 Linux 4 Linux 2 Linux 3 Linux 5 CMS Copyright IBM Corporation 2008-2014 30

Multi-Zoning with RACF Create security levels and data partitions RDEFINE SECDATA SECLEVEL ADDMEM(DEFAULT/100) RDEFINE SECDATA CATEGORY ADDMEM(DMZ APPS DATA) RDEFINE SECLABEL RED SECLEVEL(DEFAULT) ADDCATEGORY(DMZ) UACC(NONE) RDEFINE SECLABEL GREEN SECLEVEL(DEFAULT) ADDCATEGORY(APPS) UACC(NONE) RDEFINE SECLABEL BLUE SECLEVEL(DEFAULT) ADDCATEGORY(DATA) UACC(NONE) Copyright IBM Corporation 2008-2014 31

Multi-Zoning with RACF Assign virtual machines their SECLABELs PERMIT BLUE CLASS(SECLABEL) ID(LINUX1) ACCESS(READ) ALTUSER LINUX1 SECLABEL(BLUE) PERMIT RED CLASS(SECLABEL) ID(LINUX2) ACCESS(READ) ALTUSER LINUX2 SECLABEL(RED) Copyright IBM Corporation 2008-2014 32

Multi-Zoning with RACF But sometimes a server serves the Greater Good, providing services to all users Exempt server from label checking Assign predefined label SYSNONE PERMIT SYSNONE CLASS(SECLABEL) ID(TCPIP) ACCESS(READ) ALTUSER TCPIP SECLABEL(SYSNONE) Copyright IBM Corporation 2008-2014 33

Multi-Zoning with RACF Example: Assign labels to resources VMMDISK: Minidisk VMLAN: Guest LANs and Virtual Switches RALTER VMMDISK LXHTTP01.191 SECLABEL(RED) RALTER VMMDISK LXHTTP01.201 SECLABEL(RED) RALTER VMLAN SYSTEM.INTERNET SECLABEL(RED) RALTER VMLAN SYSTEM.APPDATA SECLABEL(SYSNONE) RALTER VMLAN SYSTEM.APPDATA.0010 SECLABEL(BLUE) RALTER VMLAN SYSTEM.APPDATA.0020 SECLABEL(RED) PERMIT SYSTEM.APPDATA.0010 CL(VMLAN) ID(LINUX1) ACC(UPDATE) PERMIT SYSTEM.APPDATA.0020 CL(VMLAN) ID(LINUX2) ACC(UPDATE) Copyright IBM Corporation 2008-2014 34

Multi-Zoning with RACF Activate RACF protection SETROPTS CLASSACT(SECLABEL VMMDISK VMLAN) SETROPTS RACLIST(SECLABEL) SETROPTS MLACTIVE(WARNINGS) Or If resource doesn t have a seclabel, message is issued and seclabels are ignored. SETROPTS MLACTIVE(FAILURES) If resource doesn t have a seclabel, command fails. This is more secure! Copyright IBM Corporation 2008-2014 35

Summary Check network design with network architect Place firewalls where the network security team wants them to go Use common sense Protect the hardware Protect your data Protect your servers Protect your company Protect yourself!! Copyright IBM Corporation 2008-2014 36

Reference Information This presentation http://www.vm.ibm.com/devpages/altmarka/present.html z/vm Security resources http://www.vm.ibm.com/security z/vm Secure Configuration Guide http://publibz.boulder.ibm.com/epubs/pdf/hcss0b30.pdf System z Security http://www.ibm.com/systems/z/advantages/security/ z/vm Home Page http://www.vm.ibm.com Copyright IBM Corporation 2008-2014 37

Contact Information IBM Alan C. Altmark Senior Managing z/vm Consultant z Systems Delivery Practice IBM Systems Lab Services 1701 North Street Endicott, NY 13760 Mobile 607 321 7556 Fax 607 429 3323 Email: alan_altmark@us.ibm.com Mailing lists: IBMTCP-L@vm.marist.edu IBMVM@listserv.uark.edu LINUX-390@vm.marist.edu See http://ibm.com/vm/techinfo/listserv.html for details. (c) Copyright IBM Corporation 2013, 2014 38