eTrust CA-Top Secret Security for z/OS and OS ... - SupportConnect

eTrust CA-Top Secret Security for z/OS and OS ... - SupportConnect eTrust CA-Top Secret Security for z/OS and OS ... - SupportConnect

supportconnectw.ca.com
from supportconnectw.ca.com More from this publisher
12.07.2015 Views

Securing HFS FunctionsSystem Functions (IBMFAC ATTRIBUTE)BPX.CAHFS.CHANGE.PRIORITY—Allows a user to change the schedulingpriority of a process, process group, or user.BPX.CAHFS.SET.PRIORITY—Allows a user to set the scheduling priority of aprocess, process group, or user.BPX.CAHFS.SET.RLIMIT—Allows a user to set the resource limit for the callingprocess.BPX.CAHFS.MOUNT—Allows a user to mount file systems.BPX.CAHFS.UNMOUNT—Allows a user to remove a virtual file system.BPX.CAHFS.PTRACE—Allows a user to control and debug another process.Although the user need not be defined as a superuser to use this function, accessto this resource does not give the user any more authority than a superuserwould have. Access to the function is denied if the user attempts to debug aprogram running with SETUID or SETGID, that is, a program that switches useridentification.BPX.CAHFS.CREATE.LINK—Allows a user to create a hard link to an existingfile. A hard link is essentially another name for the same file data. If the originalfile is removed, the hard link still points to the file data. The data is not deleteduntil the last link is removed. The user requires a permission withACCESS(ALTER) to the HFS file resource for both the original file and the linkfile. It is important to note that when data associated with a hard link isaccessed, the CA-ENF/USS service requests the file name from OS/390 UNIXServices. The file name returned might be the hard link name or the original filename regardless of the actual path accessed. It is unpredictable which name isreturned. Therefore, when a hard link exists, you must maintain permissions forboth the link name and the original name.BPX.CAHFS.CREATE.EXTERNAL.LINK—Allows a user to create an externallink to an object outside of the file system, such as an MVS data set. An externallink is a file that contains the name of an external object. If the external object isremoved, the external link still contains the name of the non-existent object.BPX.CAHFS.CREATE.SYMBOLIC.LINK—Allows a user to create a symboliclink to an existing file. A symbolic link is a file that contains the name of anotherfile. If the original file is removed, the file data is deleted but the symbolic linkstill contains a pointer to the non-existent file. Symbolic link names are validatedwhen the link is created and deleted. All other accesses are validated with theoriginal file name. In addition to this resource, the user also requires a PERMITwith ACCESS(ALTER) to the HFS file resource for both the original file and thelink file.2–8 Cookbook

Securing HFS FunctionsFile FunctionsFile-related functions can be secured to various levels of granularity. This isaccomplished by determining a user’s highest level of access to an IBMFACresource. The ACCESS keyword of the IBMFAC resource authorization is usedfor this purpose. The following actions are taken based upon the ACCESS value:ALL—The user is allowed to perform the function against all files.CONTROL—The user is allowed to perform the function if the user also hasACCESS(CONTROL) access to the HFS file resource. The access level ofCONTROL is not used in normal file access. It is utilized here to provideadditional controls for file functions.UPDATE—Processing is the same as for CONTROL.READ—The user is allowed to perform the function if the user also hasACCESS(CONTROL) access to the HFS file resource, or if the user is consideredthe owner of the file. This is ownership as defined by CA SAF HFS security, notUNIX file UID.NONE—If the user has no access to the IBM FACILITY resource, the function isdenied.Because the absence of the ACCESS keyword in a permission implies READaccess, be sure to specify ACCESS in all of the file function IBMFAC permissionsso that you do not inadvertently allow greater access to functions than youintended.HFS file permission settings and UID/GID ownership are not used for validationpurposes when CA SAF HFS security is active. However, the followingresources restrict changes to these settings for those cases in which they must bemaintained.File Functions (IBMFAC)The following are the file functions authorized via the IBMFAC ATTRIBUTE:BPX.CAHFS.CHANGE.FILE.ATTRIBUTES—Allows a user to change extendedfile attributes, such as APF authorization and program control. Native OS/390UNIX services will issue an IBMFAC resource call to determine authorization toset the specific attribute, but not to specific files. Use of this file function resourceprovides additional control down to the file level.BPX.CAHFS.CHANGE.FILE.AUDIT.FLAGS—HFS files contain two sets ofaudit flags, one that can be set by a normal user and the other that can only be setby an auditor. This resource allows a user to change user-audit flags in a file.BPX.CAHFS.CHANGE.FILE.FORMAT—Allows a user to change the format ofa file. Changes include defining text data delimiters or binary file format.Controlling Access to the Hierarchical File System 2–9

Securing HFS FunctionsFile FunctionsFile-related functions can be secured to various levels of granularity. This isaccomplished by determining a user’s highest level of access to an IBMFACresource. The ACCESS keyword of the IBMFAC resource authorization is used<strong>for</strong> this purpose. The following actions are taken based upon the ACCESS value:ALL—The user is allowed to per<strong>for</strong>m the function against all files.CONTROL—The user is allowed to per<strong>for</strong>m the function if the user also hasACCESS(CONTROL) access to the HFS file resource. The access level ofCONTROL is not used in normal file access. It is utilized here to provideadditional controls <strong>for</strong> file functions.UPDATE—Processing is the same as <strong>for</strong> CONTROL.READ—The user is allowed to per<strong>for</strong>m the function if the user also hasACCESS(CONTROL) access to the HFS file resource, or if the user is consideredthe owner of the file. This is ownership as defined by <strong>CA</strong> SAF HFS security, notUNIX file UID.NONE—If the user has no access to the IBM FACILITY resource, the function isdenied.Because the absence of the ACCESS keyword in a permission implies READaccess, be sure to specify ACCESS in all of the file function IBMFAC permissionsso that you do not inadvertently allow greater access to functions than youintended.HFS file permission settings <strong>and</strong> UID/GID ownership are not used <strong>for</strong> validationpurposes when <strong>CA</strong> SAF HFS security is active. However, the followingresources restrict changes to these settings <strong>for</strong> those cases in which they must bemaintained.File Functions (IBMFAC)The following are the file functions authorized via the IBMFAC ATTRIBUTE:BPX.<strong>CA</strong>HFS.CHANGE.FILE.ATTRIBUTES—Allows a user to change extendedfile attributes, such as APF authorization <strong>and</strong> program control. Native <strong>OS</strong>/390UNIX services will issue an IBMFAC resource call to determine authorization toset the specific attribute, but not to specific files. Use of this file function resourceprovides additional control down to the file level.BPX.<strong>CA</strong>HFS.CHANGE.FILE.AUDIT.FLAGS—HFS files contain two sets ofaudit flags, one that can be set by a normal user <strong>and</strong> the other that can only be setby an auditor. This resource allows a user to change user-audit flags in a file.BPX.<strong>CA</strong>HFS.CHANGE.FILE.FORMAT—Allows a user to change the <strong>for</strong>mat ofa file. Changes include defining text data delimiters or binary file <strong>for</strong>mat.Controlling Access to the Hierarchical File System 2–9

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!