AUDIT400
Accesso dalla rete su as400
Sicurezza Librerie
Sicurezza Integrate File System /*
Sicurezza Profili Utente
Valori di Sistema
Registrazione e Controllo


La tabella che segue mostra le porte TCP/IP aperte ed in ascolto su AS400

Port ID Port Description
21 ftp-control
23 telnet
25 smtp
80 www-http
110 pop3
137 netbios-ns
139 netbios-ssn
389 ldap
397 APPCoverTCPIP
445 cifs
449 as-svrmap
1967 Bsafe/Global Security
1983 Bsafe/Global Security
2001 as-admin-http
5110 as-pop3
5544 as-mgtctrlj
5555 as-mgtctrl
8470 as-central
8471 as-database
8472 as-dtaq
8473 as-file
8474 as-netprt
8475 as-rmtcmd
8476 as-signon
8477 as-netdrive
8478 as-transfer
8479 as-vrtprint
CONFIDENCIAL - Data - TeamPROfessional - Cliente -
Analisi eseguita sul Sistema AS400 - Modello ________ Processore _________ Serial Number __________ Release AS400 ___________
Assessment Security and Audit AS400
Ecco una proposta utile per fare un' autoassessment del proprio sistema e riuscire a misurare il livello di sicurezza impostato sul proprio AS400, oppure per dubbi o conferme , richiedere gratuitamente un chekup a TeamPROfessional. che invierà (confidencial) i risultati dell' analisi, che sarà eseguita su 6 stampe che Vi verranno richieste.

Premessa

Tutti i professionisti della sicurezza informatica sanno cosa cercare quando si deve o si vuole verificare l' impostazione e/o lo status della sicurezza in una macchina Windows, Le conoscenze diffuse e molti strumenti e risorse disponibili in rete aiutano le aziende e i responsabili della sicurezzaa tenere e mantenere le protezioni e le regole sempre aggiornate. Anche per il System i (la piattaforma midrange IBM precedentemente nota come l'AS/400. iSeries , i5 ) riconosciuto di fatto come il sistema operativo immune da virus informatici, andrebbero verificati i livelli di sicurezza attivati, e se accettati , essere consapevoli delle possibili esposizioni e rischi potenziali. Molti sistemi AS400 contengono i dati mission-critical aziendali, ed il mantenimento di una configurazione sicura dovrebbe essere una priorità assoluta.
Tuttavia, molti di questi sistemi sono configurati con livelli minimi e spesso non controllati e gestiti nel tempo per avere un aggiornamento ed un certificato di buona salute da IT manager o dal responsabile della sicurezza impostata.Il suggerimento che TeamProfessional vuole dare , è quello di controllare il Vostro sistema AS400 con un Autoassessment rispondendo a 6 domande e considerazioni che descrivono le potenziali esposiszioni , oppure richiedere ai nostri esperti un' assessment gratuito dello status attuale del sistema, inviandoci le stampe prodotte da 6 comandi .


Analisi Sicurezza AS400
Aree analizzate

Numero
Domanda
Risposta

Sicurezza adeguata
Si _?__
No_?__
N1 Accesso dalla rete su AS400
N2 Sicurezza Librerie
N3 Sicurezza Integrate File System /*
N4 Sicurezza Profili Utente
N5 Valori di Sistema
N6 Registrazione e Controllo
Totale risposte SI - NO SI_____
NO_____

The remainder of the report details specific vulnerabilities.
Warnings in the body of the report appear in red and the following icons are used to indicate the degree of risk for a specific item.
- Settings/definitions OK - Warning - High risk





Domanda N1 - Accesso alla rete -
Sul Vostro AS400 collegato in rete e che consente l'accesso TCP/IP da stazioni PC e/o Mobile con client/access e/o emulazioni 5250 o via Browser, con richieste ODBC, SQL, File tranfer ecc. ritenete di aver attivato su AS400 un livello di sicurezza adeguato?
(Prima di risponere leggere le considerazioni suggerite)
SI_____
NO_
____


Accessi Remoti di Servizi TCP/IP che possono essere
Protetti dagli Exit Programs su AS400
Exit Point Server Descrizione
*DDM Alternate ODBC server
*DQSRV Client data queue server
*FILESRV Remote file server—used when drives are mapped
to integrated file system
*FTPCLIENT FTP client on the iSeries—used for requests
originating from the System i server
*FTPSERVER FTP server on the iSeries
*NDB ODBC and JDBC native database
*RMTSRV Remote command server
*RTVOBJINF ODBC and JDBC retrieve object info
*SQL ODBC and JDBC sign-on (logon)
*SQLSRV 1 ODBC and JDBC server
*SQLSRV 2 ODBC and JDBC server
*TELNET TCP/IP terminal emulation
*DATAQSRV Remote data queue server
*FTPREXEC Remote command through FTP
*REXEC_SO Remote command sign-on (logon)
*TFRFCL Client file transfer server

Per valutare il rischio sul Vostro sistema potete controllare le porte attive ut



. Network access to the iSeries using FTP
Check Result Current Risk/Suggestions Command
FTP logon Action successful HIGH RISK! An FTP connection can be made from the network to your iSeries ftp 9.9.9.55
FTP view library Action successful HIGH RISK! The contents of your iSeries libraries can be viewed through an FTP connection ls bsafelib
FTP copy files from iSeries Action successful HIGH RISK! Your iSeries files can be copied to a PC through an FTP connection get bsafelib/bsafefile1 C:\leonid\RiskAssessment\bsafefile1
FTP delete files Action failed OK. The selected iSeries file could not be deleted delete bsafelib/bsafefile2
FTP overwrite files on iSeries Action successful HIGH RISK! Your iSeries files can be overwritten via an FTP connection from a PC put C:\leonid\RiskAssessment\bsafefile3 bsafelib/bsafefile1
FTP CL command Action failed OK. The selected CL command could not be executed on your iSeries through an FTP connection from a PC, by this user rcmd crtpf file(bsafelib/bsafefile4) rcdlen(10)

Network access to the iSeries using Remote Command

Remote command is a powerful and highly accessible means of accessing the iSeries server from a remote location. It is enough to install client access on any PC with a connection to your iSeries to give access to this means of penetrating your iSeries.
The results listed below give a live indication of the ease with which a selected user can manipulate your critical files.

The selected user did not achieve access to your iSeries through the remote command server. But is this the case for all users in your organization, including power users and senior staff?

Check Result Current Risk/Suggestions Command
Create a new library Action failed OK. A library could not be created remotely on your iSeries using remote command rmtcmd crtlib lib(bsfcmdlb) //9.9.9.55
Create a new file Action failed OK. A file could not be created remotely on your iSeries using remote command rmtcmd crtpf file(bsfcmdlb1/bsfcmdfl) rcdlen(10) //9.9.9.55
Copy a system object Action failed OK. The selected system object could not be copied remotely on your iSeries using remote command rmtcmd crtdupobj obj(crtclpgm) fromlib(qsys) objtype(*cmd) tolib(bsfcmdlb1) newobj(bsfcmdcmd) //9.9.9.55

Network Access to the iSeries using the Database Server

The database server is among the most sensitive and highly used gateways into your iSeries from the network. It is the means by which ODBC, JDBC and Websphere applications and many IBM Client Access features make their connection with the iSeries database. It is a particularly sensitive gateway into your iSeries as it the means by which the database is accessed and manipulated at the record and field level.
The results listed below give a live indication of the ease with which a selected user can manipulate your data.

It can be clearly seen from the results that the selected user can penetrate your iSeries through the database server and add, change and delete data in your database.

Check Result Current Risk/Suggestions Command
Database logon Action successful HIGH RISK! An ODBC connection can be made from the network to your iSeries Database Logon User Name - leonid; IP - 9.9.9.55;
Database view records Action successful HIGH RISK! Data can be displayed remotely on your iSeries using the database server SELECT * FROM bsafelib.bsafepf1
Database change records Action successful HIGH RISK! File contents can be changed remotely on your iSeries using the database server UPDATE bsafelib.bsafepf1 SET bsafepf1 = 'dd' WHERE bsafepf1 = 'cc'
Database delete records Action successful HIGH RISK! Data can be deleted remotely on your iSeries using the database server DELETE FROM bsafelib.bsafepf1 WHERE bsafepf1 = 'bb'



Server Name Risk Assessment
File Transfer Server FTP Protected by Bsafe/Global Security
File Transfer Client FTP Protected by Bsafe/Global Security
TelNet Protected by Bsafe/Global Security
Remote Command Server Protected by Bsafe/Global Security
Data Base Protected by Bsafe/Global Security
Remote SQL Protected by Bsafe/Global Security
Data Queue Protected by Bsafe/Global Security
Distributed Data Management Protected by Bsafe/Global Security
Pass-Through Protected by Bsafe/Global Security
File Transfer Protected by Bsafe/Global Security
Signon Server Protected by Bsafe/Global Security
File Server Protected by Bsafe/Global Security
Trivial File Transfer TFTP Protected by Bsafe/Global Security
Central Server Protected by Bsafe/Global Security
Message Server Protected by Bsafe/Global Security
Virtual Print Protected by Bsafe/Global Security
Network Print Protected by Bsafe/Global Security
Work Station Gateway Logon Protected by Bsafe/Global Security
Delete Journal Receivers Protected by Bsafe/Global Security
Power Down System Command Protected by Bsafe/Global Security
Attention Keys Protected by Bsafe/Global Security
System Request Attention Protected by Bsafe/Global Security
Auxiliary Storage Limit Protected by Bsafe/Global Security




Domanda N2 - Sicurezza Librerie -
Sul Vostro sistema AS400 le librerie dati che contengono dati sensibili e privati o comunque molto importanti per l' azienda, sono protette da una adeguata sicurezza, con liste di autorizzazione che non consentono l' uso improprio ad utenti comuni ?
SI_____
NO_
____



Domanda N3 - Sicurezza Integrate File System /* -
Sul Vostro sistema AS400 sono presenti alcune o diverse directory utente oltre a quelle del sistema,
ritenete che l' impostazione della sicurezza su questi oggetti sia stato realizzato correttamente?

SI_____
NO_
____


Domanda N4 -
Sicurezza Profili Utente
-
Sul Vostro sistema AS400 tutti i profili utente sono stati impostati con la classe e le autorizzazioni speciali,
previste dal ruolo dell' utente ed associati all' uso dei dati nel sistema informativo aziendale?
ogni utente è associato al profilo di gruppo per ereditare in modo veloce e diretto le autorizzazioni private agli oggetti?


SI_____
NO_____

The user classes given to a user when creating or changing a user profile control the default special authorities granted to the user. If you wish to follow good practice it is advisable to define all users with the 'weaker' user classes except where absolutely necessary. The less power users you have the less chance there is of wanted or accidental damage being caused.

Your user definitions have been analyzed and the number of power users defined is disturbingly high. We suggest you urgently review your user profile definitions.

User Class Description Total Percent Risk Assessment
*PGMR Programmer 12 8  
*SECADM Security Administrator 3 2 The number of users assigned as administrators is acceptable
*SECOFR Security Officer 27 19 Too many users are assigned as security officers
*SYSOPR System Operator 7 5 The number of users assigned as system operators is somewhat high
*USER User 95 66  
  All Users 144 100  

The various special authorities granted to users are what differentiate a power user on your iSeries from an ordinary user.

The authorities of your users have been analyzed and the number of power users is unnecessarily high. We suggest you review your user profile definitions.

Authority Description Total Percent Risk Assessment
*ALLOBJ All object authority 35 24 All objects authority granted to users not in class security Officer or Administrator
*AUDIT Audit authority 30 21 Auditing authority granted to users other than the system security officer
*IOSYSCFG Input/Output system configuration 34 24 I/O configurations authority given to users other than the system security officer
*JOBCTL Job control authority 46 32 No suggestions available
*SAVSYS Save system authority 34 24 No suggestions available
*SECADM Security administrator authority 36 25 Security administrator authority granted to users not in the same class
*SERVICE Service authority 31 22 No suggestions available
*SPLCTL Spool control authority 33 23 No suggestions available
*USRCLS Special authorities granted based on User Class 0 0 No suggestions available
  All Users 144 100  


Your iSeries password policy is defined by a group of system values which can be controlled by the system administrator. The more stringent the settings given to these system values the harder it will be to penetrate your iSeries by guessing passwords.

The findings of this risk assessment are that many of your password policy settings deviate from IBM recommendations. The security of your iSeries could be seriously compromised and we recommend you urgently review your password policy.

Name Description Current Value Risk Assessment
QPWDEXPITV Password expiration interval specifies whether user passwords expire or not, controls the number of days allowed before a password must be changed. 000120 High risk - Number of days before expiration interval exceeds the recommended, this compromises the password security on your system
QPWDLMTAJC Limit adjacent digits in password restricts consecutive digits, provides additional security by preventing sequence of numbers as passwords. 0 Warning - Using sequence of numbers as passwords makes it easy to guess
QPWDLMTCHR Limit characters in password specifies certain characters that are not allowed in a password. *NONE High risk - Users are not prevented from forming actual words for their passwords this compromises system security
QPWDLMTREP Restrict repeating characters restricts repeating characters and prevents users from specifying passwords that are easy to guess 0 High risk - The same characters can be repeated more than once, this compromises the security on your system
QPWDLVL Password level the system can be set to allow for user profile passwords from 1-10 or 1-128 characters 0 Recommended - The password level of the system set as needed
QPWDMAXLEN Maximum password length maximum number of characters for a password 5 High risk - specified maximum number of characters for a password is far less than recommended, this compromise the security on your system
QPWDMINLEN Minimum password length specifies the minimum number of characters for a password 3 High risk - specified minimum number of characters for a password is far less than recommended, this compromises the security
QPWDPOSDIF Limit password character position requires a new character in each position 0 Warning - Allowing characters in the same positions as previous password affects the security on your system
QPWDRQDDGT Require digit in password specifies whether a numeric character is required in a new password 0 Warning - Users are not prevented from forming all alphabetic character passwords, this can influence the security on your system
QPWDRQDDIF Duplicate password control prevents users from specifying passwords that they have used previously 6 Warning - Duplicate password control selected value not sufficient, lapsed time too short, this can affect the security on your system
QPWDVLDPGM Password validation program provides the ability for a user-written program to do additional validation on passwords PASSVLDPGMSHLOMOANZ Warning - User-written validation programs can compromise the security on your system





Domanda N5 -
Valori di Sistema
Sul Vostro sistema la sicurezza impostata nel SYSVAL QSECURITY è superiore al livello 30?
Sul Vostro sistema sono stati controllati tutti i possibili rischi di accesso ai dati e controllati da corrette ipostazioni sui valori di sistema?


SI_____
NO_____

. System Values - Security
Name Description Current Value Risk Assessment
QALWOBJRST Allow object restore option allows restore of security-sensitive objects. checks occur during the installation of ptf and restore of licensed programs *ALL High risk - Objects restored regardless of security-sensitive attributes or validation errors, this compromises the security on your system
QALWUSRDMN Allow user domain objects in libraries specifies where to allow user domain objects that bypass authority checking and cannot be audited *ALL Recommended - Domain objects that are not auditable allowed in libraries and directories
QCRTAUT Create default public authority default authority for newly created objects in ibm supplied qsys.lib file system *ALL High risk - Objects created with default public authority for all operation and management rights
QRETSVRSEC Retain server security data allows server security information to be retained: 0=retain 1=do not retain data. 1 Warning - Retaining user authentication security data on a target system when used via client-server interfaces can compromise system security
QSECURITY System security level objects and operating system integrity 40 Recommended - Level of security selected is sufficient for keeping Passwords, objects and operating system integrity
QSHRMEMCTL Shared memory control allows use of shared or mapped memory with write capability: 1=allowed, 0=not allowed 0 Warning - Programs running in different jobs are prevented from accessing shared-memory objects
QSVRAUTITV Server authentication interval server authentication interval system value (no longer used) 2880 Recommended - The system value is no longer used by the operating system and kept as a referrence
QUSEADPAUT Use adopted authority whether users can cause programs to use adopted authority from calling programs *NONE Recommended - Use adopted authority, authorization lists can be used to secure objects with similar security needs.
QVFYOBJRST Verify object on restore verifies object signatures during restore. values:1-5 1 High risk - Do not verify signatures on restore, allowing such a command or program represents an integrity risk to your system



Domanda N6 - Registrazione e Controllo
Sul Vostro sistema oltre alle politiche di prevenzione sono stati attivati tutti gli strumenti di registrazione e controllo per consentire una operazione di Audit se necessaria? Sul Vostro sistema sareste in grado di trovare l' autore di una cancellazione di un file anche accidentale?.



SI_____
NO_____

Value Description Setting Risk Assessment
*AUDLVL System auditing On System auditing events logged and may be audited
*OBJAUD Object auditing On Object auditing activity defined logged and may be audited
*AUTFAIL Authorized failure On All access failure,Incorrect Password or User ID logged and may be audited
*PGMFAIL System integrity violation On Blocked instructions,Validation failure,Domain violation logged and may be audited
*JOBDTA Job tasks On Job start and stop data(disconnect,prestart) logged and may be audited
*NETCMN Communication & Networking tasks On Action that occur for APPN filtering support logged and may be audited
*SAVRST Object restore On Restore(PGM,JOBD,Authority,CMD,System State) logged and may be audited
*SECURITY Security tasks On All security related functions(CRT/CHG/DLT/RST) logged and may be audited
*SERVICE Services HW/SW On Actions for performing HW or SW services logged and may be audited
*SYSMGT System management Off Registration,Network,DRDA,SysReplay,Operational not logged and cannot be audited
*CREATE Object creation On Newly created objects, Replace exisitng objects logged and may be audited
*DELETE Object deletion On All deletion of external objects logged and may be audited
*OFCSRV Office tasks On Office tasks(system distribution directory,Mail) logged and may be audited
*OPTICAL Optical tasks On Optical tasks(add/remove optical cartridge,Autho) logged and may be audited
*PGMADP Program authority adoption On Program adopted authority, gain access to an object logged and may be audited
*OBJMGT Object management On Object management logged and may be audited
*SPLFDTA Spool management On Spool management logged and may be audited


A small cross-section of actual activity - invalid user names and passwords used when signing on - has been analyzed. It can be seen that this information is logged in your system and may be audited.

Entry Type Entry Code Description Count
PW P Failed signon due to incorrect password 14
PW U Failed signon due to incorrect user name 0