Z/OS V2R2 Security Target
Total Page:16
File Type:pdf, Size:1020Kb
Security Target for IBM z/OS Version 2 Release 3 Version: 12.10 Status: RELEASE Last Update: 2019-02-25 Classification: Unclassified Security Target for IBM z/OS Version 2 Release 3 Trademarks The following terms are trademarks or registered trademarks of International Business Machines Corporation in the United States, other countries, or both: Advanced Function Presentation AFP BladeCenter DFS DFSORT IBM Infoprint MVS PR/SM Print Services Facility Processor Resource/Systems Manager RACF System z z System VTAM z/Architecture zEnterprise z/OS z/VM zSeries z10 z12 z13 z14 Java and all Java-based trademarks and logos are trademarks or registered trademarks of Oracle and/or its affiliates. UNIX is a registered trademark of The Open Group in the United States, other countries, or both. Other company, product, and service names may be trademarks or service marks of others. IBM Corporation Classification: Unclassified Page 2 of 417 Last update: 2019-02-25 © Copyright IBM Corp. 2004, 2019 Security Target for IBM z/OS Version 2 Release 3 Revision History Revision Author(s) Date Changes to Previous Revision 12.10 Clemens Wittinger 2019-02-25 Public Version. IBM Corporation Classification: Unclassified Page 3 of 417 Last update: 2019-02-25 © Copyright IBM Corp. 2004, 2019 Security Target for IBM z/OS Version 2 Release 3 Table of Contents 1 Introduction ................................................................................................ 13 1.1 Security Target Identification ...................................................................................... 13 1.2 TOE Identification ....................................................................................................... 13 1.3 TOE Overview ............................................................................................................. 13 1.4 TOE Description .......................................................................................................... 14 1.4.1 Intended Method of Use ........................................................................................................ 15 1.4.2 Summary of Security Features .............................................................................................. 17 1.4.2.1 Identification and authentication ............................................................................................................. 17 1.4.2.2 Discretionary access control .................................................................................................................... 18 1.4.2.3 Mandatory access control and support for security labels ...................................................................... 20 1.4.2.4 Auditing .................................................................................................................................................... 21 1.4.2.5 Object reuse functionality ........................................................................................................................ 22 1.4.2.6 Security management ............................................................................................................................. 22 1.4.2.7 Communications Security ........................................................................................................................ 23 1.4.2.8 TSF protection .......................................................................................................................................... 24 1.4.2.9 Confidentiality Protection of Data Sets .................................................................................................... 24 1.4.3 Configurations ....................................................................................................................... 25 1.4.3.1 Software configuration ............................................................................................................................. 25 1.4.3.2 Hardware configuration ........................................................................................................................... 30 1.4.4 Structure ............................................................................................................................... 31 2 CC Conformance Claim ................................................................................. 32 3 Security Problem Definition ......................................................................... 33 3.1 Introduction ................................................................................................................ 33 3.2 Threat Environment .................................................................................................... 33 3.2.1 Assets ................................................................................................................................... 33 3.2.2 Threat agents ........................................................................................................................ 33 3.2.3 Threats countered by the TOE ............................................................................................... 34 3.3 Assumptions ............................................................................................................... 35 3.3.1 Environment of use of the TOE .............................................................................................. 35 3.3.1.1 Physical .................................................................................................................................................... 35 3.3.1.2 Personnel ................................................................................................................................................. 35 3.3.1.3 Procedural ................................................................................................................................................ 35 3.3.1.4 Connectivity ............................................................................................................................................. 36 3.4 Organizational Security Policies .................................................................................. 36 4 Security Objectives ...................................................................................... 38 4.1 Objectives for the TOE ................................................................................................ 38 4.2 Objectives for the Operational Environment ............................................................... 40 4.3 Security Objectives Rationale ..................................................................................... 41 4.3.1 Security Objectives Coverage ............................................................................................... 41 4.3.2 Security Objectives Sufficiency ............................................................................................. 44 5 Extended Components Definition .................................................................. 51 5.1 Class FDP: User data protection ................................................................................. 51 5.1.1 Confidentiality protection (FDP_CDP) .................................................................................... 51 5.1.1.1 FDP_CDP.1 - Confidentiality for data at rest ............................................................................................ 51 6 Security Requirements for the Operational Environment ............................... 53 IBM Corporation Classification: Unclassified Page 4 of 417 Last update: 2019-02-25 © Copyright IBM Corp. 2004, 2019 Security Target for IBM z/OS Version 2 Release 3 6.1 General security requirements for the abstract machine ........................................... 55 6.1.1 Subset access control (FDP_ACC.1(E)) ................................................................................... 55 6.1.2 Security-attribute-based access control (FDP_ACF.1(E)) ........................................................ 55 6.1.3 Static attribute initialization (FMT_MSA.3(E)) ......................................................................... 56 6.2 Security requirements for CEX3, CEX 4S, CEX5S or CEX6Sin CEX3C/CEX4C/CEX5C/CEX6C mode .................................................................................... 56 6.2.1 Cryptographic operation (RSA) (FCS_COP.1(7E)) ................................................................... 57 6.2.2 Cryptographic key generation (Public/Private Keys) (FCS_CKM.1(2E)) ................................... 57 6.3 Security requirements for CEX3, CEX 4S, CEX5S or CEX6S in CEX3A/CEX4A/CEX5A/CEX6A mode .................................................................................... 57 6.3.1 Cryptographic support operation (FCS_COP.1(6E)) ................................................................ 57 6.4 Additional Security requirements for CEX3C/CEX4C/CEX5C/CEX6C on EC12, z13 and z14 ..................................................................................................................................... 57 6.4.1 Cryptographic operation (ECC Digital Signature Generation) (FCS_COP.1(8E)) ...................... 58 6.4.2 Cryptographic operation (ECC Digital Signature Verification) (FCS_COP.1(9E)) ...................... 58 6.4.3 Cryptographic key generation (ECDSA Public/Private Keys) (FCS_CKM.1(3E)) ....................... 58 7 Security Requirements ...............................................................................