DB2 UDB for Z/OS Security Target
Total Page:16
File Type:pdf, Size:1020Kb
DB2 UDB for z/OS Security Target Version 1.3.13 Status: Final Last Update: 2007-12-06 DB2 UDB for z/OS Security Target IBM atsec is a trademark of atsec GmbH IBM, IBM logo, DB2 UDB for z/OS are trademarks or registered trademarks of International Business Machines Corporation in the United States, other countries, or both. The following terms are trademarks of International Business Machines Corporation in the United States, other countries, or both: • Advanced Function Presentation • AFP • DFS • DFSORT • • IBM • Infoprint • MVS • PR/SM • Print Services Facility • Processor Resource/Systems Manager • RACF • VTAM • z/Architecture • z/OS • z/VM • zSeries Intel and Pentium are trademarks of Intel Corporation in the United States, other countries, or both. UNIX is a registered trademark of The Open Group in the United States, other countries, or both. Java and all Java-based products are trademarks of Sun Microsystems, Inc., in the United States, other countries, or both. Other company, product, and service names may be trademarks or service marks of others. This document is provided AS IS with no express or implied warranties. Use the information in this document at your own risk. This document may be reproduced or distributed in any form without prior permission provided the copyright notice is retained on all copies. Modified versions of this document may be freely distributed provided that they are clearly identified as such, and this copyright is included intact. Copyright (c) 2004, 2005 by atsec GmbH and IBM Corporation or its wholly owned subsidiaries. Page 2 of 159 © IBM, atsec 2005, 2006, 2007 2007-12-06 DB2 UDB for z/OS Security Target IBM Document History Version Date Summary Author 0.1 8/31/2004 Initial Draft Gordon McIntosh, atsec 0.5 9/6/2004 Refinement of SFs Gordon McIntosh 0.7 9/7/2004 Clarification by Roger Miller Gordon McIntosh 0.8 9/8/2004 Addition of z/OS to TOE Gordon McIntosh 0.9 10/14/2004 Addition of SF Iterations Gordon McIntosh 0.96 04/05/2005 Major revision and restructuring to integrate the DB2 Helmut Kurth specific security functions with the z/OS security functions 0.97 05/17/2005 Revision after comments from Roger Miller, Lou Losee Helmut Kurth and Robert Wenner 0.98 05/28/2005 Minor changes in response to remarks from the evaluator Helmut Kurth 1.0 05/29/2005 Fixed two minor issues, removed draft status Helmut Kurth 1.1 08/31/2005 Update upon request of IBM, removed BINDAGENT and Helmut Kurth rollback 1.2 02/28/2006 Integrated feedback from the sponsor and the evaluators Helmut Kurth 1.3 03/14/2006 Integrate feedback from sponsor review and add Lou Losee information on DB2 Audit Tool (DSN1SMFP) 1.3.1 04/28/2006 Add the IBM System z9-109 to list of processors. Update Lou Losee AU.3-DB2-9 and AU.3-DB2-10 to indicate that only the first 4000 bytes of the SQL statement is included in SMF audit records. Update software configuration to clarify that VTAM can be used/installed. 1.3.2 05/10/2006 Add z9-109 to one more list of processors. Correct table Lou Losee in section 6.3.6.14 regarding SYSCTRL and RENAME. 1.3.3 05/16/2006 Add IFCID to Detail for Component FMT_MSA.1(3) in Lou Losee Auditable Events tables 5.1 and 5.2 1.3.4 05/23/2006 Remove claim AC.4-DB2-28, Java Archive Privileges Lou Losee 1.3.5 09/20/2006 - Correct misspelling of ICIDs to IFCIDs. Lou Losee - Correct IA.4.-DB2 numbering to remove extra period (IA.4-DB2). - Update required privileges for CREATE VIEW and LOCK TABLE in claim AC.4-DB2-35 1.3.6 10/18/2006 Minor update to AU.3-DB2-13 to clarify AUDIT meant Lou Losee AUDIT ALL 1.3.7 01/22/2007 Update to AU.3-DB2-22 to clarify exceptions. Lou Losee Add exclusion list to software configuration. 1.3.8 03/05/2007 1) Remove COMMENT ON privilege from Package Lou Losee privileges. 2) Remove DISPLAY and DISPLAY BUFFERPOOL privileges from DB2 System privileges. 3) Remove COMMENT ON privilege from Plan privileges. 4) Add CREATE VIEW and REFRESH privileges to the Table privileges 5) Add Sequence privileges (ALTER, COMMENT ON, and USAGE). Page 3 of 171 © IBM, atsec 2005, 2006,2007 2007-12-06 DB2 UDB for z/OS Security Target IBM Version Date Summary Author 1.3.9 05/14/2007 1) Add additional clarification to section 6.3.7 regarding Lou Losee DB2 internal access checking. 2) Added the following items that are excluded from the TOE into section 2.4.1.2: a) DB2 Web Services b) MQseries user-defined functions c) User exit routines 1.3.10 06/08/2007 Explicitly mark user-distinct types and user-defined Lou Losee functions as not part of the evaluated configuration. Add ‘sequence’, ‘index’ and ‘system’ DB2 objects to the list of objects in FDP_ACC.1(2) 1.3.11 06/26/2007 Remove ‘system’ object from the list of objects in Lou Losee FDP_ACC.1(2). The system object is a construct used by RACF to map DB2 administrative authorities and privileges to RACF profiles and not an actual object in the DB2 hierarchy of objects. Add Index space and Index to list of objects in section 6.3.6.1 Add mSys for Setup DB2 Customization Center to the list of disallowed programs, utilities, etc. 1/3/12 07/09/2007 Update DB2 discretionary access algorithm to indicate Lou Losee different level access requirements depending on the setting of the RACF MLS option. 1.3.13 12/05/2007 Address comments from BSI Lou Losee Page 4 of 159 © IBM, atsec 2005, 2006, 2007 2007-12-06 DB2 UDB for z/OS Security Target IBM Table of Content 1 Introduction ......................................................................................................................................9 1.1 ST identification.........................................................................................................................9 1.2 CC conformance claim...............................................................................................................9 1.3 Strength of function....................................................................................................................9 1.4 ST overview...............................................................................................................................9 1.5 Structure.................................................................................................................................. 10 1.6 Terminology............................................................................................................................. 10 1.7 Abbreviations........................................................................................................................... 13 1.8 References.............................................................................................................................. 14 2 TOE description.............................................................................................................................. 16 2.1 Structure of DB2...................................................................................................................... 16 2.1.1 DB2 security functions ...................................................................................................... 18 2.1.2 DB2 objects...................................................................................................................... 18 2.1.3 DB2 system structures...................................................................................................... 19 2.1.4 Application processes and transactions ............................................................................ 20 2.1.5 The authorization hierarchy............................................................................................... 20 2.2 TOE boundary and interfaces .................................................................................................. 21 2.3 Software security function summary......................................................................................... 21 2.3.1 Identification and authentication........................................................................................ 22 2.3.2 Discretionary access control ............................................................................................. 22 2.3.3 Mandatory access control and support for security labels (LSPP mode only)..................... 23 2.3.4 Audit................................................................................................................................. 23 2.3.5 Object re-use functionality................................................................................................. 24 2.3.6 Communication security.................................................................................................... 24 2.3.7 Security management....................................................................................................... 24 2.3.8 TSF protection.................................................................................................................. 25 2.4 Configurations ......................................................................................................................... 25 2.4.1 Software configurations .................................................................................................... 25 2.4.2 Hardware configurations ................................................................................................... 28 3 TOE security environment .............................................................................................................. 29 3.1 Introduction.............................................................................................................................