CICS Essentials Auditing CICS – a Beginner’S Guide
Total Page:16
File Type:pdf, Size:1020Kb
CICS Essentials Auditing CICS – A Beginner’s Guide Julie-Ann Williams Mike Cairns Martin Underwood Craig Warren ii CICS ESSENTIALS Foreword by Brian Cummings A thorough Audit Guide for CICS is something that is long overdue. This document provides a wealth of information about CICS, its operations, and its various resources and capabilities along with audit guidelines and recommendations. Various documents on AuditNet and other sources have taken a stab at parts or all of CICS, but are likely not up to date or sufficiently complete. CICS largely remains an environment that holds its mysteries against auditors and security officers alike. The results of poor understanding can lead to dangerous levels of unidentified risk to the applications and sensitive information of entities that use the power of CICS for critical business applications. Unlike any other environment, CICS security implementations fail in the first place because all of the security control is often only focused on transactions. Transactions are many levels of resources removed from the data files and data bases they query or update. In the end, we see the greatest level of security established for the least sophisticated technical users – end business users, and the least security facing the most technically sophisticated – the CICS sub-system programmer and the CICS Application programmer. For example, it is typical to leave FCT resources unsecured and to allow the CICS regions to have total rights to the data sets they access. This condition gives sub-system and application programmers full-reign to use CICS utilities to inherit the CICS regions’ authorities and gain full access to freely browse and update data. Worse, such activity would take place well beneath the business and process internal controls established to assure the integrity of the data. There are many other security failures prevalent in CICS security implementations such as: empowering the CICS region default userid; running all CICS sub-systems and regions under the same user account or group, thus failing to achieve a separation of function across business applications; and inadequate protection of high-risk CICS system supplied transactions. I learned a great deal by reading this document, and will value it as a handy reference for my CICS security implementation and audit activities. I’m certain that you will find it equally useful, and possibly disturbing. As a peer professional so well said: When I realize that I don’t know something that is important to me, job one becomes to learn what I need to know. This document is a great start. Brian V. Cummings Practice Lead, IRM Advisory Services Tata Consultancy Services North America by Mike Cairns I was invited into this project late in its development, and asked to contribute some of my previously published articles on the subject of CICS security. When I was publishing online articles about CICS, the writing was limited to well under 2000 words to fit inside publishing limitations. With this book though, we see at last a larger format where subjects can be explained in more depth and detail than I could in my earlier work. It’s been a delight to be able to help a dedicated team of writers complete this CICS ESSENTIALS iii comprehensive introduction to auditing CICS. My contributions have been small, some old articles, and a bit of editing. The chance to re-write my old articles, and try to clarify the parts I now considered weak, was the best part of this project personally for me. But for the group, I have to congratulate Julie-Ann, Martin and Craig for creating the first detailed work on CICS audit that I know of. It’s a complex topic, and needs a book of this length to do it justice. We hope that all auditors when faced with a z/OS audit will find our contribution useful, and we look forward to providing future assistance with similar publications. Mike Cairns – August 2009 iv CICS ESSENTIALS TableofContents About this Book . 1 About the Book’s Sponsor . 1 About the Author(s) . 1 About You . 2 Icons Used in this Book . 2 More Detailed Technical Information . 3 Introduction to CICS Audit requirements . 5 What is CICS? . 5 How is CICS used? . 6 Databases and CICS . 7 Networks and CICS . 7 External Security control and CICS . 8 What types of risk need to be considered when auditing CICS? . 11 z/OS elements . 11 DB2 elements . 12 Networking elements . 13 Auditing CICS 101 . 14 Auditing CICS - A Beginners Guide . 15 Where to look and what to look for . 15 Job Control . 15 Associated Userid . 17 Datasets . 17 STEPLIB/STEPCAT . 18 Journals and Logs . 18 Dynamic transaction backout . 19 Recovery after a system abnormally terminates . 19 CSD . 19 System Initialization Parameters . 20 Override Parameter Settings . 20 SIT Settings . 20 CMDSEC . 21 CONFDATA . 21 CONFTXT . 21 DFLTUSER . 22 EJBROLEPRFX . 22 ENCRYPTION . 22 ESMEXITS . 22 GMTRAN . 22 KEYRING . 23 PLTPIUSR . 23 PLTPISEC . 23 PSBCHK . 24 RESSEC . 24 SEC . 24 SECPRFX . 24 SECPREFIXID . 25 SNSCOPE . 25 CICS ESSENTIALS v table of contents TCPIP . 26 USRDELAY . 26 XAPPC . 27 XCMD . 27 XDB2 . 29 XDCT . 29 XEJB . 30 XFCT . 31 XHFS . 32 XJCT . 32 XPCT . 33 XPPT . 33 XPSB . ..