{"id":2176,"date":"2020-01-06T04:14:47","date_gmt":"2020-01-06T04:14:47","guid":{"rendered":"http:\/\/kusuaks7\/?p=1781"},"modified":"2024-01-30T12:30:26","modified_gmt":"2024-01-30T12:30:26","slug":"the-who-what-where-when-and-why-for-mainframe-security","status":"publish","type":"post","link":"https:\/\/www.experfy.com\/blog\/bigdata-cloud\/the-who-what-where-when-and-why-for-mainframe-security\/","title":{"rendered":"The Who, What, Where, When, and Why for Mainframe Security"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"2176\" class=\"elementor elementor-2176\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-30ff1ffb elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"30ff1ffb\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6ead26c3\" data-id=\"6ead26c3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6df67ce5 elementor-widget elementor-widget-text-editor\" data-id=\"6df67ce5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tFor most people, security is a bit of a nuisance. No-one likes having to keep updating their password and then needing to remember the new one. And then there\u2019s all the different passwords that need to be remembered for different things. It all just seems like an administrative nightmare. It just makes getting a day\u2019s work done harder. That\u2019s what most users think right up until the moment there\u2019s a breach. And suddenly the mood has changed. Now everyone wants to know exactly what\u2019s happened. They want to know who has done what, where they\u2019ve done it, when it occurred, how they got in, and a million other questions. Your phone is ringing off the hook. Your e-mail is filling up faster than usual. What can you do? Where can you access the information you need? How do you respond to the incident?\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-da208aa elementor-widget elementor-widget-text-editor\" data-id=\"da208aa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tAlthough you may have just discovered there\u2019s been a breach, the big question is when did the breach actually occur? Was that just a few seconds ago, or did happen yesterday, or longer ago than that? A 2018 study by The Ponemon Institute on behalf of IBM (&#8220;Cost of a Data Breach Study&#8221;:\u00a0<a href=\"https:\/\/www.ibm.com\/security\/data-breach\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-cms-ai=\"0\">https:\/\/www.ibm.com\/security\/data-breach<\/a>) reported that the average time to detect a breach is an unacceptable 197 days, with a further 69 days taken to control the breach. Plenty of time for malicious hackers to cause mayhem AND cover their tracks. And it\u2019s not just mainframes, this can happen on open systems where there are SIEMs and other advanced tools.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2910a8d elementor-widget elementor-widget-text-editor\" data-id=\"2910a8d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThis 13th annual &#8220;Cost of a Data Breach Study&#8221; also reported that the global average cost of a data breach is US$3.86 million, while the average cost for each lost or stolen record containing sensitive and confidential information now stands at $148. Plus, there\u2019s the cost of the damage to your brand\/company\u2019s reputation. And, of course, it may cost you your job!\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-193b03d elementor-widget elementor-widget-text-editor\" data-id=\"193b03d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tAppreciating just how much a breach is going to cost makes finding out all the details about the breach even more pressing. So, what are you going to do? The great thing about a mainframe is that SMF (System Management Facility) data will tell you pretty much everything that has occurred. The only problem is that there are lots and lots of records to look through. Is it only one program that has been modified? How many things are you going to end up looking for? Just how long is this going to take you? All this while, senior management are breathing down your neck and everyone wants to know whether this is a real breach or just a false alarm.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1399504 elementor-widget elementor-widget-text-editor\" data-id=\"1399504\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tWe all remember A Christmas Carol, the 1843 novel by Charles Dickens that had Scrooge visited by three ghosts. The third ghost, the Ghost of Christmas Yet to Come, shows Scrooge the future, where he is dead and unmissed. You can think of this as the view of your systems programmers pouring over pages and pages of SMF data. When Scrooge wakes up, he determines to change his future and ends up sharing Christmas with Bob Cratchit, Tiny Tim, and their family. This could be you making the most of File Integrity Management (FIM) software, which is used on Windows and Unix platforms for this very purpose, is available on mainframes. FIM software provides a way of detecting changes by comparing the current contents of components to their trusted state. That way you have a lot of answers instead of just a lot of questions. And that trusted snapshot is safely stored in an encrypted vault.\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-aa20bf0 elementor-widget elementor-widget-text-editor\" data-id=\"aa20bf0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tFIM software can tell you who made the changes. They do that by accessing data in SMF and searching it to see what userid changed the files during the attack interval. It can then display the information in a 3270 or GUI interface so you can see all the information required, in one place, in seconds. Since FIM data can be sent to your SIEM or enterprise security console, like Splunk or QRadar, you could also look there and get all the information as well if you want to.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-214fc25 elementor-widget elementor-widget-text-editor\" data-id=\"214fc25\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tFIM software can tell you what has changed. FIM tools can identify every file that was modified, added, or deleted. FIM isn\u2019t fooled. It shows you not just where the problem started (a suspicious update) but every component that was accessed. It can also identify altered log files that would cloak a hacker\u2019s tracks. However, if the content matches the trusted state, then you very quickly know it was just a false alarm.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-20b9f15 elementor-widget elementor-widget-text-editor\" data-id=\"20b9f15\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tFIM software can tell you what LINE was changed. FIM tools can be instructed to keep a baseline copy of files and members. For config members, source, and text files that can be read by humans, state of the art FIM tools can automatically invoke your existing file comparison tool to show you a side-by-side picture. So not only do you know what components changed but can see the actual lines that are different.\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-946d472 elementor-widget elementor-widget-text-editor\" data-id=\"946d472\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tFIM software can tell you when it changed. FIM software records every successful scan, it knows the last time each component was correct. Now it can give you the attack interval (from the last good date to incident time) so you can focus your research on the exact actions during the interval. Knowing the last good date will also be important in deciding when the recovery process should be started too.\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1127754 elementor-widget elementor-widget-text-editor\" data-id=\"1127754\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\nFIM software can tell you why it changed. By querying change management products like Remedy and ServiceNow, advanced FIM products can determine whether the change was authorized or not. This can avoid many false alarms and ensure only validated alerts become an incident.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-512a83a elementor-widget elementor-widget-text-editor\" data-id=\"512a83a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tModern tools can automate every step of this incident response process. So now, when the phone rings, you can confidently tell management when a situation started and that recovery steps are being implemented. Additionally, you know who should be on the recovery team because you already know all the systems and applications affected.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3a1b90f elementor-widget elementor-widget-text-editor\" data-id=\"3a1b90f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tBy simply knowing who, what, when where and even why changes took place, you can control an incident before things get out of hand. Clearly, with the size of a mainframe prize for would be hackers, you need to be ready to respond, to either individuals or nation states, before they attack.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>For most people, security is a bit of a nuisance.&nbsp; Appreciating just how much a breach is going to cost makes finding out all the details about the breach even more pressing. So, what are you going to do? The great thing about a mainframe is that SMF (System Management Facility) data will tell you pretty much everything that has occurred. The only problem is that there are lots and lots of records to look through. Is it only one program that has been modified?<\/p>\n","protected":false},"author":696,"featured_media":3249,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[187],"tags":[95],"ppma_author":[3497],"class_list":["post-2176","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-bigdata-cloud","tag-big-data-amp-technology"],"authors":[{"term_id":3497,"user_id":696,"is_guest":0,"slug":"trevor-eddolls","display_name":"Trevor Eddolls","avatar_url":"https:\/\/www.experfy.com\/blog\/wp-content\/uploads\/2020\/04\/medium_c0bcd8d5-35e9-492d-8082-c20fbfbd588a-150x150.jpg","user_url":"https:\/\/itech-ed.com\/%20","last_name":"Eddolls","first_name":"Trevor","job_title":"","description":"Trevor Eddolls is Head at the iTech-Ed Group, which comprises the mainframe and IT consultancy. A popular speaker and blogger, he is also clinical director at iTech-Ed Hypnotherapy, head of IT for the AfSFH Exec., and director of training for SFH+. He is also editorial director for the Arcati Mainframe Yearbook, and published three mainframe-related books and six books on hypnotherapy."}],"_links":{"self":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/2176","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/users\/696"}],"replies":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/comments?post=2176"}],"version-history":[{"count":5,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/2176\/revisions"}],"predecessor-version":[{"id":35759,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/2176\/revisions\/35759"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media\/3249"}],"wp:attachment":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media?parent=2176"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/categories?post=2176"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/tags?post=2176"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/ppma_author?post=2176"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}