virtual security zones - the conference exchange€¦ · access vs. trunk ethernet header 14 bytes...

38
Virtual Security Zones Alan Altmark © IBM Corporation 2013, 2014 Alan Altmark IBM Senior Managing z/VM Consultant March 2014

Upload: others

Post on 18-Jul-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Virtual Security Zones - the Conference Exchange€¦ · Access vs. Trunk Ethernet Header 14 bytes 80 00 20 7A 3F 3E Destination MAC 80 00 20 20 3A AE Source MAC 08 00 Type Data 46

Virtual Security Zones

Alan Altmark

© IBM Corporation 2013, 2014

Alan AltmarkIBM Senior Managing z/VM Consultant

March 2014

Page 2: Virtual Security Zones - the Conference Exchange€¦ · Access vs. Trunk Ethernet Header 14 bytes 80 00 20 7A 3F 3E Destination MAC 80 00 20 20 3A AE Source MAC 08 00 Type Data 46

TrademarksThe following are trademarks of the International Business Machines Corporation in the United States and/or other countries.

The following are trademarks or registered trademarks of other companies.

* Registered trademarks of IBM Corporation

Intel is a trademark of Intel Corporation in the United States, other countries, or both.

IBM*IBM logo*System Storage*System z*System z9*System z10*

z9*z10z/OS*z/VM*zEnterprise*

© IBM Corporation 2013, 20142

* All other products may be trademarks or registered trademarks of their respective companies.

Intel is a trademark of Intel Corporation in the United States, other countries, or both. Java and all Java-related trademarks and logos are trademarks of Sun Microsystems, Inc., in the United States and other countriesLinux is a registered trademark of Linus Torvalds in the United States, other countries, or both.UNIX is a registered trademark of The Open Group in the United States and other countries.Microsoft, Windows and Windows NT are registered trademarks of Microsoft Corporation.Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.

Notes: All customer examples cited or described in this presentation are presented as illustrations of the manner in which some customers have used IBM products and the results they may have achieved. Actual environmental costs and performance characteristics will vary depending on individual customer configurations and conditions.

This publication was produced in the United States. IBM may not offer the products, services or features discussed in this document in other countries, and the information may be subject to change without notice. Consult your local IBM business contact for information on the product or services available in your area.

All statements regarding IBM's future direction and intent are subject to change or withdrawal without notice, and represent goals and objectives only.Information about non-IBM products is obtained from the manufacturers of those products or their published announcements. IBM has not tested those products and cannot confirm the performance, compatibility, or any other claims related to non-IBM products. Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products.

Prices subject to change without notice. Contact your IBM representative or Business Partner for the most current pricing in your geography.

Page 3: Virtual Security Zones - the Conference Exchange€¦ · Access vs. Trunk Ethernet Header 14 bytes 80 00 20 7A 3F 3E Destination MAC 80 00 20 20 3A AE Source MAC 08 00 Type Data 46

Agenda

• Introduction

• Securing System z hardware

• A multi-zone network

© IBM Corporation 2013, 2014

• A multi-zone network

• VLANs and traffic separation

• Enforcing the rules

3

Page 4: Virtual Security Zones - the Conference Exchange€¦ · Access vs. Trunk Ethernet Header 14 bytes 80 00 20 7A 3F 3E Destination MAC 80 00 20 20 3A AE Source MAC 08 00 Type Data 46

The Myth ofMainframe Security

© IBM Corporation 2013, 20144

Mainframe Security

Page 5: Virtual Security Zones - the Conference Exchange€¦ · Access vs. Trunk Ethernet Header 14 bytes 80 00 20 7A 3F 3E Destination MAC 80 00 20 20 3A AE Source MAC 08 00 Type Data 46

The Reality of Mainframe Security

© IBM Corporation 2013, 20145

The Reality of Mainframe Security

Page 6: Virtual Security Zones - the Conference Exchange€¦ · Access vs. Trunk Ethernet Header 14 bytes 80 00 20 7A 3F 3E Destination MAC 80 00 20 20 3A AE Source MAC 08 00 Type Data 46

Securing the Hardware

© IBM Corporation 2013, 20146

Page 7: Virtual Security Zones - the Conference Exchange€¦ · Access vs. Trunk Ethernet Header 14 bytes 80 00 20 7A 3F 3E Destination MAC 80 00 20 20 3A AE Source MAC 08 00 Type Data 46

z/VM Security begins with System z security

• Protect the HMC• Don’t share user IDs• …but don’t be afraid to connect it to your internal network• Limit span of control as appropriate; add roles

© IBM Corporation 2013, 2014

• Protect the I/O configuration• Create a separate LPAR that is authorized to modify the I/O

configuration• Give partitions access only to devices they require

7

Page 8: Virtual Security Zones - the Conference Exchange€¦ · Access vs. Trunk Ethernet Header 14 bytes 80 00 20 7A 3F 3E Destination MAC 80 00 20 20 3A AE Source MAC 08 00 Type Data 46

System z Hardware SecurityLPAR 1 LPAR 3

Dynamic I/O configuration management

authority

LPAR 2

z/VM

production

z/OS

production

© IBM Corporation 2013, 20148

HiperSockets

PR/SM

authority

Minimal z/OS or z/VM

Ethernet

I/O device access is controlled by PR/SM

Page 9: Virtual Security Zones - the Conference Exchange€¦ · Access vs. Trunk Ethernet Header 14 bytes 80 00 20 7A 3F 3E Destination MAC 80 00 20 20 3A AE Source MAC 08 00 Type Data 46

Warning: Shared Open Systems Adapters

LPAR 1 LPAR 3LPAR 2

ApplicationZone

ApplicationZone

DataZone

© IBM Corporation 2013, 20149

A shared OSA creates a “short circuit” between LPARs unless QDIO data connection isolation

is used (z10 and later)

?PR/SM

Page 10: Virtual Security Zones - the Conference Exchange€¦ · Access vs. Trunk Ethernet Header 14 bytes 80 00 20 7A 3F 3E Destination MAC 80 00 20 20 3A AE Source MAC 08 00 Type Data 46

Warning: HiperSocketsLPAR 1 LPAR 3LPAR 2

DataZone

ApplicationZone

ApplicationZone

© IBM Corporation 2013, 201410

PR/SM

A HiperSocket is a LAN segment.

Treat is like one.

?

Page 11: Virtual Security Zones - the Conference Exchange€¦ · Access vs. Trunk Ethernet Header 14 bytes 80 00 20 7A 3F 3E Destination MAC 80 00 20 20 3A AE Source MAC 08 00 Type Data 46

Multi-zone networks

© IBM Corporation 2013, 201411

Page 12: Virtual Security Zones - the Conference Exchange€¦ · Access vs. Trunk Ethernet Header 14 bytes 80 00 20 7A 3F 3E Destination MAC 80 00 20 20 3A AE Source MAC 08 00 Type Data 46

Multi-zone Network

webweb web

webapp

app app

web web db

DMZ / web Applications

Data

© IBM Corporation 2013, 201412

A DMZ (demilitarized zone) is the name given to the subnet that insulates critical network components (servers) from a public network.

network

Data

Page 13: Virtual Security Zones - the Conference Exchange€¦ · Access vs. Trunk Ethernet Header 14 bytes 80 00 20 7A 3F 3E Destination MAC 80 00 20 20 3A AE Source MAC 08 00 Type Data 46

Multi-zone Network on System z

webweb web

webapp

app app

web

Web / DMZ Applications

Datadb

© IBM Corporation 2013, 201413

System z

network

Data

Page 14: Virtual Security Zones - the Conference Exchange€¦ · Access vs. Trunk Ethernet Header 14 bytes 80 00 20 7A 3F 3E Destination MAC 80 00 20 20 3A AE Source MAC 08 00 Type Data 46

Firewalls

© IBM Corporation 2013, 2014

“Where, oh, where has my firewall gone?”

14

Page 15: Virtual Security Zones - the Conference Exchange€¦ · Access vs. Trunk Ethernet Header 14 bytes 80 00 20 7A 3F 3E Destination MAC 80 00 20 20 3A AE Source MAC 08 00 Type Data 46

Inboard (internal) firewalls

webweb web

webapp

app app

web data

© IBM Corporation 2013, 201415

Internet

dataSystem z

data

Page 16: Virtual Security Zones - the Conference Exchange€¦ · Access vs. Trunk Ethernet Header 14 bytes 80 00 20 7A 3F 3E Destination MAC 80 00 20 20 3A AE Source MAC 08 00 Type Data 46

Outboard (external) firewalls

webweb web

webapp

app app

web webdatadata

© IBM Corporation 2013, 201416

Internet

data

Page 17: Virtual Security Zones - the Conference Exchange€¦ · Access vs. Trunk Ethernet Header 14 bytes 80 00 20 7A 3F 3E Destination MAC 80 00 20 20 3A AE Source MAC 08 00 Type Data 46

Guest LANs with HiperSockets

webweb web

web

app

app

web

z/OS DB2

LPAR 1 LPAR 2

z/VM

app

z/VM

app

© IBM Corporation 2013, 201417

app

HiperSocketsPR/SM

= Firewall Router

app

Internet

app

Page 18: Virtual Security Zones - the Conference Exchange€¦ · Access vs. Trunk Ethernet Header 14 bytes 80 00 20 7A 3F 3E Destination MAC 80 00 20 20 3A AE Source MAC 08 00 Type Data 46

HiperSockets & z/OS packet filters

webweb web

web

web

LPAR 1 LPAR 2

z/VM

app

z/VM

appapp

z/OSDB2Comms Server

© IBM Corporation 2013, 2014

18

app

PR/SM

= Firewall Router

app

app

HiperSockets

Internet

Server packetfilter

Page 19: Virtual Security Zones - the Conference Exchange€¦ · Access vs. Trunk Ethernet Header 14 bytes 80 00 20 7A 3F 3E Destination MAC 80 00 20 20 3A AE Source MAC 08 00 Type Data 46

Virtual Switches and VLAN Separation

19

Page 20: Virtual Security Zones - the Conference Exchange€¦ · Access vs. Trunk Ethernet Header 14 bytes 80 00 20 7A 3F 3E Destination MAC 80 00 20 20 3A AE Source MAC 08 00 Type Data 46

VLAN-unaware VSWITCH

Linux1

FLOOR2

� Virtual access port

SET VSWITCH FLOOR2GRANT LINUXnLinux2 Linux3 Linux4

© IBM Corporation 2013, 201420

© Cisco Corp

FLOOR2

� Physical access port on VLAN 10

Page 21: Virtual Security Zones - the Conference Exchange€¦ · Access vs. Trunk Ethernet Header 14 bytes 80 00 20 7A 3F 3E Destination MAC 80 00 20 20 3A AE Source MAC 08 00 Type Data 46

VLAN-aware VSWITCH

Linux1 Firewall Linux3

FLOOR1

Virtual trunk port �

� Virtual access port

SET VSWITCH FLOOR1GRANT FIREWALLPORTTYPE TRUNK

VLAN 10 20

SET VSWITCH FLOOR1GRANT LINUX3PORTTYPE ACCESSVLAN 20

© IBM Corporation 2013, 201421

© Cisco Corp

VLAN 10 VLAN 20� Physical trunk port

Page 22: Virtual Security Zones - the Conference Exchange€¦ · Access vs. Trunk Ethernet Header 14 bytes 80 00 20 7A 3F 3E Destination MAC 80 00 20 20 3A AE Source MAC 08 00 Type Data 46

Access vs. Trunk

Ethernet Header14 bytes

80 00 20 7A 3F 3EDestination MAC

80 00 20 20 3A AESource MAC

08 00Type

Data46 - 1500 bytes

IP, ARP, etc.Payload

Trailer4 bytes

00 20 20 3ACRC

Ethernet Type II Frame64 – 1518 bytes

Access port and Trunk port

© IBM Corporation 2013, 201422

Ethernet Header14 bytes

80 00 20 7A 3F 3EDestination MAC

80 00 20 20 3A AESource MAC

81 00TPID

Data46 - 1500 bytes

IP, ARP, etc.Payload

Trailer4 bytes

00 20 20 3ACRC

Tagged Ethernet Type II Frame (discarded by access port)68 – 1522 bytes

08 00Type

000AVID

Access port and Trunk portWhen used on a trunk port, the switch will associate it with the

native VLAN ID (VID)

Trunk port

Page 23: Virtual Security Zones - the Conference Exchange€¦ · Access vs. Trunk Ethernet Header 14 bytes 80 00 20 7A 3F 3E Destination MAC 80 00 20 20 3A AE Source MAC 08 00 Type Data 46

Network with VSWITCH (fully shared)

webweb web

web

web z/OS DB2

LPAR 1 LPAR 2

z/VM

appappapp

db dbdb

© IBM Corporation 2013, 201423

VSWITCH

With 1 VSWITCH, 3 VLANs, and a multi-domain firewall

To internet

Page 24: Virtual Security Zones - the Conference Exchange€¦ · Access vs. Trunk Ethernet Header 14 bytes 80 00 20 7A 3F 3E Destination MAC 80 00 20 20 3A AE Source MAC 08 00 Type Data 46

Multi-zone Network with VSWITCH(red zone physical isolation)

webweb web

web

web z/OS DB2

LPAR 1 LPAR 2

z/VM

appappapp

db dbdb

© IBM Corporation 2013, 201424

VSWITCH “INTERNET”

With 2 VSWITCHes, 3 VLANs, and a multi-domain firewall

Tointernet

“APPDATA”

Page 25: Virtual Security Zones - the Conference Exchange€¦ · Access vs. Trunk Ethernet Header 14 bytes 80 00 20 7A 3F 3E Destination MAC 80 00 20 20 3A AE Source MAC 08 00 Type Data 46

Enforcing the Separation

25

Page 26: Virtual Security Zones - the Conference Exchange€¦ · Access vs. Trunk Ethernet Header 14 bytes 80 00 20 7A 3F 3E Destination MAC 80 00 20 20 3A AE Source MAC 08 00 Type Data 46

Turn off backchannel communications

• No user-defined Guest LANs• VMLAN LIMIT TRANSIENT 0

• No virtual CTC• MODIFY COMMAND DEFINE IBMCLASS G PRIVCLASS M

• No IUCV

© IBM Corporation 2013, 2014

• No IUCV• Use explicit IUCV authorization in the directory,

not IUCV ALLOW or IUCV ANY

• No secondary consoles• MODIFY COMMAND SET SUBCMD SECUSER IBMCLASS

G PRIVCLASS M

• But what else might there be?

26

Page 27: Virtual Security Zones - the Conference Exchange€¦ · Access vs. Trunk Ethernet Header 14 bytes 80 00 20 7A 3F 3E Destination MAC 80 00 20 20 3A AE Source MAC 08 00 Type Data 46

Turn off backchannel communications

• VMCF• MODIFY DIAGNOSE DIAG068 IBMCLASS G PRIVCLASS M

• ESA/XC mode address space sharing• DCSS• And we can add new interfaces in an APAR

© IBM Corporation 2013, 2014

• And we can add new interfaces in an APAR• Google “less than class g” by Rob van der Heij• Too hard for some folks

• Consider RACF Mandatory Access Controls instead• AppArmor and SELinux provide the same capabilities for Linux

27

Page 28: Virtual Security Zones - the Conference Exchange€¦ · Access vs. Trunk Ethernet Header 14 bytes 80 00 20 7A 3F 3E Destination MAC 80 00 20 20 3A AE Source MAC 08 00 Type Data 46

Multi-Zoning with RACF

• Mandatory access controls override end user controls• Users are assigned to one or more named projects

• Minidisks, guest LANs, VSWITCHes, and VLAN IDs, NSSes, DCSSes, spool files

© IBM Corporation 2013, 2014

DCSSes, spool files• all represent data in those same projects

• Users can only access data in their assigned projects

• Overrides user- or admin-given permissions

28

Page 29: Virtual Security Zones - the Conference Exchange€¦ · Access vs. Trunk Ethernet Header 14 bytes 80 00 20 7A 3F 3E Destination MAC 80 00 20 20 3A AE Source MAC 08 00 Type Data 46

Multi-Zoning with RACF

• A Security Label combines the concepts of• Security clearance (secret, top secret, eyes only)• Information zones

• Information zones apply to any place data may exist• disks, networks, and other users

© IBM Corporation 2013, 2014

• Security clearance• Ensures servers cannot see extra-sensitive data in their information zone• Prevents copying of data to medium that is readable by servers with lower security

clearance (“No write down”)• Not prevalent since there is no equivalent in distributed networking solutions

• Label “dominance” is established based on intersection of zones and security clearance

• Not just a simple string comparison

29

Page 30: Virtual Security Zones - the Conference Exchange€¦ · Access vs. Trunk Ethernet Header 14 bytes 80 00 20 7A 3F 3E Destination MAC 80 00 20 20 3A AE Source MAC 08 00 Type Data 46

Multi-zone z/VM LPAR with RACFSecurity Label Enforcement

Linux 2

Linux 4Linux 1

Backup

© IBM Corporation 2013, 201430

Linux 5Linux 2

Linux 3

CMS

Page 31: Virtual Security Zones - the Conference Exchange€¦ · Access vs. Trunk Ethernet Header 14 bytes 80 00 20 7A 3F 3E Destination MAC 80 00 20 20 3A AE Source MAC 08 00 Type Data 46

Multi-Zoning with RACF

• Create security levels and data partitions

RDEFINE SECDATA SECLEVEL ADDMEM(DEFAULT/100)

RDEFINE SECDATA CATEGORY ADDMEM(DMZ APPS DATA)

RDEFINE SECLABEL RED SECLEVEL(DEFAULT) ADDCATEGORY(DMZ) UACC(NONE)

© IBM Corporation 2013, 2014

RDEFINE SECLABEL RED SECLEVEL(DEFAULT) ADDCATEGORY(DMZ) UACC(NONE)

RDEFINE SECLABEL GREEN SECLEVEL(DEFAULT) ADDCATEGORY(APPS) UACC(NONE)

RDEFINE SECLABEL BLUE SECLEVEL(DEFAULT) ADDCATEGORY(DATA) UACC(NONE)

31

Page 32: Virtual Security Zones - the Conference Exchange€¦ · Access vs. Trunk Ethernet Header 14 bytes 80 00 20 7A 3F 3E Destination MAC 80 00 20 20 3A AE Source MAC 08 00 Type Data 46

Multi-Zoning with RACF

Assign virtual machines their SECLABELs

PERMIT BLUE CLASS(SECLABEL) ID(LINUX1) ACCESS(READ)

ALTUSER LINUX1 SECLABEL(BLUE)

PERMIT RED CLASS(SECLABEL) ID(LINUX2) ACCESS(READ)

© IBM Corporation 2013, 2014

PERMIT RED CLASS(SECLABEL) ID(LINUX2) ACCESS(READ)

ALTUSER LINUX2 SECLABEL(RED)

32

Page 33: Virtual Security Zones - the Conference Exchange€¦ · Access vs. Trunk Ethernet Header 14 bytes 80 00 20 7A 3F 3E Destination MAC 80 00 20 20 3A AE Source MAC 08 00 Type Data 46

Multi-Zoning with RACF

• But sometimes a server serves the Greater Good, providing services to all users

• Exempt server from label checking

© IBM Corporation 2013, 2014

• Assign predefined label SYSNONE

PERMIT SYSNONE CLASS(SECLABEL) ID(TCPIP) ACCESS(READ)

ALTUSER TCPIP SECLABEL(SYSNONE)

33

Page 34: Virtual Security Zones - the Conference Exchange€¦ · Access vs. Trunk Ethernet Header 14 bytes 80 00 20 7A 3F 3E Destination MAC 80 00 20 20 3A AE Source MAC 08 00 Type Data 46

Multi-Zoning with RACF

• Example: Assign labels to resources• VMMDISK: Minidisk• VMLAN: Guest LANs and Virtual Switches

RALTER VMMDISK LXHTTP01.191 SECLABEL(RED)RALTER VMMDISK LXHTTP01.201 SECLABEL(RED)

© IBM Corporation 2013, 2014

RALTER VMMDISK LXHTTP01.201 SECLABEL(RED)

RALTER VMLAN SYSTEM.INTERNET SECLABEL(RED)

RALTER VMLAN SYSTEM.APPDATA SECLABEL(SYSNONE)RALTER VMLAN SYSTEM.APPDATA.0010 SECLABEL(BLUE)RALTER VMLAN SYSTEM.APPDATA.0020 SECLABEL(RED)

PERMIT SYSTEM.APPDATA.0010 CL(VMLAN) ID(LINUX1) ACC(UPDATE)PERMIT SYSTEM.APPDATA.0020 CL(VMLAN) ID(LINUX2) ACC(UPDATE)

34

Page 35: Virtual Security Zones - the Conference Exchange€¦ · Access vs. Trunk Ethernet Header 14 bytes 80 00 20 7A 3F 3E Destination MAC 80 00 20 20 3A AE Source MAC 08 00 Type Data 46

Multi-Zoning with RACF

• Activate RACF protection• SETROPTS CLASSACT(SECLABEL VMMDISK VMLAN)• SETROPTS RACLIST(SECLABEL)• SETROPTS MLACTIVE(WARNINGS)

• If resource doesn’t have a seclabel, message is issued and

© IBM Corporation 2013, 2014

• If resource doesn’t have a seclabel, message is issued and seclabels are ignored.

Or• SETROPTS MLACTIVE(FAILURES)

• If resource doesn’t have a seclabel, command fails.• This is more secure!

35

Page 36: Virtual Security Zones - the Conference Exchange€¦ · Access vs. Trunk Ethernet Header 14 bytes 80 00 20 7A 3F 3E Destination MAC 80 00 20 20 3A AE Source MAC 08 00 Type Data 46

Summary

• Check network design with network architect

• Place firewalls where the network security team wants them to go

© IBM Corporation 2013, 2014

• Use common sense• Protect the hardware• Protect your data• Protect your servers• Protect your company• Protect yourself!!

36

Page 37: Virtual Security Zones - the Conference Exchange€¦ · Access vs. Trunk Ethernet Header 14 bytes 80 00 20 7A 3F 3E Destination MAC 80 00 20 20 3A AE Source MAC 08 00 Type Data 46

Reference Information

• This presentation• http://www.VM.ibm.com/devpages/altmarka/present.html

• z/VM Security resources• http://www.VM.ibm.com/security

© IBM Corporation 2013, 2014

• z/VM Secure Configuration Guide• http://publibz.boulder.ibm.com/epubs/pdf/hcss0b30.pdf

• System z Security• http://www.ibm.com/systems/z/advantages/security/

• z/VM Home Page• http://www.VM.ibm.com

37

Page 38: Virtual Security Zones - the Conference Exchange€¦ · Access vs. Trunk Ethernet Header 14 bytes 80 00 20 7A 3F 3E Destination MAC 80 00 20 20 3A AE Source MAC 08 00 Type Data 46

Contact Information

Alan C. Altmark

Senior Managing IT Consultant

IBM Systems Lab Servicesand Training

IBM1701 North Street

Endicott, NY 13760

Mobile 607 321 7556

Fax 607 429 3323

© IBM Corporation 2013, 201438

• Mailing lists: [email protected]@[email protected]://ibm.com/vm/techinfo/listserv.html

z/VM & Linux on System zFax 607 429 3323

Email: [email protected]