Why Security?
Advances over the past few years in easy-to-use, high-level-inquiry
languages, the use of small computers, and general familiarity with data
processing have created a higher level of "computer literacy." Without a
corresponding growth in awareness of good data-security practices, these
advances could result in a higher likelihood of inadvertent (or deliberate)
data exposure. (In this context, data exposure means unauthorized access,
modification, or destruction of data.) In parallel, there are two
additional trends: the continuing need for information to be on some sort
of database that is easily accessible by authorized users, and the increase
in critical assets stored on databases.
As these and other trends continue, and as the number of users and the
ease-of-use of data systems increase, the need for data security takes on a
new level of importance. An installation can no longer have minimal
security simply because few people know how to access the data.
Installations must actively pursue and demonstrate security and use a
security mechanism to control any form of access to critical data.
Security Requirements
A security mechanism should:
How RACF Meets Security Needs
RACF helps meet the needs for security by providing the ability to:
- Identify and verify users
- Authorize users to access the protected resources
- Control the means of access to resources
- Log and report various attempts of unauthorized access to protected resources
- Administer security to meet an installation's security goals
RACF provides these functions; the installation defines the users and the
resources to be protected.
A specific RACF user, called the security administrator, has the
responsibility to define users and resources to RACF. (Alternatively, the
security administrator can assign other people to do some of this defining.) As well as defining what resources to protect (DASD data sets, minidisks, tape data sets, DASD volumes, tape volumes, terminals, and so on), the security administrator can define and grant the authorities by which users access the protected resources. Thus, the security administrator sets down the guidelines that RACF uses to decide the
user-resource interaction within the installation.
RACF retains information about the users, resources, and access
authorities in profiles on the RACF database and refers to the profiles
when deciding which users should be permitted access to protected system
resources.
Identifying and Verifying Users
RACF uses a user ID to identify the person who is trying to gain access
to the system and a password to verify the authenticity of that identity.
RACF uses the concept of only one person knowing a particular user
ID-password combination to verify user identities and to ensure personal
accountability. RACF allows some alternatives to password identification:
RACF allows the use of an operator identification card (OIDCARD) in place of or in addition to the password during terminal processing. By requiring that a person not only know a password but also furnish an OIDCARD, an installation has increased assurance that the user ID has been entered by the proper user.
RACF also allows workstations and client machines in a client-server
environment to use a PassTicket in place of a password. A PassTicket can
be generated by RACF or by another authorized function, and can be
used only once on a given computer system, within ten minutes of generation,
OpenEdition users are also identified with numeric user identifiers
(UIDs), and Open Edition groups are identified with numeric group
identifiers (GIDs). Unlike user names or group names, these numeric Ids
can be shared by more than one user or group, although sharing is not
recommended.
RACF can help meet an installation's security needs because it allows
the installation to define users who can access protected resources and,
concurrently, to relate how users can access the protected resources.
Authorizing Users to Access Resources
Having identified and verified the user, RACF then controls interaction
between the user and the system resources. RACF must authorize not only
which users may access resources but also in what way the user may access
them, such as for reading or for updating. RACF also can authorize when a
user can access resources, by either time or day.
An OpenEdition user with a UID of 0 is a superuser. Because superusers
pass all OpenEdition security checks, they can access all OpenEdition
resources without restriction.
Logging and Reporting
Having identified and verified the user, and limited access to resources,
RACF records the events where attempted user-resource interaction has
occurred. An installation can use logging and reporting to alert management
not only to anticipated user activities and system events but also to
variances from the expected use of the system.
Administering Security
Because the security requirements at every data processing installation
differ, RACF allows an installation to meet its own unique security
objectives. RACF enables an installation to administer security in a number
of ways:
- Flexible control of access to protected resources
- Protection of installation-defined resources
- Ability to store information for other products
- Choice of centralized or decentralized control of profiles
- Easy-to-use ISPF panels
- Transparency to end users
- Exits for installation-written routines
- Data security monitor
- RACF report writer
Flexible Control
RACF allows the installation to set its own rules for controlling access
to its resources by defining what is protected at what level and who can
access protected resources. Because of RACF's flexible design, any
installation can tailor RACF to interact with its present operating
environment. Because the installation establishes the controls--while
RACF merely enforces them--each installation can also adapt RACF
implementation to changes in its security needs.
Protection of Installation-Defined Resources
In addition to the predefined resources, such as data sets, minidisks,
terminals, and transactions defined to IMS/ESA and CICS/ESA*, RACF permits
an installation to protect its own installation-defined resources.
Installation-defined resources provide a great deal of flexibility in
defining what resources an installation can protect.
In a system-managed storage environment, RACF allows a storage
administrator to control the use of data, management, and storage classes.
RACF Report Writer
The RACF report writer permits the auditor or security administrator to
assess the implementation of RACF and the use of the resources it protects.
The RACF report writer provides a wide range of reports that enable an
installation to monitor and verify the use of the system and resources.
The RACF report writer lists the contents of system management facility
(SMF) records in a format that is easy to read. The RACF report writer can
also generate reports based on the information in the SMF records, such as:
- Reports that describe attempts to access a particular RACF-protected resource in terms of user identity, number and type of successful accesses, and number and type of attempted security violations
- Reports that describe user and group activity
- Reports that summarize system use and resource use.
The RACF report writer is not enhanced in RACF 2.1. Its function is
stabilized at the RACF 1.9.2 level. Except as detailed below, it is not
able to report on any new RACF 2.1 function. For example, report writer
does not report on:
- New events, such as OpenEdition MVS support
- New audit data, such as the sysplex data sharing mode
Certain RACF 2.1 enhancements automatically handled by the report writer
are still reported. For example:
Installations using the RACF report writer have to change to another
reporting package if they want to obtain full reports from RACF SMF records. Some alternatives are:
- Service Level Reporter (SLR)
- An independent vendor's reporting program
- Your own reporting program
Users
RACF allows an installation to define the users who can access the
protected resources, records information about the users in the user
profiles, and maintains this information in the RACF database (along with
all other profiles). The user profile includes (but is not limited to):
- The user's name and identifier.
- The user's password.
- The profile owner.
The user's responsibilities, authorities, or restrictions while
defined to the system. These are called the user attributes.
The user's security classification. This classification determines
the user's ability to access sensitive resources.
The user attributes define authorities or limits that a specific user has
while on the protected system. (Not every user on a protected system has
one of the user attributes.) The system-level user attributes include:
SPECIAL, which gives the user full, system-wide control over all the profiles in the RACF database.
AUDITOR, which gives the user full system-wide responsibility for auditing the security controls and the use of the system resources.
OPERATIONS, which allows the user to perform any maintenance operations, such as copying, reorganizing, cataloging, and scratching, on RACF-protected system resources.
CLAUTH (class authorization), which allows the user to define profiles to RACF for classes of predefined or installation-defined resources. (A class is a collection of RACF entities with similar
characteristics. For example, DASDVOL is the predefined class for DASD volumes.)
REVOKE, which prohibits the RACF-defined user from entering the system.
Before RACF 1.9, a security classification consisted of a security level
or a set of categories or both. A security level is an installation-defined
name that corresponds to a numerical security level (the higher the number,
the higher the security level). For example, a user might have a security
level of confidential. The installation has defined the security level of
confidential to be equal to 150. A category is an installation-defined name
corresponding to a department or area within an organization with similar
security quirements. For example, all of the people who work on the
accounting program could be in a category called "accounting."
When a user requests access to a sensitive resource, RACF checks the
user's categories and security level to determine whether the user has an
adequate security classification for that resource.
RACF 1.9 or later provides an additional security-classification concept,
a security label, which is a combination of a security level and zero or
more categories. See "B1 Security Level" in topic 2.3.1.2 for more
information. To access a resource protected by a security label, a user
has to have a security label whose contents encompass the contents of the
resource's security label.
Groups
With RACF, all defined users belong to at least one group, known as their
default group. A group is a collection of RACF users who share common
access requirements to protected resources or who have similar attributes
within the system. Groups associate similar jobs or projects together for
administrative convenience. You can think of the groups as forming a
hierarchical or "tree" structure, where each group is "owned" by a superior
group. Groups can also "own" resources, as well as users and other groups.
Figure 4 illustrates a tree structure of users associated to a group.
(Note that subgroups or resources could be associated with groups in a
similar tree structure.)