|
Information Security Training
from the Henderson Group |
This page is: |
Quick Links: HOME PAGE CONTACT US INFOSEC TRAINING
NEWSLETTERS AND USER GROUPS ARTICLES
ABOUT US OTHER INFO SOURCES |
You will learn:
For more information on seminar dates, locations, and hotels, and how to
register, please click here:
Please note that you can save money by holding these classes in-house. Call
Stu at (301) 229-7187 for details.
Note also the classes we offer for Information Security Training, as
listed on the left under QUICK LINKS.
|
"This class met every one of my expectations, and has greatly
enhanced my technical understanding of MVS."
---Tom Gibson, Dow Corning
"Stuart Henderson explains technical subjects in a manner that all types of audiences will enjoy (technical, non-
technical, users, administrators)." |
Table of Contents and Class Outline: HG75: How to Audit MVS I Concepts and Keywords . . . . . . . . . . . . . . . . . . . . . . . . . 3 A. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3 (Explanation of MVS, VTAM, TSO, CICS, LPAR, CPU, Sysplex SAF, and others) B. How MVS Security Works -- Two Aspects. . . . . . . . . . . 22 C. How MVS Security Works -- the Details. . . . . . . . . . . . 23 Hardware Controls. . . . . . . . . . . . . . . . . . . . 24 Supervisor State Versus Program State . . . . 36 Protect Keys . . . . . . . . . . . . . . . . . 39 Address Spaces . . . . . . . . . . . . . . . . 42 How MVS Uses the Hardware Controls . . . . . . . . . . . 48 Backdoors. . . . . . . . . . . . . . . . . . . . . . . . 52 IBM's Integrity Statement for MVS. . . . . . . . . . . . 87 System Symbols . . . . . . . . . . . . . . . . . . . . . 88 D. Control Objectives . . . . . . . . . . . . . . . . . . . . . 89 E. The Audit Program. . . . . . . . . . . . . . . . . . . . . . 90 II. Action Plan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92 A. Scoping, Planning and Basic Data Gathering . . . . . . . . . 93 Key Sources of Information for an MVS Audit. . . . . . . 95 B. Identify What Backdoors Exist. . . . . . . . . . . . . . . .110 C. Identify Authorized Backdoors and Compare. . . . . . . . . .124 D. Evaluate Change Control and Security Software Rules. . . . . . . . . . . . . . . . . . . . . . . . . .125 E. Evaluate Assurance Over Each Backdoor. . . . . . . . . . . .126 F. Summarize. . . . . . . . . . . . . . . . . . . . . . . . . .127 G. Wrap-up, Working Papers, and Follow-Up . . . . . . . . . . .128 III Forms and Reference . . . . . . . . . . . . . . . . . . . . . . . . . .130 A. Basic Security Model . . . . . . . . . . . . . . . . . . . .131 B. Forms to Summarize MVS Images. . . . . . . . . . . . . . . .136 C. Audit Plan . . . . . . . . . . . . . . . . . . . . . . . . .141 D. Model Documents. . . . . . . . . . . . . . . . . . . . . . .151 E. SYS1.PARMLIB . . . . . . . . . . . . . . . . . . . . . . . .162 INDEX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .183