Mainframe security is simple to understand and extremely intuitive to apply. Some might find it hard to believe that the mainframe security model can be easily integrated with other platforms and applications.

As everyone in the IT industry knows, a system’s security level depends strictly on the possibility of attacks from unknown and unplanned access. This kind of access is sometimes the singular cause of viruses and malware. These unexpected attacks have companies scrambling to find innovative solutions to help them avoid security breaches and improve the security postures of their IT environments.

For all these reasons, many professionals think protecting IT systems is very complicated and difficult to achieve. Why do they have this perception? In most cases, distributed systems have very complicated access control rules, requiring several actions to ensure full and secure protection.

Security-Rich by Design

An IBM white paper written a few years ago illustrated just how easy mainframe security is. The described mainframe was “security-rich by design,” which means that the hardware of the product, the IBM z Systems mainframe, is equipped with all the basic metadata required to enable the use of any software interface for protection definition.

The basic metadata is very intuitive. We can summarize its definition by asking these three questions:

  • What has to be accessed? These resources can be files, transactions, programs, databases, etc.
  • Who needs to access it? These are known as users.
  • How strong should that access be? These are known as access types, such as read, update, alter, etc.

The hardware of mainframe servers provides this metadata as a model for every software product to use without the need for specific definitions.

This unique hardware design feature fulfills the “security-rich by design” characteristic. Any specific resource, user or access type can be defined under the corresponding model by using a specific access control tool. In fact, the hardware includes protection rules for each of the three types of metadata, so any protection definition always follows the same native rules.

User Identity and Authentication

Amazingly, this simple model saves the mainframe from attacks. A user can come to IBM z Systems through direct mainframe access, a web interface, an external program or an emulator, among many other ways. No matter where the access originated, however, the user is obliged to follow the mainframe rules and must be identified by the hardware itself to perform any final action on the system. The user must make a final request to access a resource in a specific access type. The system will reject this request if the user does not have the correct authority.

Let’s look at a quick example. Suppose the web user [email protected] wants to obtain a list of objects included in the specific IBM DB2 for z/OS database DBCUST.

After being authenticated in the web application, the user transaction follows a specific path, passing different distributed objects, to obtain data from the mainframe. Because the system is security-rich by design, the web user is almost always unable to successfully close the end-to-end transaction without an associated z System user ID (an authorized user profile).

The parameters of each specific user ID are built-in requirements specified during the development of mainframe parts. To ensure the mainframe can recognize the user ID and apply the correct authorities when an application is executed, applications should be developed considering the right associations. Every other mainframe access mechanism besides the user ID, such as pass tickets or digital certificates, must follow the same rules specified during development.

So, if we suppose the associated z System user is NICO, and NICO is authorized to access the resource DBCUST with a READ access type, then final data can be sent back to the user.

Learn More About Mainframe Security

Even as mainframe technology continues to innovate and extend access controls to modern authentication methods, such as ID cards, bank cards or fingerprints, these will always behave as unique identities for any user.

To learn more about mainframe security, check out “Security on the IBM Mainframe,” an IBM Redbooks publication.

More from Identity & Access

Cybersecurity in the Next-Generation Space Age, Pt. 3: Securing the New Space

View Part 1, Introduction to New Space, and Part 2, Cybersecurity Threats in New Space, in this series. As we see in the previous article of this series discussing the cybersecurity threats in the New Space, space technology is advancing at an unprecedented rate — with new technologies being launched into orbit at an increasingly rapid pace. The need to ensure the security and safety of these technologies has never been more pressing. So, let’s discover a range of measures…

Backdoor Deployment and Ransomware: Top Threats Identified in X-Force Threat Intelligence Index 2023

Deployment of backdoors was the number one action on objective taken by threat actors last year, according to the 2023 IBM Security X-Force Threat Intelligence Index — a comprehensive analysis of our research data collected throughout the year. Backdoor access is now among the hottest commodities on the dark web and can sell for thousands of dollars, compared to credit card data — which can go for as low as $10. On the dark web — a veritable eBay for…

Kronos Malware Reemerges with Increased Functionality

The Evolution of Kronos Malware The Kronos malware is believed to have originated from the leaked source code of the Zeus malware, which was sold on the Russian underground in 2011. Kronos continued to evolve and a new variant of Kronos emerged in 2014 and was reportedly sold on the darknet for approximately $7,000. Kronos is typically used to download other malware and has historically been used by threat actors to deliver different types of malware to victims. After remaining…

An IBM Hacker Breaks Down High-Profile Attacks

On September 19, 2022, an 18-year-old cyberattacker known as "teapotuberhacker" (aka TeaPot) allegedly breached the Slack messages of game developer Rockstar Games. Using this access, they pilfered over 90 videos of the upcoming Grand Theft Auto VI game. They then posted those videos on the fan website Gamers got an unsanctioned sneak peek of game footage, characters, plot points and other critical details. It was a game developer's worst nightmare. In addition, the malicious actor claimed responsibility for a…