Limited supportBMC provides limited support for this version of the product. As a result, BMC no longer accepts comments in this space. If you encounter problems with the product version or the space, contact BMC Support.BMC recommends upgrading to the latest version of the product. To see documentation for that version, see BMC AMI Datastream for z/OS 7.1.

Using the System Integrity Violation scanner


(SPE2101) The System Integrity Violation (SIV) scanner identifies system settings that might be vulnerable to an outside attack. When an anomaly is found, the SIV scanner generates and passes messages to the BMC AMI Command Center for Security.

(SPE2107) SIV scanner also scans Supervisor Calls (SVCs) to identify SVC intercepts. The SIV scanner detects when SVCs change, verifies that the expected SVC type matches the actual SVC type, and verifies that the SVC resides in the storage location it is expected to be in. For example, SVC types 1, 2, and 6 should reside in the z/OS nucleus, SVC types 3 and 4 should reside in the Link Pack Area (LPA).

The advantage of using SIV scanner to monitor SVCs is that while SVC intercepts are a part of normal operations for many products, unexpected SVC intercepts can be difficult to detect manually with 255 SVCs to watch.

The SIV scanner runs at the following times:

  • Whenever there is an address space startup
  • Every day at midnight
  • When it is notified of SAF security system (RACF, ACF/2, TopSecret) changes
    Whenever there are SAF changes, all address spaces that have registered interest in these changes are notified through the z/OS Event Notification Facility (ENF) function 79.

Enabling the SIV scanner

The SIV scanner is disabled by default.

To enable the SIV scanner

  1. Open $$$CONFG member. 
  2. Delete the semicolon preceding SWITCH ON(SIV) to uncomment the option.

    ; SWITCH ON(SIV) ; System Integrity Violation Scanner

This enables the OPTIONS statement parameter, SIVSCANNER, which enables the SIV scanner. For more information, see OPTIONS-statement.

Running the SIV scanner manually

To run the SIV scanner manually, issue the following MODIFY command to the BMC AMI Defender for z/OS address space.

F czagentName,$ZINTEG,SCAN

For more information, see MODIFY command for System Integrity Violation (SIV) scanner in the MODIFY-command topic.

Sample messages

The messages that the SIV scanner generates and passes to BMC AMI Command Center for Security in response to identified vulnerabilities, are broken into several categories.

Sensitive Data Set Violation (SDV) messages

The following messages begin with the prefix SDV. The fileType parameter can be APF List, Linklist, Parmlib, or Proclib.

Number

Description

SDV1000I

fileType data set DSN=dataSetName does not have a fully qualified generic profile

The data set name does not have a specific SAF security profile controlling access to the data set.

Sample message:
SDV1000I Proclib data set DSN=CSG.DB2.PROCLIB does not have a fully qualified generic profile

SDV1001I

fileType data set DSN=dataSetName found with inappropriate audit settings

The data set name does not have the correct SAF security profile, which requires audit reporting of failed access attempts.

Sample message:
SDV1000I Parmlib data set DSN=SYS1.PARMLIB found with inappropriate audit settings

SDV1002I

fileType data set DSN=dataSetName found with UACC > NONE

The data set name has a SAF security profile with some level of universal access.

Sample message:
SDV1002I Proclib data set DSN=SYS1.PROCLIB found with UACC > NONE

SDV1003I

fileType data set DSN=dataSetName found with ID(*) > NONE

The data set name has a SAF security profile with some level of universal access.

Sample message:
SDV1003I Proclib data set DSN=SYS1.PROCLIB found with ID(*) > NONE

SDV1004I

fileType data set DSN=dataSetName found with WARNING attribute

The data set name has a SAF security profile that allows access to a data set that causes an error or abend.

Sample message:
SDV1004I APF List data set DSN=WXC.STEPLIB found with WARNING attribute

SDV1005I

Uncatalogued fileType data set DSN=dataSetName found

The data set name is not catalogued on the correct volume.

Sample message:
SDV1005I Uncataloged Parmlib data set DSN=SYS1.CLOCK.PARMLIB found

Sensitive Data Set Violation Total (SDT) messages

The following messages begin with the prefix SDT:

Number

Description

SDT1000I

count Sensitive data sets protected by non fully-qualified generic profiles

This is the total number of sensitive data sets that do not have a fully qualified security profile.

Sample message:
SDT1000I 1601 Sensitive data sets protected by non fully-qualified generic profiles

SDT1001I

count Sensitive data sets found with inappropriate audit settings

This is the total number of sensitive data sets with a security profile that does not require audit reporting of failed access attempts.

Sample message:
SDT1001I 17 Sensitive data sets found with inappropriate audit settings

SDT1002I

count Sensitive data sets found with UACC > NONE

This is the total number of sensitive data sets that do not have a fully qualified security profile.

Sample message:
SDT1002I 1624 Sensitive data sets found with UACC > NONE

SDT1003I

count Sensitive data sets found with ID(*) > NONE

This is the total number of sensitive data sets that do not have a fully qualified security profile.

Sample message:
SDT1003I 1624 Sensitive data sets found with ID(*) > NONE

SDT1004I

count Sensitive data sets found with WARNING attribute

This is the total number of sensitive data sets that do not have a fully qualified security profile.

Sample message:
SDT1004I 8 Sensitive data sets found with WARNING attribute

SDT1005I

count Uncatalogued sensitive data sets found

This is the total number of sensitive data sets that do not have a fully qualified security profile.

Sample message:
SDT1005I 156 Uncatalogued sensitive data sets found

 SVC Warning Condition (SWC) messages

(SPE2107)

The following messages begin with the prefix SWC:

Number

Description

SWC1000I

SVC SVCNumber SVCDescription. Type SVCType SVC expected to be in memoryLocation. Found at SVCAddress

Based on the SVC Type, the SVC number was expected to be in either the Nucleus or LPA but it is not there. The memory address for the SVC is displayed.

Sample message:
SWC1000I SVC 6 LINK/LINKX Type 2 SVC expected to be in NUCLEUS Found at 3A2B4800

SWC1001I

SVC SVCNumber SVCDescription modified. Old Address=oldSVCAddress New Address=newSVCAddress

The SVC address was modified. The old and new SVC addresses are displayed.

SWC1002I

Suspicious data data located in ASID ASIDNumber field ASCBMCC

A non-zero value was found. The ASCBMCC field should be 0 for the specified ASID.

SWC1003I

SVC SVCNumber SVCDescription Type SVCType SVC expected. Found type SVCType SVC at SVCAddress

An IBM-supplied SVC (0–199) was expected for the SVCType but a different type was found.

Sample message:
SWC1003I SVC 6 LINK/LINKX Type 2 SVC expected. Found type 3/4 SVC at 3A2B4800

Severe Warning Violation (SWV) messages

The following messages begin with the prefix SWV:

Number

Description

SWV2001I

CICS region jobName has SEC=NO on lparName

The CICS region has security checking disabled.

Sample message:
SWV2001I CICS region DMRACI72 has SEC=NO on IMSA

SWV2002I

DB2 region db2ID does not have AUTH=Yes on lparName

The Db2 system has security checking disabled.

SWV2003I

IMS region imsID does not have ISIS=R/A on lparName

The IMS system has security checking disabled.

SWV2004I

MQ region mqID "componentType" security is disabled

Security for an MQ component is disabled. The components checked are Subsystem, QMGR, QSG, Command, Connection, Context Process, Namelist, Queue, Topic, and Command Resources.

Sample message:
MQ region MQM2 "SUBSYSTEM" security is disabled

SWV2005I

IKJTSOxx/AUTHTSF configuration is vulnerable to a full penetration attack

IDCAMS is allowed to run in an authorized state under a TSO session.

SWV2006I

DIAGxx/ALLOWUSERKEYCSA(YES) configuration is vulnerable to a full penetration attack

Unauthorized programs can allocate or deallocate common storage.

SWV2007I

Program=programName has "PRIVILEGED" specified in the Program Properties Table (PPT)

The jobstep executing this program is automatically put into an elevated Workload Manager (WLM) Service Class (SYSSTC).

Sample message:
Program=AXRINIT has "PRIVILEGED" specified in the Program Properties Table (PPT)

SWV2008I

Program=programName has "BYPASS PASSWORD PROTECTION" specified in the Program Properties Table (PPT).

The program can bypass security protection (password protection and RACF).

Sample message:
Program=IFASMF has "BYPASS PASSWORD PROTECTION" specified in the Program Properties Table (PPT)

Related topic

 

Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*