Additional security controls, beyond those enabled by product installation and configuring security with the default settings,
can be enabled for greater
enterprise server region security.
ESF resource classes
There are some optional resource classes which are not defined by the default security configuration shipped with
Enterprise Server. Defining these classes and installing appropriate resource access control rules can significantly improve security.
This topic assumes that the External Security Facility (ESF) has been configured, and a Security Manager using the MLDAP ESM
Module is being used for resource access control.
See your product Help for more information on how to specify additional resource classes in the External Security Manager.
- PHYSFILE
- The
PHYSFILE resource class restricts what OS files can be used as JCL data sets.
Important: You must specify this class for any
enterprise server region which uses JES. Otherwise, any user that can submit arbitrary JCL can operate on any file on the server system, with the
permissions of the account under which the
enterprise server region is running, simply by defining a data set appropriately using a catalog entry or
PCDSN.
Under the PHYSFILE class, rules should allow one or more paths, with the appropriate level of access (typically at least one
with full access for creating new data sets, possibly some with read-only access), and deny others using a rule with the name
**.
- Communications Server
- The Communications Server class is used to restrict access to some administration features of the Communications Server process(es)
associated with each
enterprise server region. Restricting these features improves security primarily by reducing the information available to an attacker. See
Resource Classes for Communications Server in your product Help for more information.
- AdminAPI
- This class can be used to restrict access to the External Security Facility's Admin API. If the Admin API is not being used
to update security data, an appropriate rule set might be:
LIST*: allow:*:read
*: deny:*:all
This would permit only LIST functions, which are used internally by some
Enterprise Server functions.
Security checks for CICS transactions
When a CICS transaction program is executing, the security checks made by the CICS subsystem are influenced by two settings
in the CICS PCT entry for that transaction:
- Resource Level Security (RLS)
- This option controls whether access checks are made for the CICS resources (such as files, queues, and so forth) specified
in EXEC CICS statements.
- Command Security (Cmd)
- This option controls whether access checks are made if the program attempts to use any of the CICS System APIs, such as EXEC
CICS INQUIRE.
Enabling these options in the CICS transaction definitions improves security.