You are on page 1of 50

DB2 AUDIT PROGRAM 1 of 2

AUDIT: DB2

AREA: APPLICATION SYSTEMS

OBJECTIVE: To ensure that applications which make use of DB2 databases

are adequately controlled.

SECURITY ADMINISTRATION

1. Is there a security administrator who is tasked with granting authority

to access data as required or is this devolved. Whichever way is used, is

there any control over the granting of authority to ensure that all

authorisations are valid and have been approved.

ADMINISTRATIVE FUNCTIONS

Determine who has access to the high level administrative privileges as

follows. Ensure that these facilities are restricted to those persons who

require them as part of their regular duties.

1. DBADM Determine who has DBADM for the particular database under review

from review of the SYSDBAUTH table in the DB2 catalog. Ensure that these

are not held with the GRANT option unless absolutely necessary.

2. DBCTRL Determine who has DBCTRL authority for the database under review

from the SYSDBAUTH table of the catalog. Ensure that these are not held

with the GRANT option unless absolutely necessary.

3. DBMAINT Determine who has DBMAINT authority for the database under

review from the SYSDBAUTH table of the catalog. Ensure that these are not
held with the GRANT option unless absolutely necessary. MONITORING

SECURITY

1. Are there procedures to monitor all access rights to data on a regular

basis to ensure that they are all still valid.

2. Are there any installation defined reports which indicate applications

where access has failed so that investigations can be carried out.

3. Are sensitive DB2 functions logged for review. These are the sensitive

functions used by those with SYSADM, DBADM, DBCRTL, DBMAINT AND SYSOPR.

These functions are recorded on SMF records which can be extracted on a

regular basisand listed (or further analysed) for review by the DBA or

security administrator.

DATABASE SECURITY

1. For each database, determine the names of all relevant tables and

views. This can be found from the SYSTABLES table of the catalog.

For each table and view in the relevant database, review the SYSTABAUTH

table in the catalogue to determine who is authorised to: update data,

alter the table, delete rows, create indexes, insert rows, select rows

update rows,

Ensure that this authority is conducive to good security and that all

accesses are approved within installation procedures. 2. Determine which

columns are contained in each table or view. This can be found from the
SYSCOLUMNS table of the catalog.

Determine which data items are significant and ensure that adequate access

controls exist to limit access to data. Review the SYSCOLAUTH table of the

catalog to determine who has UPDATE authority over the data item in

question.

3. For each view of the data in the relevant database, determine what

columns are in the view. This can be found from the SYSVTREE table in the

catalog. In the case where extremely sensitive data is contained in the

database, ensure that access to views containing this data is limited to

maintain confidentiality.

EXIT ROUTINES

1. For each database table under review determine whether use is made of

the Edit and Validation exits. The procedure names associated with each

table can be found within the SYSTABLES table of the catalog.

Determine what processing is carried out by each exit and evaluate what

effect it will have on the control and security over the particular table.

Ensure that each exit load module is contained within a library which is

protected using RACF or some other mechanism and that updating of exit

load modules is limited by the installation change management and control

procedures.

2. For each field within each table, determine if there are attached field
procedures. This can be determined from the FIELDPROC indicator in the

SYSCOLUMNS table in the catalog. The name of the particular procedure can

be determined from the SYSFIELDS table in the catalog.

Determine what processing is carried out by each field procedure and

evaluate what effect it will have on the control and security over the

particular data item.

Ensure that each field procedure is contained within a library which is

protected using RACF or some other mechanism and that updating of field

procedures is limited by the installation change management and control

procedures. UTILITY PROGRAMS

The authority to use utility programs is controlled by the DB2 authorisation

mechanism.

DB2 UTILITY PROGRAMS

Certain of the DB2 utilitiesallow sensitive functions. They should be

restricted to those persons who have a need to use them for the

maintenance of the databases. Determine who has the authority to use the

following utilities and evaluate any potential security and control

implications:

1. COPY AND MERGECOPY Determine who has the authority to run these

utilities against the particular database. In addition to the person with

SYSADM authority, DBADM, DBCTRL OR DBMAINT authority over the particular

database the utility can also be run by anyone who has been granted the
IMAGCOPY privilege for the database containing the table space named. This

can be determined from the IMAGCOPYAUTH parameter of the SYSDBAUTH table

in the catalog. Ensure that this authority is limited. Ensure that back-up

image copies are taken regularly and that MERGECOPY is used only when

required for recovery purposes.

2. LOAD Determine who has the authority to use this utility to load data

into database tables. In addition to the persons with SYSADM authority,

DBADM or DBCTRL authority over the particular database it can

*************************************************************************************
DB2 AUDIT PROGRAM 2 of 2

DB2

AREA: SOFTWARE INSTALLATION

OBJECTIVE: To ensure that adequate control and security is applied over

_________ the DB2 software and operating environment and that adequate

standards and procedures are in place for applications which use DB2.

ADMINISTRATION AND ORGANISATION

1. Review the organisational structure to determine who is responsible for

the installation of the software, maintenance of the software, performance

monitoring, administration of security, database design and application

development.

2. Ensure that the organisational structure provides for an adequate

division of duties to provide for control and security. No one individual

should have total responsibility for all areas.


STANDARDS AND PROCEDURES

1. Review all standards as they pertain to the use of DB2 within the

installation. Ensure that standards exist and that they provide a

framework within which the software can be controlled and applications can

be developed in a manner which is conducive to control and security as

well as being efficient.

Standards should exist in the following areas:

a. The level of security to be applied to the data being stored. This

should provide a definition of the access controls to be applied as well

as a method for determining the sensitivity of the data. Security needs to

be applied depending on sensitivity. These standards should also cover the

policy on the granting of privileges, especially when the "GRANT with

GRANT" option is used. In addition, the granting of the administrative

privileges needs to be properly defined within standards.

b. The control over the data which is to be applied. This should include

requirements for editing and validating the data which is entered into the

database, the requirements for control totalling and the requirement for

audit trail. These standards should cover the use of the standard SQL

exits to provide for control routines.

c. There should be some form of standard which details the steps to be

followed when designing applications which use DB2. These standards should

specify the responsibility for database design and should also cover such
areas as standard naming conventions. This has a beneficial effect when

systems are being maintained. Other items which can be included are

standards for the issuing of COMMIT statements by application programs.

d. There should be written procedures for the operation of the DB2

software. This should lay down responsibility for starting and stopping

DB2 and individual databases and should cover the emergency procedures to

be followed in the event of DB2 or database failure.

e. There should be written standards and procedures for the taking of

image copies for recovery purposes. The frequency of copying and the use

of incremental as well as full image copies should be defined. There

should be a definition of the minimum time between full image copies to

minimise recovery time, while minimising the time to take the copies.

Ensure that these times are realistic. SECURITY ADMINISTRATION

1. Determine whether the required level of security over DB2 databases is

defined within installation standards. Such standards should define who is

allowed the administrative functions and how authority is to be granted.

2. Is there a security administrator who is tasked with granting authority

to access data as required or is this devolved. Whichever way is used, is

there any control over the granting of authority to ensure that all

authorisations are valid and have been approved.

ADMINISTRATIVE FUNCTIONS

Determine who has access to the high level administrative privileges as


follows. Ensure that these facilities are restricted to those personswho

require them as part of their regular duties.

1. SYSADM - Determine who has this authorisation. It allows the holder to

execute any operation within DB2. This can be determined by enquiring

against the SYSUSERAUTH table in the DB2 catalog and by determining who

can use the relevant authorisation ids specified in DSNZPARM. Ensure that

these are not held with the GRANT option unless absolutely necessary.

2. SYSOPR - Determine who has SYSOPR authority from the SYSUSERAUTH table

of the catalog. Ensure that these are not held with the GRANT option

unless absolutely necessary.

MONITORING SECURITY

1. Are there procedures to monitor all access rights to data on a regular

basis to ensure that they are all still valid.

2. Are SMF records showing the number of failed access attempts produced

and reviewed on a regular basis. Is action taken to investigate any

abnormal failed activity.

3. Are there any installation defined reports which indicate applications

where access has failed so that investigations can be carried out.

4. Are sensitive DB2 functions logged for review. These are the sensitive

functions used by those with SYSADM, DBADM, DBCRTL, DBMAINT AND SYSOPR.

These functions are recorded on SMF records which can be extracted on a


regular basis and listed (or further analysed) for review by the DBA or

security administrator. SOFTWARE CONTROLS

The DB2 software is parameter driven. The auditor should examine the

current values of these parameters and evaluate the effect on control and

security.
*******************************************************************************

PBX TELECOMMUNICATIONS AUDIT PROGRAM

SUBMITTED BY:

Dr Frederick Cohen

Audit Plan:

Protection Management

Who is responsible for maintaining and operating

the equipment?

Are maintenance agreements the most cost effective

agreements available?

* Surely there are a lot more protection management

responsibilities than this. What are they, how can

they be clarified, how do they relate to the rest of

this checklist?

Protection Policy

Is there a company written policy on phone use?


* What is it? Are there particular features it should have,

and what are they?

Are there things it should not have, and what are they? Why

is the policy set as it is, who sets it, how does it change,

is it realistic for the environment?

Standards and Procedures

Are Customer Service Records reconciled with the Property

Accounting Fixed Asset Register?

Are monthly phone bill tracking reports reviewed?

Are PBX traffic, performance, circuit outage, and problem

reports reviewed by telecom management?

Is there an agreement with the LEC, the IXC, and the

equipment vendors for the ability of only authorized

personnel to request service level changes, and to

report errors?

Is there a regular dump of Incoming Peg Count, Attendant

Response, All Trunks Busy, Service Queue, and Trunk

Group Overflow reports? Reported to telecom management?

What are the procedures for making PBX SW or HW changes.

Is the PBX program backed up whenever changes are made?


Does anyone on the telecom staff carry a pager number

during off-hours?

Are all orders for services in writing? Are confirmations

in writing?

Are service order numbers used?

Are bills reviewed for accuracy? How often?

Are monthly telephone bills distributed to department

managers for review? Do they sign approval and return them?

How are phone charges allocated to each cost center?

Are they accurate?

Are all toll calls billed verified against the PBX

traffic reports?

How are billing issues resolved?

Is there internal recording of Install/Remove services?

Are all leased trunks, lines, and circuits billed

verified against the PBX inventory reports?

Are services for part of the month pro-rated?


Is Call Detail Recording (CDR) or Call Accounting

reconciled with phone bills?

Are maintenance bills reviewed, broken down, and

verified? By who? How and who approve replacement parts?

* There are a lot of good standards and procedures questions here, but

they are not tracked to policy requirements, they don't track to the

documentation or other components of the questions, and the people

responsible for them are not asked about.

Documentation

Obtain network maps and topology diagrams, telecommunication

records, and policy and procedure guides. Are they up

to date and easily understood?

Are Customer Service Records listing the equipment

reviewed and retained? By whom?

Are monthly phone bill tracking reports generated?

Accurate and up to date list of current trunks and

leased lines?

Are circuit numbers clearly marked on channel banks,

CSU/DSUs, and modems?


Is there an up to date list that correlates telephones

and Central Office lines to ports on the PBX?

Are MDFs and IDFs clearly labeled?

Are the procedures for making PBX SW or HW changes

fully documented?

Is there a list of authorized contacts?

Does the telecom manager have a list of home phone

numbers for the LEC, IXC, and PBX account executives?

Are PBX operating manuals available to telecom staff?

Are there 3rd party calls on the phone bills?

Is Call Detail Recording (CDR) or Call Accounting enabled?

* This is an interesting list. It is probably not comprehensive,

but it is more so than the other areas. There is no question

about where the documentation is kept and who has access, how

the documentation tracks to the other areas, etc. but it's a

real good start.

Protection Audit

* Oops! Nothing on protection audit to speak of. Who audits


the PBX, how often, what do they look for, etc. This is

covered to some extent in standards and procedures, but

only a few issues are loosely covered and no explanation of

why is provided. Audit has to be done by specific people

who do PBX audits in order to be effective.

Technical Safeguards

Are DISA capabilities activated?

Are "leaky PBX" capabilities designed?

Is there a modem on the PBX programming port?

Is there a UPS?

Are 976, (900), and (700) calls blocked?

Is Call Detail Recording (CDR) or Call Accounting enabled?

* This is a starting point, but hardly comprehensive. A good

PBX auditor will cover many other technical issues.

This is, of course, PBX specific, so it's hard to make

a generic list, but more than these items should be included.

Incident Response

Is there a disaster recovery plan?


Is there a standby site for moving operations in the

event of a disaster? Does it have sufficient trunking

for voice and data? Is it periodically re-evaluated or

tested?

Is the PBX program backup stored off-site?

Has a "bounty hunter" telecom payment consultant been

used in the past? Results?

Do maintenance agreements guarantee technician

response time?

* This is deisnged for disaster recovery only. It doesn't

take a comprehensive view of incidents and how they are

responded to. How do we respond to day-to-day incidents?

How do we detect them? Who does it? What tools do they need? etc.

Testing

Has the disaster recovery plan been tested?

Is the UPS tested?

* Only a beginning. There are a lot of other testing issues

that have to be addressed in a comprehensive PBX audit.


Physical Protection

Where is the telephone equipment (PABXs) located?

Who has access to the equipment?

What are the visiting procedures for accessing the

equipment?

Are craftspeople escorted?

Is there fire suppression equipment installed and

tested?

Are cabinet doors kept closed and locked?

Do the cables entering and leaving the PBX or equipment

room pass through firestop material?

Are power circuits clearly marked?

* This is a good starting list, but not a comprehensive list

of physical security issues to be considered.

Personnel Issues

* Oops. Persopnnel issues are largely ignored in this

checklist.
Legal Considerations

What are the purchase/lease/rental agreements for

telecom equipment?

What maintenance agreements are signed?

* It's a start, but where is corporate liability covered?

How about employee agreements? Is policy properly

verified by legal, and is it enforcable? How do we

proceed to track down attackers so that we can prosecute,

or do we want to prosecute? Is there adequate insurance? etc.

Protection Awareness

Are there education programs for users?

* This is not an adequate question to cover the issue of

awareness.

Training and Education

What training is provided telecom staff for the PBX?

* This is not an adequate question to cover these issues.

Organizational Suitability
* This is not addressed in the audit at all.

Supplied by

Management Analytics - 216-686-0090 - PO Box 1480, Hudson, OH 44236

---> See: Info-Sec Heaven at URL http://all.net

***********************************************************************************

TELECOMMUNICATIONS AUDIT PROGRAM

SUBMITTED BY:
-------------------------------------------------------------------------------
Denis Kelly, | Phone: 7027137 / 6765831
Senior Computer Auditor | Fax: 6778463 / 6615376
Electricity Supply Board | Int Phone: 353-1-7027137.
Lr Fitzwilliam St, | Internet: Denis.Kelly@N1.ESB.IE
Dublin 2. Ireland. | < Standard Disclaimers Apply>
--------------------------------------------------------------------------------

AUDIT OF A CORPORATE TELECOMMUNICATIONS FUNCTION

Introduction: Telecommunications is a critical service for the majority if not


all businesses. The scale of dependence on telecommunications will vary greatly
from the sole trader with a mobile phone, to large corporates such as banks and
power utilities with vast telecommunication infrastructures. This audit program
concentrates on the large corporate end of the scale where organisations have a
large telecommunications infrastructure. These organisations usually have
internal divisions or subsidiaries which are responsible for the operations and
management of the infrastructure. With the high dependence on telecomm services
and the large expenditure usually incurred in providing these services effective
control is essential. This audit program therefore considers the telecomms
group as a business entity in it's own right and considers all users of the
services as customers. In the context of my own organisation the group are
internal but this approach could also be used for a subsidiary.

This audit program was designed to look at both the financial and technical
controls employed. The control objectives and standards of both ISACA and the
Institute of Internal Auditors (IIA) were incorporated into the design of tests.
In addition relevant local and corporate regulations were considered. This
audit program is a prototype of how a telecommunications function can be
audited. Each auditor needs to consider the specific needs of their own
organisation and the jurisdiction where the organisation operates. These
differences may have a very significant impact on the emphasis and coverage of
the audit program. However this program should give a good general framework
for such an audit.

TELECOMMUNICATIONS AUDIT

AUDIT SCOPE

To assess the quality of internal controls in the


Telecommunications Function including controls over the
achievement of Value for Money.

DETAILED OBJECTIVES

O Review the objectives and plans.

O Assess the management information provided.

O Review the compliance with internal and external regulations,


procedures and legislation.

O Review the controls in place for safeguarding assets.

O Review the controls in place to ensure that the required


quality of service is provided.

O Assess the control of Projects.

1. REVIEW THE OBJECTIVES AND PLANS.

Review of the objectives of telecomms for compatibility with


Corporate, Business Unit and Department Objectives. Ensure plans and
structures are in place to meet those objectives.

1.1 Objectives: Review objectives including Corporate,


Departmental and Division. Are they clear, coherent
and compatible.

1.2 Telecomm Planning: Are plans in place to meet


objectives. Assess the planning process, is it well
controlled. Is there a Strategic Plan for Corporate
Communications, Assess its coverage and content.

1.3 Structures: Review the structure of the


Telecommunications Function. Is it logical and
effective. Is is compatible with the objectives and
plans. Are roles and responsibilities clearly
defined.

2 ASSESS THE MANAGEMENT INFORMATION PROVIDED.

General test of management information centres around testing for


accuracy, relevance, timelines, usability and presentation. How well
informed are management.

2.1 Review the Financial Information.

Establish what financial information managers currently


receive for capital and revenue purposes.

Review the Financial Information provided to managers and


assess it's relevance, timelines and input into the decision
making process.

Sample the data provided and verify its accuracy and


completeness.

Review the budgeting process.

Identify information gaps and shortfalls.

Review overtime, expenses, work in progress and other


operational costs including the cost of delays in job
closing.

2.2 Review Operational Information.

Review information provided to managers on Work Plans,


including progress reporting and work allocation.

Review information provided to managers to assist with the


management of traffic and control of the cost of the telecomms
network.
Review information provided to management on faults and
outages on the telecomms network.

Review information provided to management on staff


productivity including job costing and time usage.

Review information provided to verify the accuracy of external


service providers bills. e.g. PABX billing information to
cross check PTT Bills.

Review information provided on transport fleet management.

Review the information provided on accommodation/ space


management.

What management information is available, Is it reviewed on an


ongoing basis?

2.3 Review the links achieved between Financial and Operational


Information.

Are management using the information effectively. Is it


adequate for control purposes.

Review the tracking of jobs from a financial and operational


perspective.

How is the Financial and operational information linked to


maximise VFM.

3 REVIEW THE COMPLIANCE WITH INTERNAL AND EXTERNAL REGULATIONS,


PROCEDURES AND LEGISLATION.

Review the compliance of telecomms to internal and external


regulations. The main focus being the controls in place to ensure
this is happening.

3.1 Review the controls in place to ensure awareness and compliance


with non technical Internal Regulations/Procedures including
Human Resources, Purchasing, etc... Do clear lines of
responsibility exist. Establish how compliance assured.

3.2 Review the controls in place to ensure awareness and compliance


with technical Internal Regulations/Procedures. Do clear lines
of responsibility exist.

The following points will be tested.

1. Identify the key regulations and procedures which apply to


telecomms in the following areas:

- Safety e.g. Certificates of Fitness, Safety procedures,


etc.
- Security and Data Protection.
- Code of Ethics including Conflict of Interests.
- Corporate Regulations and Circulars.
2. Discuss with Telecomms Management how they are made aware of
and ensure that Internal Regulations and Procedures are
complied with ?

- Briefings.
- Library/ Standards Files.
- Reviews and Technical Audits.

3. Review the documentation which is produced by Telecomms to


comply with Regulations and Procedures ?

- Safety Manuals.
- Training Records.
- Security Documentation.
- Operating and Maintenance.
- Circulation and Update of same.

4. Review the awareness of staff to the compliance required ?

- Awareness with requirements.


- Training/Briefings.

3.3 Review the controls in place to ensure awareness and compliance


with External Technical Regulations/Legislation. Do clear
lines of responsibility exist.

The following points will be tested.

1. Identify the key legislation and regulations.

- Safety.
- Broadcasting Act.
- Conditions of Service from TE.
- Communications Regulations and Licensing Conditions.
- Equipment Supplier Conditions.
- Procedures for work at Third Party sites including
insurance.

2. Discuss with Telecomms Management how they are made aware of


and ensure that Legislation and Regulations are complied with ?

- Briefings.
- Library/ Standards Files.
- Legal advice.
- Reviews and Technical Audits.

3. Review the documentation which is produced by Telecomms to


comply with Legislation and Regulations?

- Correspondence, Certificates and Licences.


- Copies of standards, Legislation and Regulations.
- Safety Manuals.
- Training Records.
- Security Documentation.
- Operating and Maintenance Instructions.

4. Review the awareness of staff to the compliance required ?

- Awareness with requirements.


- Training/Briefings.

4 REVIEW THE CONTROLS IN PLACE FOR SAFEGUARDING ASSETS.

Review the controls, procedures and standards in place to ensure


corporate telecommunications assets are safeguarded. This should
include accurate recording and tracking of assets, safe operation,
regular maintenance, adequate security and orderly disposal.

4.1 Establish what policies, procedures and standards are in place


to safeguard assets. This should include maintenance,
operations and security controls.

4.2 Review the procedures and controls in place to ensure effective


and efficient Risk Management is undertaken.

The following points will be tested.

1. Identify the main risks which exist?

2 Does a formal Risk management strategy and plans exist?.


Does this include regular review?

3. Are the plans adequate?

4. Are management and staff aware of risks and plans?

5. Are liability exposures identified? Is there sufficient


Insurance cover?.

4.3 Review the general security controls and procedures in place.


This should include Physical Security, Logical Security,
Segregation of Duties, etc.

How is liaison with the Corporate Security Manager and IT


Security Manager achieved. What Authorisation Procedures and
Reviews take place. ?

What management information is provided to ensure security is


operating and effective. ?

Do standards exist which specify the level of controls to be


implemented ?
Review the contingency Planning which has been undertaken by
Telecomms under the following points

- Does an overall contingency strategy exist for Telecomm


systems ?

- Identify the the Contingency Plans which exist?. Is the


coverage adequate.

- Do regular formal reviews, including testing, take place?

- Assess the staff awareness of contingency and contingency


plans?

4.4 Review the controls in place that ensure assets are acquired in
compliance with established policies and procedures including
VFM.

4.5 Review the controls in place to ensure that recording of


assets, for financial and operational purposes, is accurate and
adequate.

4.6 Review the procedures and systems in place to ensure the


continued existence and protection of assets occurs over their
entire lifetime. Do stock checks take place.

4.7 Review the procedures in place to ensure that maintenance and


operation of telecommunications assets is carried out
effectively, safely and to the required standard.

Testing will include:

1. Refer to OBJ 4.1 Re policy.

2. Review how Telecomms Management ensure maintenance and


operations are effective.

3. Review how Telecomms Management ensure the standards of


maintenance and operations are assured. Including
compliance to supplier requirements and recommended
procedures.

4. Review how Telecomms Management ensure operations and


maintenance is carried out how safely and in compliance to
relevant regulations.

5. Review the control of maintenance carried out by external


contractors. How is the work verified and it's quality
checked.

6. Does fault analysis take place to ensure maintenance is


optimised to reduce failures ? Is the analysis adequate?
7. Review the use of periodic performance monitoring of
systems to predict when preventive maintenance is required.
How are failures or service degradation detected and
monitored.? Is the monitoring adequate.?

8. How is the cost effectiveness of maintenance and operations


assured? Are systems reviewed to identify potential
improvement and cost savings? Consider the following:

- Checks on PTT Bills.


- Inventory of Lines on lease and their use.
- On going Cost Benefit Analysis of services.
- Review of service quality and availability from
alternative suppliers.
- Capacity Planning ?

9. Review the maintenance undertaken by Telecomms staff using a


sample of maintenance records.

10. Review the recording of faults, tracking of progress and


sign off of work. ?

4.8 Review the controls in place to ensure assets are disposed of


in compliance with established procedures.

5 REVIEW THE CONTROLS IN PLACE TO ENSURE THAT THE REQUIRED QUALITY


OF SERVICE IS PROVIDED.

Review the controls in place to ensure that the services required


by customers are delivered cost effectively and to the agreed
level of quality. Specific emphasis should be given to the VFM
aspects of the service delivery.

5.1 Review the controls which ensure Telecomms management and staff
are aware of Customer requirements.

5.2 Review the controls which ensure the Services Delivered are
those requested by users and are provided in a timely and cost
effective manner.

5.3 Assess the controls in place to assure the quality of the


services provided by Telecommunications.

5.4 Assess the controls in place to assure that value for money is
maximised in the provision of services to customer.

6 ASSESS THE CONTROL OF PROJECTS.


Review the control of Telecommunications Projects to ensure
that they are effectively managed and controlled. ( The project
management objective was reviewed in two parts (i) Business and
Financial Controls (ii) Technical controls.)

PROJECT REVIEW: FINANCIAL AND MANAGEMENT INFORMATION ASPECTS.

These tests will be applied to each of the sample projects


selected

Test 6.1 Establish the current status of the project, ie.


completed, in-progress, etc.

Test 6.2 Approval stage should be reviewed under the following


headings

- procedures for project approval.

- approval and authorisation records.

- establish if the project was subject to re-approval or


modification at any stage. Were controls complied with.

Test 6.3 Implementation Planning: Review procedures in place


for control of the following.

- Material/Services and Spares procurement planning


including lead times.

- Work Planning, including scheduling, work breakdown and the


impact on the resources other areas inside and outside of
Telecomms.

- Planning of the control procedures to be put in place for


the control and management of the Project.

Test 6.4 Project Implementation: Review procedures in place for


the following.

- Procurement of materials/services (including external


contractors)

- Individual job control, including authorisations.

- Work Scheduling - Time


- Materials Distribution
- Feedback controls - ie reporting
Project Mgt.
- Project Tracking - Performance monitoring
- Budget/financial resources incl.
re-approvals
- Progress vs Plans for work and
materials.

- Disposal of Retired Assets

Review procedures in place for disposal of retired assets


including following aspects:

- Authority

- Procedures (Stores)

- Documentation to remove from Asset Register


including approval.

Test 6.5 Project Handover: Review procedures for the following.

- Handover to customers

- Handover to maintainers including

- Listing of equipment for handover.


- Listing of Test equipment
- Listing of Spares
- Capitalisation of Completed Projects including:

- Costs reviewed before capitalisation.


- Re-approval procedures.
- Controls over capitalisation to asset
identifier.
- Asset Register Updates.

Test 6.6 Post Project Review

Review procedures in place for reviewing the following:

- Assessment of the project as a whole and it's sub


components.
- Lessons learnt from the project.
- planning and control of the project.
- how well were objectives achieved
- Completed Cost V Budget and approvals.

PROJECT REVIEW TECHNICAL ASPECTS.

These tests will be applied over a number of projects but will


concentrate on the general approach taken.
6.1 Review the controls in place on the initiation, planning and
approvals of Telecomms Projects.

Consider the controls mechanisms used for the following steps.

- Project initiation, fit to the overall Strategy and


Approvals.
- Decision to opt for Turnkey or Build Internally.
- Planning and Associated Approvals.
- Management of the Risks associated with the project.
- Technical Benefit Analysis Process.
- Tendering/Approvals.
- Award of contract.

6.2 Review the control of project in progress with specific


attention to the reporting on progress and actions to address
divergence from plans. The control of contractors, equipment
compliance to specification, Acceptance Testing and
Commissioning should be considered.

consider the control of projects in progress under the


following headings.

- How is progress reported.


- How are divergences from plans addressed.
- How are contractors controlled and managed.
- How do Telecomms ensure equipment delivered is in compliance
with the specification.
- What level of Acceptance Testing and Pre-Commissioning is
undertaken. Does this include Pilot tests.
- Review the documentation and recording of systems while they
are being installed.
- How is Risk Managed during a project? Is it formally
reviewed regularly and changes reported?

6.3 Review the controls in place to ensure projects are correctly


completed and post implementation reviews are undertaken.
Specific emphasis should be given to Commissioning, Hand over
and Operation.

Review for each of the following:

1. Commissioning Procedures.

2. Hand over and Operation Procedures. Review the documentation


and records compiled for systems when they have been
commissioned.

3. Post Implementation Review. Is the delivered system reviewed


to ensure it meets the original specification with approved
changes.
This audit program was developed by Denis Kelly, Senior IT Auditor, Electricity
Supply Board, Dublin, Ireland.

DISCLAIMER:

This document is to be considered a prototype and no warranty or guarantee of


accuracy, implied or stated exists. No responsibility for loss occasioned to
any person acting or refraining from action as a result of any material included
in this paper is taken by the author or his employer. Permission for use is
granted for non-commercial, personal or educational purposes. Permission is
granted to describe this document in product or on-line services, but not to
produce it in whole or in part without written permission. For written
permission please contact Denis.Kelly@N1.ESB.IE

*************************************************************************************
TELEPHONE INFORMATION AUDIT PROGRAM

AUDIT OUTLINE QUESTIONS

* Physical Security

Where is the telephone equipment (PABXs) located?

Who has access to the equipment?

What are the visiting procedures for accessing the equipment?

Are craftspeople escorted?

Is there fire suppression equipment installed and tested?

Are cabinet doors kept closed and locked?

Do the cables entering and leaving the PBX or equipment room pass through

fire-

stop material?
Are power circuits clearly marked?

* Facilities Management

Who is responsible for maintaining and operating the equipment?

Obtain network maps and topology diagrams, telecommunication records, and

policy and procedure guides. Are they up to date and easily understood?

Are Customer Service Records listing the equipment reviewed and retained? By

whom? Are they reconciled with the Property Accounting Fixed Asset Register.

Are monthly phone bill tracking reports generated and reviewed?

Are PBX traffic, performance, circuit outage, and problem reports reviewed

by

telecom management?

Is there an agreement with the LEC, the IXC, and the equipment vendors for

the

ability of only authorized personnel to request service level changes, and to

report

errors?

* PBX Control

Accurate and up to date list of current trunks and leased lines?

Are DISA capabilities activated?

Are "leaky PBX" capabilities designed?

Are circuit numbers clearly marked on channel banks, CSU/DSUs, and modems?

Is there an up to date list that correlates telephones and Central Office

lines to
ports on the PBX?

Is there a regular dump of Incoming Peg Count, Attendant Response, All Trunks

Busy, Service Queue, and Trunk Group Overflow reports? Reported to telecom

management?

Are MDFs and IDFs clearly labeled?

What are the procedures for making PBX SW or HW changes. Are they fully

documented?

Is there a modem on the PBX programming port?

* Disaster Recovery

Is there a disaster recovery plan? Has it been tested?

Is there a standby site for moving operations in the event of a disaster?

Does it

have sufficient trunking for voice and data? Is it periodically re-evaluated

or

tested?

Is there a UPS? Is it tested?

Is the PBX program backed up whenever changes are made? Is it stored

off-site?

Is there a list of authorized contacts? Does anyone on the telecom staff

carry a

pager number during off-hours?

Does the telecom manager have a list of home phone numbers for the LEC, IXC,

and PBX account executives?

* Cost Management
What are the purchase/lease/rental agreements for telecom equipment?

What maintenance agreements are signed? Are they the most cost effective

agreements available? Do they guarantee technician response time? Are

maintenance bills reviewed, broken down, and verified? By who? How and who

approve replacement parts?

Are all orders for services in writing? Are confirmations in writing? Are

service

order numbers used?

Has a "bounty hunter" telecom payment consultant been used in the past?

Results?

* Training

What training is provided telecom staff for the PBX? Are operating manuals

available to them?

Is there a company written policy on phone use? Are there education programs

for users?

* Billing

Is Call Detail Recording (CDR) or Call Accounting enabled? Is it reconciled

with

phone bills?

Are bills reviewed for accuracy? How often?

Are monthly telephone bills distributed to department managers for review?

Do
they sign approval and return them?

How are phone charges allocated to each cost center? Are they accurate?

Are all toll calls billed verified against the PBX traffic reports?

Are all leased trunks, lines, and circuits billed verified against the PBX

inventory

reports?

How are billing issues resolved?

Is there internal recording of Install/Remove services?

Are services for part of the month pro-rated?

Are there 3rd party calls on the phone bills?

Are 976, (900), and (700) calls blocked?

*************************************************************************************

MVS PARMLIB

1. Review the current production versions of the IEAAPFxx and LNKLSTxx

members of SUS1.PARMLIB to determine the DSNLINK and DSNLOAD libraries for

the production DB2 system.

Ensure that the correct libraries are specified.

DSNZPARM ENTRIES

Review the DSNTIJUZ job which contains the macros used to build DSNZPARM.

Ensure that this job is held in a protected library and that changes to

the macros are

*************************************************************************************
CICS COMPUTER AUDIT PROGRAM
A. CICS SET-UP

There should be adequate control over the CICS initialisation process to

ensure that the appropriate control tables, data sets and terminals are used

during CICS processing.

1. Obtain a PDS listing of the CICS load libraries. Obtain a copy of the start

up procedures.

2. Determine the following from a review of the CICS Analyser report and the

PDS listing:

a. the number of versions of the SIT (System Initialisation Table). Determine

reasons for each version,

b. the procedures for determining and authorising the SIT used during

initialisation,

c. the number of versions of the control tables and management modules

available,

d. the procedures for determining and authorising the version of the control

tables and management modules used during initialisation,

e. the current production version of the control tables and management

modules,
f. the procedures for determining, authorising and reviewing any override

parameters used during initialisation,

g. if on-line resource definition is used (RDO), review the procedures for

determining and authorising the group list to be used.

3. Review the current production version of the SIT to determine that it

contains the current production versions of the control tables and management

modules, and that options are properly used.

a. determine that the current production version of the SIT was used.

b. examine for overriding parameters, particularly,

i. for excluding or including tables or modules, e.g. DCP=NO, FCT=NO

ii. for changes in suffixes, e.g. PCT=S3.

iii. disabling CICS security checking, XSP=NO

iv. disabling external security, EXTSEC=NO

c. Where overriding parameters have been used, ensure that they have been

appropriately authorised and documented.

d. Examine the order of concatenated load libraries to ascertain that the

correct control tables were initialised and only valid libraries were
included.

4. Evaluate the adequacy of start up procedures.

a. determine that computer operations personnel fully understand the

procedures.

b. review SYSLOG to ascertain that the correct procedures were used.

5. Review procedures for cancelling CICS.

6. Where on-line resource definition is used,

a. review the current production version of the SIT to determine that the

GRPLIST operand is teh current authorised group list.

b. review the sample of actual start-up job streams to ensure that any

override GRPLIST operand has been appropriately authorised and documented.

7. Review the PDS listing of CICS load libraries for members with names other

than DFH***. Determine reasons for any found.

8. Review the naming convention for tables. Select samples from the production

libraries and test compliance.

B. GENERATING CICS

To determine that jobs which are assigned Security privileges and are designed
for initiating CICS subsystems (either started tasks) or standard batch jobs)

do not bypass security controls.

1. Determine if CICS is initiated by a started task (COMMND member

CMD="S,CICS").

2. Determine that the appropriate options, SECURITY, ACCOUNT, NO-SMC, MUSASS,

(STC if a started task) are associated with the LOGONID, attributes which

involve program pathing RESTRICT, SUBAUTH, PROGRAM and also validate APF

authority.

3. Determine if the default LOGONID for started tasks (STCDFLT LID =) exists

and evaluate the effect on control of CICS start-up procedures.

4. Identify the name of the CICS default LOGON ID.

5. Review and evaluate the attributes given to the CICS default LOGON ID

(attributes should include RESTRICT, SUBAUTH, PROGRAM = ACFAESIP).

6. Identify who can update source and linkage module.

D. CICS MANAGEMENTS TRANSACTIONS

There should be adequate controls over sensitive management transactions

to ensure that their use is restricted to authorised operators for

authorised purposes.

1. By enquiry and review of the PCT, determine which sensitive transactions

are available. By enquiry, determine if any have been renamed. At least the
following transactions and programs should be identified:

CECI

FDOD

CEDF

CEMT, CSMT

ADYN (=DALL)

OLTEP

CORE (=DBUG)

XAMS

OLIB

ADSP

CEDB (Release 1.7)

CEDC (Release 1.7)

DFH99

DFHBUG

2.a. Have the following attributes been included in the PCT for each

transaction:

i. Transaction priority and security identification.

ii. Transaction work area (TWA) length used to determine the size acquired for

this transaction.

iii. Initial processing program identification.

iv. Transaction statistics.


v. Transaction purge status (purgeable or non-purgeable).

2.b. By enquiry, determine how the sensitive management transactions and

programs are restricted and authorised.

NOTE - If RACF is used, determine the extent to which RACF controls these

transactions.

3. Determine the transaction security key values given to sensitive management

transactions.

a. CEMT, CEST, CSMT, CSST, CEDA, CECI, by reviewing the PCT entry (DFHPCT TYPE

= INITIAL TRANSEC operand).

i. If this is not coded, the default value is 1.

b. Using these values, review the SNT to determine the operators who have

access to these transactions (DFHSNT TYPE = ENTRY SCTKEY operand).

4. For all other sensitive transactions (including CEBR) review the PCT to

determine the transaction security value (DFHPCT TYPE = ENTRY TRANSEC

operand).

5. For CEDF/CECI/CECS, determine if default resource level security checking

is used by examining the PCT entry (for DFHPCT TYPE = ENTRY, RSLC = YES should

be coded). RSL should not be PUBLIC.


6. For all other sensitive management transactions and programs review the

resource rules.

7. For each temporary storage queue that can be browsed by CEBR, review the

TST entry for DFHTST TYPE = SECURITY, to ensure that security checking is

required.

8. If on-line resource definition is used, determine if an audit trail is

maintained by reviewing the DCT for DESTID = CSDL.

E. RESTART AND RECOVERY

1.a. Determine which resources have been defined as "protected" or

"recoverable" by enquiry and reference to the FCT.

1.b. Have the following attributes been specified for each data set in the

FCT.

i. Data set organisation (ISAM DAM or DL/I)

ii. Accessing options

iii. Data set characteristics (block size)

iv. Indirect accessing or indexing control information

v. Record segment definitions

Note: DL/I data bases are the only resources that are automatically
defined as protected. All others are optionally protected.

2. Determine by enquiry and review of the FCT whether logging an journalling

is performed automatically or by user application program (LOG= and JID=

entries)

3. For files that are journalled, review procedures for swapping journal files

to tape.

4. For files that are not journalled or logged, determine how files are backed

up for restart and recovery purposes. Determine how program FDP, PEP,NEP and

TEP can be used for restart and recovery purposes.

5. Review the JCT for BUFSIZE, BUFSUV, JTYPE and JOUROPT.

a. BUFSUV should be 2/3 size of BUFSIZE.

b. If JOUROPT = crucial, determine reasons.

c. Journal should have sufficient space to log activities. Determine how

system acts when log is full.

6. Review the start up job streams to determine the START option used, to

ensure that emergency restarts can be properly performed. (refer to SIT)

7. Determine by enquiry and review of FCT/SIT whether DTB is used.

8. Review SMF record, CICS statistics to determine the number of times for

CICS start-up shut down daily. Determine reasons for excessive start-up.
9. What SMF record will be recorded when CICS goes down. Perform applicable

tests as required.

F. APPLICATION CONTROL STANDARDS

1.By enquiry and review of available evidence, ensure that there are

up-to-date CICS application programming standards including standards for

purchased software systems.

2. Review the standards and assess their adequacy in the areas of:

a. coding requirements

b. requirements for user application journalling

*************************************************************************************

Following was contributed by (Rey LeClerc) at leclerc@scis.nova.edu

VM Operating System Review

Objectives: To ensure that adequate security procedures have been established


over VM.

General Description

The VM operating system was developed during the mid-1960s in order to create a
virtual system that would appear to each user as a dedicated machine.
Requirements vary among organizations of different sizes. Because of this,
there are different variations of VM to better meet these needs. Virtual
Machine/System Product (VM/SP) is really VM in its simplistic form. Running
VM/SP requires system programmer expertise for both installation and
maintenance, but provides flexibility to meet the needs of the organization.

VM/SP is generally considered to consist of two components: the Control Program


(CP) and the Conversational Monitor System (CMS).

CP is a set of programs which manages the real machine resources and creates
the virtual machine environment. The major functions of the CP can be
summarized as follows:
o user scheduling and dispatching;
o real storage management;
o virtual memory management;
o spool management;
o CP command processing;
o error recovery and recording.

CMS is an interactive operating system within VM, that operates under the
control of CP to manage the virtual machine environment. The basic components
of CMS are:
o editor;
o EXEC processor;
o Debug environment;
o OS simulation;
o commands, e.g., COMPARE, SORT, COPYFILE, etc.

Because of its capabilities of CP, VM is often referred to as the perfect


host. A myriad of different operating systems can coexist in the same machine
under the umbrella of VM's Control Program. These other operating systems CMS
are called guest operating systems. VM handles guest operating systems in much
the same way as multiple on-line users. Guest operating systems used for
production work should be subjected to complete audits as if they were running
in native mode.

System generation is the process that compiles the selected operating features
into an executable version of the operating system. System generation options
are specified in one of three CP source modules: DMKSYS, DMKSNT and DMKRIO.

DMKSYS, also known as the CP System Control File, consist of macro statements
that describe the following:
o CP system residence device;
o system storage device;
o CP-owned direct access devices;
o system operator's user identification;
o system timer value;
o system pointer variables;
o automatic performance monitoring parameters;
o accounting parameters;
o system identification;
o system spool parameters;
o security journalizing parameters;
o system dump space parameters;
o system T-DISK security parameters;
o missing I/O interruption timer intervals.

The Real Input/Output Configuration File (DMKRIO) consists of macros that


describe the input/output devices, control units, and channels attached to the
real processor.

The System Name Table (DMKSNT) consists of entries that identify the name and
location of saved systems or discontinuous saved segments.

After the three system generation modules are ready, the CP nucleus is
generated through a program called VMFLOAD. The CP nucleus can basically be
defined as the core of the VM system. It is the brains of the system, or the
code that gives the environment its basic VM attributes. After the system
generation is completed, and VM has gone through the Initial Program Load
(IPL), CP exists. The new CP resident nucleus is now loaded in real memory and
VM is available for further use.

The newly created VM system contains a CP directory, which is basically a list


of User-IDs and information about the virtual machines identified by User-IDs.

Audit Program

1. Obtain listings of DMKSYS, DMKRIO, DMKSNT and the CP Directory.

2. Check the value of the SYSCLR operand of the SYSRES macro in DMKSYS;
SYSCLR=YES should be specified to prevent unauthorized access to sensitive data
placed on T-disks. SYSCLR=YES is default. If SYSCLR=NO is specified, the
installation should have a published disclaimer for T-DISK security.

3. Check the SYSJRL macro specification in DMKSYS. JOURNAL=YES should be


specified to detect access attempts by unauthorized users. JOURNAL=NO is
default. PSUPRS=YES should be specified to suppress passwords as they are
being entered into the system. PSUPRS=NO is default.

4. Inspect the DMKRIO to verify that device specifications reflect the actual
hardware configuration and that excessive number of additional devices have not
been defined.

5. Verify the specifications of shared and saved systems in DMKSNT and check
for overlapping assignments on DASD.

6. Inspect the load list used by VMFLOAD and compare it with the IBM-supplied
list to ensure that no critical system modules have been deleted; verify that
deleted modules do not implement facilities that have been implied in DMKRIO or
DMKSYS and review any frequently used pagable modules that are or should be
resident.

VM OPERATING SYSTEM REVIEW

VM/SP Modifications

Objective: To determine whether VM/SP modifications are tested, documented and


performed according to established procedures.

General Description: Maintaining the VM operating system revolves around VM


product releases, which introduces new VM capabilities, and Program Update
Tapes (PUT), which provide fixes for previous problems. PUTs contain various
files that establish the system code at a specified PUT level. Typically, the
systems programmer applies an entire PUT. However, the programmer can also
apply a modification individually from the PUT to resolve a critical problem.

The systems programmer should maintain a log of all these changes, whether they
are IBM-supplied or local, including the date of the application, modules
affected, PTF (program temporary fix) number, and reason for the change. All
changes should be reviewed by the technical support manager so that users and
operations staff are aware of modifications that might affect them.
Audit Program

1. Review the latest PUT process output to verify that IBM-supplied maintenance
has been properly installed.

2. Confirm that all local modifications to CP have been properly installed,


adequately logged, and documented; review the justification for each local
modification.

3. Spot-check the CP nucleus map to verify that both IBM- and user-supplied
modifications have been included in the system nucleus.

4. Determine whether the systems supervisor or systems staff, other that the
original systems programmer, reviews all system and utility testing before
cataloging into production.

VM OPERATING SYSTEM REVIEW

Access Controls Review

General Description: The CP directory, also more broadly termed the VM


directory, serves as a repository for information including the definitions of
users, their CP privileges and classes, and the locations of their minidisks
where data is stored. There are two types of data sharing in VM. The first is
the directory link, which is used mainly for common applications like CMS.
This is automatically executed when a user logs on, and is maintained until the
user explicitly detaches this link. User may also share data through user
links. A user may explicitly link to share another user's minidisk.

There are four options that may be specified in designating a password:


o READ - permits access to data on a minidisk in a read-only mode;
o WRITE - permits users access to both read the data on the minidisk as well
as modify it;
o MULTIREAD - permits more that one user to read the minidisk at one;
o MULTIWRITE - more that one user can read and write into a minidisk at one.
This option has the potential for creating a nightmare, because data can be
modified concurrently with other users. This option is not supported for CMS
use because of its potential data destruction.

The logon password, which may also be up to 8 characters in length, is required


to log on to a User-ID, thereby gaining access to the system. The User-ID is
associated to one or more privilege class:
o Class A - Primary System Operator. This individual is allowed to control
and even terminate the total VM operation.
o Class B - System Resource Operator. At this level, the user is allowed to
examine the status of the system-owned units and make allocations for
requesting users.
o Class C - Systems Programmer. A Class C user can examine and modify real
storage, including the ability to examine and modify the main storage of other
users.
o Class D - Spooling Operator. This individual can alter the characteristics
of real spooling devices and queues. This would affect, for example, the
queues for printers and other devices.
o Class E - System Analyst. This class allows the examination of real
storage, but without the ability to modify it.
o Class F - Engineer/Service Representative. A Class F user is allowed use of
extended I/O capabilities, preventing error recording while running. This
individual might be inclosed in making modifications to enhance response time.
o Class G - General User. This class is reserved for most users of the system.

It is also possible to tailor user privilege classes. With VM/SP Release 4,


installations have the ability to create up to 32 CP privilege classes as well
to dynamically assign capabilities.

Audit Program

1. Check user privilege classes against authorization forms to ensure that


users have proper resource accessibility.

2. Confirm that critical user IDs have password protection on their minidisks.
Verify that users have adequate level of privilege class.

3. Review the directory update directory for disk password changes. If


directory maintenance is performed manually, a log of all changes should be
kept. It an automatic system (e.g. DIRMAINT) is used, the system administrator
should retain all pertinent log information. Ensure that passwords are not
vendor supplied, easily guessed, repeated or users have multiple User-IDs.

4. Check the journal data for improper access attempts; note and check write
accesses to nonowner disks.

5. Determine whether User-ID AUTOLOG1 is defined in the user directory. The


user with this ID is automatically logged on at the conclusion of the system
initialization.

6. Inspect the file PROFILE EXEC on the 191 disk of user AUTOLOG1; review the
sequence of actions performed with AUTOLOG1 activated.

7. Review the VM utilities (e.g. VMFZAP, GENERATE) and determine if access to


them is adequately controlled.

VM OPERATING SYSTEM REVIEW

Tuning and Performance Efforts

Objective: To assess the quality of system performance and tuning efforts.

General Description: VM/SP has a built-in system activity monitor. VMAP


program product can produce a detail performance report. The review of this is
important because in addition to overall performance, we can see if there are
any overlapping minidisks. With overlapping minidisks, the process of getting
into data of others becomes easier because as this can be accomplished without
the need of a password. If not carefully mapped, it is easy to assign the same
minidisk space to two different users or simply waste the space contained in
the gap.
Audit Program

1. Obtain a DISKMAP listing and determine if gaps or overlaps affect system


performance or integrity.

VM OPERATING SYSTEM REVIEW

Sources/References

Auditing VM/SP by David M. Leonard (Auerbach Publishers Inc., 1985)

Handbook of EDP Auditing by Halper, Davis, O'Neil-Dunne, and Pfau (Warren,


Gorham & Lamont, 1985)

VM and Departmental Computing by Gary R. McClain (McGraw-Hill Book Company,


1988)

VM/SP General Information Manual (GC20-1838-4)

VM/SP Installation Guide (SC24-5237-2)

VM/SP Introduction (GC19-6200-3)

VM/SP Planning Guide and Reference (SC19-6201-04)

Following was contributed by (Rey LeClerc) at leclerc@scis.nova.edu

VM/BATCH

Objective: To ensure that adequate security procedures have been established


over VM BATCH.

Audit Program

1. Obtain and review the VMBATCH configuration file.

Key files for the VMBATCH configuration file that should be reviewed here are:

- ACCESS - identifies the VMBATCH database minidisks. Make sure that these
are restricted to the appropriate users only.

- AUTHORIZ - this record grants VMBATCH subcommand authorizations to the


specified users. Determine who has access to the ADMIN, OPERATOR, MANAGER, and
installation defined (if there are any) VMBATCH authorizations. Verify that
only the appropriate individuals have these capabilities.

- DIRECT - contains the virtual address of the read-only link between VMBATCH
and the CP object directory minidisk. Verify that access has been provided
only on an as needed basis.

- NODE - identified any RSCS nodes to be considered as part of a multiple-CPU


VMBATCH configuration. If this is defined, its also specifies various
processing options for each node in this configuration.
- NOUSERIDF - controls whether a job can run on a remote VMBATCH system when
the submitting User-ID can not be found on the remote system.

- PREVENT - this record specifies any exceptions to the authorizations granted


ion the AUTHORIZ record. Review this in conjunction with the AUTHORIZ record.

- RESOURCE - allows the identification of special resources provided to


certain worker machines. This is significant only where the RESOURCE is coded
in the WORKER record and is used to control the foundations of a WORKER machine.

- USEREXIT - these optional records are used to specify the filenames of user
routines to receive control at various points in VMBATCH's operation.
Determine whether any exits are being used, and if so, which ones. Obtain the
source code for these exits and review them. Briefly describe their function
and evaluate their effect on VMBATCH controls.

- WORKER - specifies the User-IDs and characteristics of the worker machines.


Identify the production worker machines and the applications specifically
designated to them (in environment that have made associations between the
worker machines and specific applications).

2. Identify the users and groups that have been provided with access to the
production worker machines. This can be determined by reviewing the VMBATCH
user and group limits.

a. Using the VMBATCH configuration file, determine whether any of the AUTHORIZ
USER users are defined in (VMBATCH configuration file's) GROUP records.

GROUP records identify the User-IDs or subgroups that belong to specified


group. It also identified group managers.

User and groups can be only belong to one group; in the event that multiple
entries of this type have been made, VMBATCH insiders only the first entry to
be valid.

If the GROUP definitions rely on ACIGROUP definitions, review the CP directory


to determine the User-IDs of the group member entries. Identify any AUTHORIZ
USER User-IDs that are not in the GROUP definitions (e.g., those missing
ACIGROPU definitions in their CP directory entries, where ACIGROUP definitions
are being relied upon).

b. Signon to VMBATCH from a valid VMBATCH MANAGER account (the configuration


file AUTHOR MANAGER - and PREVENT - records specify who can perform this
function. From the Manager Function Menu, select LIMIT. Select CHANGE,
specifying each AUTHOR USER entry listed in the VMBATCH configuration file.

Evaluate the limits on the groups for the AUTHORIZ USER User-IDs first (i.e.
the User-IDs defined to the GROUP records). This is because group level limits
override user level limits ( and system level limits and user level limits).

Compare these limits with the characteristics defined to the production worker
machines in the WORKER records of the VMBATCH configuration file). Determine
who can run their jobs under the production WORKER User-IDs.
Reference Manual

VMBATCH System Administrators' Manual

VMBATCH User's and Group Manager's Guide

Following was contributed by (Rey LeClerc) at leclerc@scis.nova.edu

VM/Secure

Objectives: To ensure that adequate security procedures have been established


over VMSECURE.

Audit Program

1. Determine to what extent VMSECURE is controlling the data security


environment at this location, i.e. is VMSECURE used only for VM directory
maintenance, or is the rules facility also being used. If the rules facility
is being used, make sure that is appended to include examination of the rules
database and related configuration file records.

2. Obtain and review the VMSECURE configuration file listing. Examine the
parameters established for the key configuration file records.

The key configuration file records (for installations that are not using the
rules facility) and their associated audit concerns are:

- ACCESS - identifies the minidisks available to the VMSECURE service


machine. Determine whether access to these minidisks is adequately
restricted. verify that the DRCT and the BKUP minidisks do not reside on the
same DASD.

- DIRECT - identifies the CP-owned volume containing the page-formatted area


for the CP object directory. Verify that access to this minidisk is adequately
restricted. VMSECURE should have an MR link to the minidisk; if other users
share access to the minidisk, controls should prevent multiple users from
updating the CP object directory.

- ENCRYPT - this optional record tells VMSECURE that the directory database is
encrypted. This record is important because only where read access to the
directory database is not adequately restricted and the minidisk and/or logon
passwords in the directory are critical components to the access control
methodology at this location.

- GRANT - authorizes users to use VMSECURE subcommands, utilities and screen


selections. Ascertain that sensitive functions have been granted only as
needed.

- IGNORE - indicates which User-IDs or specific minidisks are ignored by


VMSECURE. This use of this record disallows VMSECURE from detecting (and
preventing) any minidisk overlays that involve the specified the specified
ignored minidisks.
- LIST - groups authorizations or User-IDs for use on GRANT and WITHHOLD
records.

- USEREXIT - these optional records are used to specify the filenames of user
routines to receive control at various points in VMSECURE's operation.
Determine where any exits are being used, and if so, which ones. Obtain the
source code for these exits and review them. Briefly describe their function
and evaluate their effect on VMSECURE data security controls.

- VOLUME - identifies real and DASD volumes managed by VMSECURE. Make sure
that all intended volumes are included here.

- WITHHOLD - restricts users from using the VMSECURE commands, utilities, or


screen selections (that were explicitly provided to users in the GRANT
record). Review this record in conjunction with the GRANT record to determine
who has access to sensitive system functions.

3. Obtain and review the VMSECURE MANAGERS file listing (the file resides on
the VMSECURE 191 minidisk). Examine the MANAGER record(s) 'mgrid' parameter.
The User-ID(s) defined in this record have directory manager authority
(provided that MANGE subcommand capability has also been granted in the
VMSECURE configuration file). Determine whether the MANAGER capability has
been appropriately designated.

VMSECURE

Reference manuals

VMSECURE System Programmer's Reference manual


VMSECURE System Administrator's Guide
VMSECURE Directory manager's Guide
VMSECURE User's Guide
VMSECURE Rules Facility Guide

You might also like