Security on z/OS
Previous topic | Next topic | Contents | Glossary | Contact z/OS | PDF


z/OS and system integrity

Security on z/OS

z/OS® includes features and facilities specifically designed to protect one program from affecting another, either intentionally or accidentally. The ability of an operating system to protect data and itself from unauthorized changes is called system integrity.

Protecting the system involves a number of related disciplines:
  • Maintenance of system integrity
  • Use of the authorized programming facility
  • Use of the resource access control facility (RACF®),
  • Changing system status
  • Protecting low storage.

System integrity is defined as the ability of the system to protect itself against unauthorized user access to the extent that security controls cannot be compromised. That is, there is no way for an unauthorized program using any system interface to bypass store or fetch protection, bypass password checking, bypass RACF checking, or obtain control in an authorized state.

An authorized program in the system is one that runs in PSW key 0-7, in supervisor state, or is authorized through the authorized program facility (APF). An unauthorized program is a problem state program that runs in PSW key 8-F.

Installation Responsibility

To ensure that system integrity is effective and to avoid compromising any of the integrity controls provided in the system, the installation must assume responsibility for the following:
  • Physical environment of the computing system.
  • Adoption of certain procedures (for example, the password protection of appropriate system data sets) that are a necessary complement to the integrity support within the operating system itself.
  • That its own modifications and additions to the system do not introduce any integrity exposures. That is, all installation-written authorized code (for example, an installation SVC) must perform the same or an equivalent type of validity checking and control that the system uses to maintain its integrity.

Elimination of potential integrity exposures

System integrity support restricts only unauthorized problem programs. It is the responsibility of the installation to verify that any authorized programs added to the system control program will not introduce any integrity exposures. To do this effectively, an installation should consider these areas for potential integrity exposure:
  • User-supplied addresses for user storage areas.
  • User-supplied addresses for protected control blocks.
  • Resource identification.
  • SVC routines calling SVC routines.
  • Control program and user data accessibility.
  • Resource serialization (for example, through locking).




Copyright IBM Corporation 1990, 2010