123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Securing Ftp With Z/os Security Profiles

Profile Picture
By Author: Nate Rodney
Total Articles: 499
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Maintaining control over who accesses the data on mainframe systems is crucial. IBM's RACF and CA's ACF2 and Top Secret can keep a system fairly secure. But by themselves they are not adequate to protect against dangerous FTP functions. As mainframe handles critical business data and applications, it is very important to have security measures and controls in place. Especially, with z/OS FTP, there are high probabilities of data snooping, which can be avoided using a suitable security software.

FTP with traditional RACF dataset protection
Traditional RACF rules regarding dataset security may restrict users to read-only access. But with FTP, if users can read a file, they can offload that file for their personal use. They can copy your data to a flash drive, or email it anywhere in the world. Thus, restrictions on dataset access fall short of what is needed when standard FTP is available on the mainframe.

Snooping issue with FTP session
Traditionally, mainframe users are a small number of trusted people whose activities are limited by the applications they use. But with standard FTP, almost ...
... anyone with a user ID can get on the mainframe and snoop around. Any hacker who manages to get a user ID can use a '/u' command, for example, to list the contents of that user's workspaces, and maybe retrieve files.

The SITE command and the issues
z/OS FTP SITE commands are not standardized; they vary from server to server. They are useful for handling things like file permissions and group memberships. However, they can also allow dangerous operations over the network. For example, with the FILETYPE=JES command, an FTP client can submit jobs to, and pull reports from, the JES queue. SITE can also be used to change permission bits for a file, or to list detailed information about the storage devices on the network.

Treating FTP functions as protectable resources
Thus, basic protection mechanisms are not enough to secure z/OS FTP and make it a true enterprise-class protocol. You can solve that problem, however, by implementing software that wraps around FTP resources and protects them with RACF security profiles. It will create a link between z/OS FTP servers and z/OS security that will restrict the usage of unwanted FTP commands.

By using security software for z/OS FTP, the mainframe administrator can selectively restrict access to FTP functions and commands. He can allow FTP users to transfer the files they need, while preventing them from using FTP to snoop around. Thus you can make RACF into a complete security solution for protecting your mainframe system from malicious behavior through FTP.

Since 1982, Software Diversified Services is providing first-quality software and technical support for IBM mainframes and VM, VSE, mainframe ftp and z/OS systems. SDS mainframe software provides security, encryption, compression for mainframe data, OSA express monitoring, secure file transfer (SFTP), SNA and IP network management and automation.

Total Views: 368Word Count: 469See All articles From Author

Add Comment

Computers Articles

1. Time Attendance Management System At Only 1sgd Per Month
Author: James

2. Nfc Guard Tour System Singapore @ 30sgd Per Month
Author: James

3. Virtual Guard Fencing @ 30sgd Per Month
Author: James

4. Guard Patrol Tour System @ 30sgd Per Month
Author: James

5. Best Payroll Software In Singapore @ Exiga Software
Author: James

6. Smart Barcode Gps Time Management Singapore
Author: James

7. Future Of Ccaas: Predictions For Customer Service Innovation Beyond 2026
Author: Umangp

8. Hire Affordable Android App Developers For Custom Mobile Solutions
Author: web panel solutions

9. Top Ai Development Mistakes And How To Avoid Them
Author: brainbell10

10. Social Media Platforms & Their Evolving Role In Search Engine Marketing (sem) In 2026
Author: sochtek

11. Best Shopify Web Design Company Delivering Scalable E-commerce Solutions
Author: web panel solutions

12. Why Do Certified Technicians Matter In Computer Repairs?
Author: computerrepairservices

13. Quality Assurance Tutorial: Everything You Must Know To Build High-quality Software
Author: Tech Point

14. Understanding Manual Testing In Simple Words
Author: Tech Point

15. How Is The Dish Antennas Market Evolving With New Technologies?
Author: komal

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: