Previous Topic: z/OS MVSNext Topic: Using Security Labels


z/OS UNIX SYSTEM SERVICES

In environments where users move across multiple hardware platforms and operating systems to access numerous applications, security is a major concern. Sites need the same control over data and resources accessed in an open system as they have in their mainframe environment. CA Top Secret offers security for such open environments by supporting z/OS UNIX System Services (UNIX) and the standards developed for a Portable Operating System Interface (POSIX). In addition, CA Top Secret supports security labels and security-label checking in a UNIX environment. This chapter explains how to implement and use security labels for UNIX functions in an CA Top Secret MLS environment.

Support for MLS UNIX

In addition to the basic UNIX functions that are supported by CA Top Secret, the following are also supported when MLS is active:

Restrictions

The following restrictions apply when MLS is active on an CA Top Secret system:

Configuration Checklist

This checklist describes the software configuration requirements when MLS is active on an CA Top Secret system.

Requirement

Complete

Using security labels

Entering the system

Changing the user ID of a session

Accessing files and directories

Accessing IPC objects

Using signal services

Using the ptrace service

Displaying security labels

Identify and classify users

Define users

Assign security labels to users

Assign security labels to the OMVS started task

Assign security labels to the zFS started task (optional)

Assign a home directory and program for each user's security label (optional)

Configure an HFS file system

Assign a security label to an HFS system data set

Assign a security label to a root directory

Default a security label for an HFS file system

Assign a security label to a subdirectory

Assign security labels to files and directories

Assign a security label to an IPC object

Migrate an HFS file system to a zFS file system (optional)

Configure a zFS file System

Protect the cron daemon

Activate name-hiding (optional)

Use the chlabel command to label existing files and directories

Use DFSMSdss instead of pax or tar commands for file backup and restoration

Establish MLS system options in a UNIX environment

Require security labels for files and directories (optional)

Require security labels for IPC objects (optional)

Authorize users for controlled write-down (optional)