Previous Topic: Authorizing Users for Controlled Write-DownNext Topic: Operating a Multilevel Secure System


Auditing a Multilevel Secure System

This section contains the following topics:

Security Events

Audit Access to Resources

Audit by Seclabel

Report Generation

Reports for Auditing

Report Execution

Vulnerabilities of Misused Audit Privileges

Security Events

An MLS system must create, maintain, and protect the audit records for all accesses to protected objects. Determine which security events to audit.

The following events must always be audited in an MLS system:

CA Top Secret creates records in the Audit/Tracking File or SMF data sets when:

Audit Access to Resources

Any resource, specific resources, or all those matching a generic prefix, can be audited. All access attempts are recorded in the Audit/Tracking File and/or the SMF datasets.

To audit accesses, enter:

TSS ADD(AUDIT) resource(resource-name)

Audit by Seclabel

You can audit individual seclabels. (Except for SYSHIGH, SYSLOW, SYSNONE, and SYSMULTI). To specify the auditing, use the keyword MLAUDIT and specify an access type. To audit a seclabel with no specific access type, enter ALL.

TSS ADD(MLS) SECLABEL(LABEL1)
             MLAUDIT(READ,UPDATE)
             SECLEVEL(10)

The following access types are allowed:

READ, CREATE, WRITE, CONTROL, UPDATE, SCRATCH, FETCH, ALTER, and ALL.

Any other access type entered defaults to READ.

To activate the auditing feature on the seclabels, set the control option MLSECAUD to YES.

TSS MODIFY(MLSECAUD(YES))

Important! Seclabel auditing for all security labels in the system severely degrades performance and therefore auditing every security label in the system is not recommended.

To see the SMF records cut from the seclabel auditing, run TSSUTIL and specify the long report or run TSSTRACK. The seclabels involved in the event are displayed and the record is marked with +A (audited event). The audited seclabel(s) are marked with an “*”.

Report Generation

The CA Top Secret reports and utilities audit the activity on your system. They let you format the Audit/Tracking File or SMF records used to obtain user responses and reactions to controls enforced by CA Top Secret.

The available reports are:

TSSUTIL

Batch report of any security related events that have been logged to the Audit/Tracking File and /or SMF. Multiple and varied reports can be produced and events can be archived to tape/DASD.

TSSTRACK

This utility can be used to monitor security related events from an online terminal in a real-time manner. It also can go back to a specified date and time to focus on selected events.

TSSAUDIT

This batch utility monitors changes made to the Security File and sensitive z/Os facilities and data areas.

TSSCHART

This utility lets you generate the ACIDs and owned resource relationships within the CA Top Secret database in the form of an organization chart.

TSSSIM

Enable the simulation of access attempts to resources to test and verify resource permissions. It can aid an auditor in deciding whether or not users should have access to particular resources.

TSSCFILE

This utility produces a fixed-format output file whose records closely parallel the output of a TSS LIST command. The output can then be used to generate custom reports.

TSSOERPT

The z/OS UNIX System Services (UNIX) report identifies user activity in a USS environment. CA Top Secret logs security events under USS to SMF using the standard CA Top Secret SMF record. Log records are written for any security event that denies the user access to a USS facility. This report includes the UID, GID, and security label of the user involved in the attempted access as well as the security label of the resource in the attempted access.

CA Earl®

CA Earl allows you to run the CA Top Secret reports. This gives you the capability of generating customized reports to accommodate local installation requirements.

Reports for Auditing

In all cases, the records in a given CA Top Secret report can be affected by:

When you review the reports:

Part of the CA Top Secret audit should be directed to review the normal processing of the CA Top Secret reports. Verify that the reports are produced regularly and that they include all appropriate records. The timely and proper use of the CA Top Secret reports is an important aspect of internal controls and should be carefully reviewed. The CA Top Secret report generators can also be executed at z/OS MVS/TSO sites by means of the CA Top Secret ISPF panels.

Report Execution

In general, you can execute the CA Top Secret reports with:

Vulnerabilities of Misused Audit Privileges

The potential for misuse or abuse by an auditor includes: