20
Sat, Apr
5 New Articles

Is Your IBM Power Systems Server a Safe Haven for Malicious Code?

IBM i (OS/400, i5/OS)
Typography
  • Smaller Small Medium Big Bigger
  • Default Helvetica Segoe Georgia Times

You believe you're safe. But are you sure?

So you've read the title, and I know what you're going to say. No way; not mine. It's a natural response. After all, you take security seriously. You've equipped your client PCs with anti-virus software, and you have solid network security in place on your Power Systems server. But are you certain that's enough?

 

The government isn't, and that's why many pieces of regulatory legislation and corporate IT guidelines call for anti-virus on all systems and servers within a network. The risk posed by viruses and malicious code is no longer as simplistic as it once was, and the number of vectors against which you must secure has become complex. In this article, we will look at the seriousness of the risk along with the right and wrong ways to go about protecting your systems.

Home Sweet Home

You've probably heard some people say that IBM Power Systems make the perfect safe haven for viruses. But why is this the case? How does the Power Systems server differ from other systems?

 

First of all, there's an easy justification for stating that anti-virus is not needed on IBM Power Systems: viruses cannot execute on IBM i. You've definitely heard this, and you may believe it yourself. You would be right…at least in terms of traditional viruses. The catch-22, however, is that the fact that traditional viruses can't "run" on IBM i is the very reason that IBM Power Systems make the perfect host.

 

How do you know when a PC is infected with a virus? It exhibits symptoms. You see that a computer is behaving strangely, is running slowly, or has a file missing. Something is not right, so it's an easy move to scan and clean that computer.

 

But what happens when there are no symptoms? Because the virus doesn't run on IBM i, it can sit in the Integrated File System (IFS) and you'll never know it's there. From this safe haven, it can infect files that in turn infect client PCs when the infected files are accessed. At that point, the virus executes on the Windows PC, and you rush to clean it off. There's only one problem: you didn't clean the source. The virus is still sitting in the IFS on the Power Systems server, and the next time the infected file is accessed, the infection cycle starts all over again.

 

This is what makes the server a safe haven and why, to viruses, IBM Power Systems are home sweet home.

The Wrong Way to Scan IBM Power Systems

So you understand that your Power Systems server can host viruses and malicious code, but once you've decided to scan the IFS, there's a right way to do it and there's a wrong way to do it. The right way is to use a native anti-virus solution that has been designed specifically to scan IBM i. We'll get to that a bit later. First, though, let's talk about the wrong way to do it. Many users think that the IFS can be treated like any other mounted volume and scanned from a Windows PC. It seems like an easy and cost-effective solution. In reality, it's dangerous and ineffective. Let's find out why.

 

There are many reasons that scanning IBM Power Systems from a PC is a bad choice. Here are six key reasons:

 

  • Risk of Infection--The scanning PC itself can infect the Power Systems server.
  • Insufficient Effectiveness--PC-based scanning solutions do not understand all features of IBM i. 
  • Spotty Reliability--IBM i features such as recursive links can break PC scan processes.
  • Poor Performance--All data to be scanned must be transferred across the network.
  • Security--Confidential data is visible on the network.
  • Increased Time Requirements for SAVCHGOBJ--Every file scanned by a PC is marked as changed as a result of the scan.

 

Let's look more closely at each of these.

 

Risk of Infection

When you scan the IFS from a PC, you must log on with *ALLOBJ authority in order for the PC-based scanner to access and scan all files. This may inadvertently lead to infection of the server if the scanning PC itself is infected. It can also open a door that could allow a remote attacker to take control of the system.

 

Insufficient Effectiveness

The architecture of IBM i can make it impossible for PC-based scanners to detect all viruses stored in the IFS. When files are locked--a common trick used by viruses--the PC scanner cannot scan the file and therefore cannot detect the virus. Since Netserver must be running in order for the PC scanning software to mount and scan the IFS, file locks cannot be disabled. The result is that PC scanners may report infected files as clean because they could not be scanned properly. This has been shown to be the case in tests.

 

Spotty Reliability

When used to scan the IFS, PC scanning solutions have a big weakness in that you can render your entire scanning effort pointless. The PC-based solution performs fine when scanning its intended target (Windows), but there's something in IBM i that it just can't understand: recursive links. This is a path that loops back on itself--for example, QOpenSysQOpenSysQOpenSys. PC scanning solutions cannot understand this, so the process simply breaks. The scan will begin to loop infinitely, essentially turning off your protection.

 

Poor Performance

PC-based scanning requires the transfer of all data across the network. This is one of the reasons PC-based scanning is so slow. The increased traffic negatively impacts your overall network performance, which is a deterrent to running scanning during normal hours.

 

Security

As managers and implementers of technology, it is our responsibility to keep private data private. In some cases, there may be federal and state laws that prohibit leaking confidential data. Yet by scanning the IFS from a PC over a network, all files are sent in the clear without encryption. The data in these files can be easily viewed by anyone on the network using network sniffer programs, which are readily available on the Internet.

 

Increased Time Requirements for SAVCHGOBJ

PC scanning solutions reset the file's "Last Access Time" information after the file has been scanned. As far as IBM i is concerned, this is recorded as a change to the file and therefore will be saved when using Save Changed Objects (SAVCHGOBJ). The net effect of this is that every scanned file will be saved on a SAVCHGOBJ even though the file contents have not changed. This can have save/restore implications as well as increase the amount of time to perform backups of the IFS.

The Right Way to Scan IBM Power Systems

Now that we've established that your IBM Power Systems server is a safe haven for malicious code--and why using PC-based solutions to scan is the wrong way to go about protecting it--let's look at the right way.

 

To sufficiently protect IBM i, you need a native solution. It is important not to confuse the term "native solution" with the term "native virus." When we talk about native solutions, we are referring to software written specifically for IBM i for the purpose of detecting viruses. We are not referring to viruses being written specifically to attack IBM i, of which there have been none to date.

 

So the key to adequate protection is a native solution. But why?

 

Just as there are reasons that using a PC-based solution is the wrong approach, there are also reasons that using a native solution is the right one. These include:

 

  • Performance--A native solution runs on the server and does not need to transfer data.
  • Security--Sensitive information remains within the secure server environment.
  • Reliability--Native solutions can find malicious code wherever it may hide in the IFS.
  • Monitoring--Native solutions can integrate with your IBM i-based monitoring and notification solutions.
  • Constant Protection--Unlike the manual PC process, native solutions can scan "on access" throughout the day.
  • Object Integrity Scanning--By using a native solution, you can also check IBM digital signatures for changes.

 

Beginning with i5/OS V5R3, IBM added virus scanning enablement to the operating system. To enable scanning of the Power Systems server, IBM includes two system values on IBM i that facilitate virus protection. These are QSCANFS and QSCANFSCTL. Let's take a look at how they can help you protect your system in conjunction with a native solution.

 

Scan File Systems (QSCANFS)

QSCANFS gives you the ability to specify the IFS in which objects will be scanned. This can be useful when scanning for viruses. QSCANFS specifies the IFSes in which objects will be scanned when exit programs are registered with any of the IFS scan-related exit points.

 

Scan File Systems Control (QSCANFSCTL)

QSCANFSCTL controls the IFS scanning that is enabled when exit programs are registered with any of the IFS scan-related exit points. This value works in conjunction with QSCANFS to provide granular controls on what is scanned in the IFS and how. A set of default scan options are provided, or you can select which scanning options are used, including options that control what the registered exit programs will scan and how. There are seven potential values for QSCANFSCTL to help fine-tune protection.

 

Native anti-virus solutions are able to tie into these IBM i system values and provide superior protection to help you ensure that your server is not a safe haven for malicious code and that your data is protected.

 

Additionally, there is one more reason that you need to take seriously the potential of your IBM server to host and distribute malicious code: regulations. As mentioned earlier, governments and experts have recognized the risks presented by viruses, malware, and other malicious code and have put requirements in place that call for anti-virus software. To conclude, let's look at some of these regulations.

The Regulations

At this point, the risk and the need for protection are clear. Understanding the danger academically and taking real-world action are, however, not one and the same. 

 

Acknowledging that viruses and malicious code pose a real and present danger to corporate stability--and realizing that organizations may be slow to respond--regulators have placed importance on virus protection as a key component of legislation. Such calls to action can be found either directly or indirectly in Sarbanes-Oxley (SOX), Control Objectives for Information and related Technology (COBIT), the Payment Card Industry Data Security Standard (PCI), the International Convergence of Capital Measurement and Capital Standards (BASEL II), the Health Insurance Portability and Accountability Act (HIPAA), the Gramm-Leach-Bliley Act (GLBA), and documents from the National Institute of Standards and Technology (NIST).

 

Specific references that you may find useful in preparing or enhancing your security plan include these:

 

Sarbanes-Oxley (SOX)

A common approach to preparing compliance plans for SOX is to use the Control Objectives for Information and related Technology, or COBIT for short. Within COBIT, there are several directives for anti-virus:

 

DS5.19: Malicious Software Prevention, Detection, and Correction

This objective states that, regarding malicious software, such as computer viruses or Trojan horses, management should establish a framework of adequate preventative, detective, corrective control measures, and occurrence response and reporting. Business and IT management should ensure that procedures are established across the organization to protect information systems and technology from computer viruses. Procedures should incorporate virus protection, detection, occurrence response, and reporting.

 

DS9.5: Unauthorized Software

This objective specifies that clear policies restricting the use of personal and unlicensed software should be developed and enforced. The organization should use virus-detection-and-remedy software. Business and IT management should periodically check the organization's personal computers for unauthorized software. Compliance with the requirements of software and hardware license agreements should be reviewed on a periodic basis.

 

Payment Card Industry Data Security Standard (PCI)

PCI is a comprehensive set of worldwide security standards designed to ensure that all merchants and service providers that deal with the storage, transmission, or processing of cardholder data from any major card service are taking adequate steps to protect this information. The writers of PCI clearly laid out their intentions. In a section titled "Detailed Requirements and Security Assessment Procedures," the requirements for anti-virus protection are outlined:

 

Requirement 5: Use and Regularly Update Anti-Virus Software or Programs

Malicious software, commonly referred to as "malware"--including viruses, worms, and Trojans--enters the network during many business-approved activities, including employees' use of the Internet, email, mobile computers, and storage devices, resulting in the exploitation of system vulnerabilities. Anti-virus software must be used on all systems commonly affected by malware to protect systems from current and evolving malicious software threats.

 

Health Insurance Portability and Accountability Act (HIPAA)

Passed in 1996, HIPAA establishes federal regulations that force doctors, hospitals, and healthcare providers to adhere to baseline standards when handling Electronic Protected Health Information (ePHI), such as the medical records and accounts of patients.

 

HIPAA §164.308 (5)(ii)(B)

This portion of HIPAA states that organizations should establish "procedures for guarding

against, detecting, and reporting malicious software."

 

Gramm-Leach-Bliley Act (GLBA)

Designed to facilitate reform of the financial services industry, GLBA establishes a framework that gives authority to eight federal agencies and the states to administer and enforce the Financial Privacy Rule and the Safeguards Rule.

 

16 C.F.R. Part 314

This section of the Standards for Insuring the Security, Confidentiality, Integrity and Protection of Customer Records and Information document (page 7, paragraph (b) ) requires each financial institution to ''identify reasonably foreseeable internal and external risks to the security, confidentiality, and integrity of customer information that could result in the unauthorized disclosure, misuse, alteration, destruction or other compromise of such information, and assess the sufficiency of any safeguards in place to control these risks.'' Further, it directs institutions to establish measures for "detecting, preventing, and responding to attacks, intrusions, or other systems failures."

 

National Institute of Standards and Technology (NIST)

In addition to the above regulations, documents from NIST also call for anti-virus protection. An excerpt from NIST document 800-61 "Computer Security Incident Handling Guide" (page 5-4, 5.2.2) states that "antivirus software is a necessity to combat the threat of malicious code and limit damage. The software should be running on all hosts throughout the organization."

 

Take Protective Steps Today

If the evolution of malicious code and our understanding of how it can impact IBM Power Systems has done one thing, it is to make it clear that native anti-virus is a critical component of a modern security plan. I encourage you to take protective steps today to secure your IBM Power Systems server. Your network and your organization will be the better for it.

Heather Richards has worked for Bytware, a software development company in Reno, Nevada, since 1991. Bytware is an IBM Business Partner and has pioneered automated monitoring and notification technology as well as developed the first and only server-based, native anti-virus solution for IBM i. She supports the company's internal and external customers and business partners in all aspects of software selection, implementation, and configuration. She has conducted numerous trainings and workshops with one goal in mind: to help you monitor and secure your connected world.

BLOG COMMENTS POWERED BY DISQUS

LATEST COMMENTS

Support MC Press Online

$0.00 Raised:
$

Book Reviews

Resource Center

  • SB Profound WC 5536 Have you been wondering about Node.js? Our free Node.js Webinar Series takes you from total beginner to creating a fully-functional IBM i Node.js business application. You can find Part 1 here. In Part 2 of our free Node.js Webinar Series, Brian May teaches you the different tooling options available for writing code, debugging, and using Git for version control. Brian will briefly discuss the different tools available, and demonstrate his preferred setup for Node development on IBM i or any platform. Attend this webinar to learn:

  • SB Profound WP 5539More than ever, there is a demand for IT to deliver innovation. Your IBM i has been an essential part of your business operations for years. However, your organization may struggle to maintain the current system and implement new projects. The thousands of customers we've worked with and surveyed state that expectations regarding the digital footprint and vision of the company are not aligned with the current IT environment.

  • SB HelpSystems ROBOT Generic IBM announced the E1080 servers using the latest Power10 processor in September 2021. The most powerful processor from IBM to date, Power10 is designed to handle the demands of doing business in today’s high-tech atmosphere, including running cloud applications, supporting big data, and managing AI workloads. But what does Power10 mean for your data center? In this recorded webinar, IBMers Dan Sundt and Dylan Boday join IBM Power Champion Tom Huntington for a discussion on why Power10 technology is the right strategic investment if you run IBM i, AIX, or Linux. In this action-packed hour, Tom will share trends from the IBM i and AIX user communities while Dan and Dylan dive into the tech specs for key hardware, including:

  • Magic MarkTRY the one package that solves all your document design and printing challenges on all your platforms. Produce bar code labels, electronic forms, ad hoc reports, and RFID tags – without programming! MarkMagic is the only document design and print solution that combines report writing, WYSIWYG label and forms design, and conditional printing in one integrated product. Make sure your data survives when catastrophe hits. Request your trial now!  Request Now.

  • SB HelpSystems ROBOT GenericForms of ransomware has been around for over 30 years, and with more and more organizations suffering attacks each year, it continues to endure. What has made ransomware such a durable threat and what is the best way to combat it? In order to prevent ransomware, organizations must first understand how it works.

  • SB HelpSystems ROBOT GenericIT security is a top priority for businesses around the world, but most IBM i pros don’t know where to begin—and most cybersecurity experts don’t know IBM i. In this session, Robin Tatam explores the business impact of lax IBM i security, the top vulnerabilities putting IBM i at risk, and the steps you can take to protect your organization. If you’re looking to avoid unexpected downtime or corrupted data, you don’t want to miss this session.

  • SB HelpSystems ROBOT GenericCan you trust all of your users all of the time? A typical end user receives 16 malicious emails each month, but only 17 percent of these phishing campaigns are reported to IT. Once an attack is underway, most organizations won’t discover the breach until six months later. A staggering amount of damage can occur in that time. Despite these risks, 93 percent of organizations are leaving their IBM i systems vulnerable to cybercrime. In this on-demand webinar, IBM i security experts Robin Tatam and Sandi Moore will reveal:

  • FORTRA Disaster protection is vital to every business. Yet, it often consists of patched together procedures that are prone to error. From automatic backups to data encryption to media management, Robot automates the routine (yet often complex) tasks of iSeries backup and recovery, saving you time and money and making the process safer and more reliable. Automate your backups with the Robot Backup and Recovery Solution. Key features include:

  • FORTRAManaging messages on your IBM i can be more than a full-time job if you have to do it manually. Messages need a response and resources must be monitored—often over multiple systems and across platforms. How can you be sure you won’t miss important system events? Automate your message center with the Robot Message Management Solution. Key features include:

  • FORTRAThe thought of printing, distributing, and storing iSeries reports manually may reduce you to tears. Paper and labor costs associated with report generation can spiral out of control. Mountains of paper threaten to swamp your files. Robot automates report bursting, distribution, bundling, and archiving, and offers secure, selective online report viewing. Manage your reports with the Robot Report Management Solution. Key features include:

  • FORTRAFor over 30 years, Robot has been a leader in systems management for IBM i. With batch job creation and scheduling at its core, the Robot Job Scheduling Solution reduces the opportunity for human error and helps you maintain service levels, automating even the biggest, most complex runbooks. Manage your job schedule with the Robot Job Scheduling Solution. Key features include:

  • LANSA Business users want new applications now. Market and regulatory pressures require faster application updates and delivery into production. Your IBM i developers may be approaching retirement, and you see no sure way to fill their positions with experienced developers. In addition, you may be caught between maintaining your existing applications and the uncertainty of moving to something new.

  • LANSAWhen it comes to creating your business applications, there are hundreds of coding platforms and programming languages to choose from. These options range from very complex traditional programming languages to Low-Code platforms where sometimes no traditional coding experience is needed. Download our whitepaper, The Power of Writing Code in a Low-Code Solution, and:

  • LANSASupply Chain is becoming increasingly complex and unpredictable. From raw materials for manufacturing to food supply chains, the journey from source to production to delivery to consumers is marred with inefficiencies, manual processes, shortages, recalls, counterfeits, and scandals. In this webinar, we discuss how:

  • The MC Resource Centers bring you the widest selection of white papers, trial software, and on-demand webcasts for you to choose from. >> Review the list of White Papers, Trial Software or On-Demand Webcast at the MC Press Resource Center. >> Add the items to yru Cart and complet he checkout process and submit

  • Profound Logic Have you been wondering about Node.js? Our free Node.js Webinar Series takes you from total beginner to creating a fully-functional IBM i Node.js business application.

  • SB Profound WC 5536Join us for this hour-long webcast that will explore:

  • Fortra IT managers hoping to find new IBM i talent are discovering that the pool of experienced RPG programmers and operators or administrators with intimate knowledge of the operating system and the applications that run on it is small. This begs the question: How will you manage the platform that supports such a big part of your business? This guide offers strategies and software suggestions to help you plan IT staffing and resources and smooth the transition after your AS/400 talent retires. Read on to learn: