<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>security - RiskInsight</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/tag/security-en/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/en/tag/security-en/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Thu, 05 Dec 2024 07:18:26 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>security - RiskInsight</title>
	<link>https://www.riskinsight-wavestone.com/en/tag/security-en/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Segmentation in mainframe z/OS and LPM</title>
		<link>https://www.riskinsight-wavestone.com/en/2024/12/segmentation-in-mainframe-z-os-and-lpm/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2024/12/segmentation-in-mainframe-z-os-and-lpm/#respond</comments>
		
		<dc:creator><![CDATA[Quentin Perceval]]></dc:creator>
		<pubDate>Wed, 04 Dec 2024 15:23:54 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[mainframe]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[zOS]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=24756</guid>

					<description><![CDATA[<p>Brief introduction to mainframe  Mainframe computers play a central role in the daily operations of the world’s largest corporations. It dominates the landscape of large-scale business computing in banking, finance, health care, insurance, public utilities, government, and a multitude of...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/12/segmentation-in-mainframe-z-os-and-lpm/">Segmentation in mainframe z/OS and LPM</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h2><span data-contrast="none">Brief introduction to mainframe</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:0}"> </span></h2>
<p style="text-align: justify;"><span data-contrast="auto">Mainframe computers play a central role in the daily operations of the world’s largest corporations. It dominates the landscape of large-scale business computing in banking, finance, health care, insurance, public utilities, government, and a multitude of other public and private enterprises. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> <strong>The subject of this article will be how to improve its level of cyber security in order to best meet the requirements of the LPM.</strong></span></p>
<h3><span data-contrast="none">Factors contributing to mainframe use</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:40,&quot;335559739&quot;:0}"> </span></h3>
<p style="text-align: justify;"><span data-contrast="auto">The reasons for mainframe use are many but most of them lay beyond one of the following categories.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<ul style="text-align: justify;">
<li data-leveltext="" data-font="Wingdings" data-listid="13" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Wingdings&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><b><span data-contrast="auto">RAS</span></b><span data-contrast="auto"> (Reliability, availability, and </span><span data-contrast="none">serviceability): Mainframe design places a high priority on the system always remaining in service. The system has</span><span data-contrast="auto"> error prevention and detection features, it can recover from a failed component without impacting the rest of the running system and determine why a failure occurred.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li data-leveltext="" data-font="Wingdings" data-listid="13" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Wingdings&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><b><span data-contrast="auto">Security</span></b><span data-contrast="auto">: The mainframe provides secure system for processing large numbers of heterogenous applications that can access critical data and offers an unmatched protection for workload isolation, storage protection, and secured communications.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li data-leveltext="" data-font="Wingdings" data-listid="13" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Wingdings&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><b><span data-contrast="auto">Scalability: </span></b><span data-contrast="auto">Mainframe can run multiple copies of the operating system software as a single entity.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li data-leveltext="" data-font="Wingdings" data-listid="13" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Wingdings&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><b><span data-contrast="auto">Continuing compatibility: </span></b><span data-contrast="auto">Mainframe hosts old applications that evolved or not over the years and more recent applications development. The mainframe provides absolute compatibility across decades of changes and enhancement. When an incompatibility is unavoidable, the designers typically warn users at least a year in advance that software changes might be needed.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li data-leveltext="" data-font="Wingdings" data-listid="13" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Wingdings&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><b><span data-contrast="auto">Evolving architecture:</span></b><span data-contrast="auto"> Mainframe has been the leading technology in data and transaction serving for over four decades. Strong combination of past mainframe characteristics and next functionalities designed around the RAS are provided by each new generation.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li data-leveltext="" data-font="Wingdings" data-listid="13" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Wingdings&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><b><span data-contrast="auto">Extensibility: </span></b><span data-contrast="auto">Mainframe component and infrastructure reuse is characteristic of its design (a share-everything architecture).</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li data-leveltext="" data-font="Wingdings" data-listid="13" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Wingdings&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><b><span data-contrast="auto">Lower total cost of ownership (TCO).</span></b><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li data-leveltext="" data-font="Wingdings" data-listid="13" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Wingdings&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><b><span data-contrast="auto">Environmental friendliness: </span></b><span data-contrast="auto">Fewer physical servers running at a near constant energy level can host multiple virtual software servers. This setup allows a company to optimize the utilization of hardware and consolidate physical server infrastructure by hosting servers on a small number of powerful servers.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
</ul>
<p> </p>
<h3><span data-contrast="none">Hardware Systems and high availability</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:40,&quot;335559739&quot;:0}"> </span></h3>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0}"> </span><span class="TextRun SCXW224693710 BCX0" lang="EN-GB" xml:lang="EN-GB" data-contrast="auto"><span class="NormalTextRun SCXW224693710 BCX0">To introduce mainframe </span><span class="NormalTextRun SCXW224693710 BCX0">hardware,</span><span class="NormalTextRun SCXW224693710 BCX0"> we will take</span> <span class="NormalTextRun SCXW224693710 BCX0">as example the</span> <a href="https://www.redbooks.ibm.com/redbooks/pdfs/sg248950.pdf"><span class="NormalTextRun SCXW224693710 BCX0">Z1</span><span class="NormalTextRun SCXW224693710 BCX0">6</span> </a><span class="NormalTextRun SCXW224693710 BCX0">generation mainframe </span><span class="NormalTextRun SCXW224693710 BCX0">systems </span><span class="NormalTextRun SCXW224693710 BCX0">offer</span><span class="NormalTextRun SCXW224693710 BCX0">:</span></span><span class="EOP SCXW224693710 BCX0" data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0}"> </span></p>
<ul style="text-align: justify;">
<li data-leveltext="" data-font="Wingdings" data-listid="12" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Wingdings&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">A high computing capacity (up to 200 processors</span><span data-contrast="auto">)</span><span data-contrast="auto"> ensuring swift processing of tasks and handling of complex computations. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li data-leveltext="" data-font="Wingdings" data-listid="12" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Wingdings&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">A big capacity memory (up to 40 TB</span><span data-contrast="auto">) enabling storage and retrieval of vast amounts of data rapidly.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li data-leveltext="" data-font="Wingdings" data-listid="12" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Wingdings&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">A memory cache optimizing performance.</span></li>
<li data-leveltext="" data-font="Wingdings" data-listid="12" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Wingdings&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Data compression capability facilitating efficient storage and transmission of data by reducing its size.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li data-leveltext="" data-font="Wingdings" data-listid="12" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Wingdings&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Encryption functionalities to secure transactions providing robust security measures to safeguard sensitive information during transactions.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
</ul>
<p><img fetchpriority="high" decoding="async" class="aligncenter wp-image-24729 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/1exemple-mainframe.jpg" alt="" width="645" height="437" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/1exemple-mainframe.jpg 645w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/1exemple-mainframe-282x191.jpg 282w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/1exemple-mainframe-58x39.jpg 58w" sizes="(max-width: 645px) 100vw, 645px" /></p>
<p style="text-align: justify;"><span class="TextRun SCXW176476193 BCX0" lang="EN-GB" xml:lang="EN-GB" data-contrast="auto"><span class="NormalTextRun SCXW176476193 BCX0">Despite the continual changes, mainframe computers </span><span class="NormalTextRun SCXW176476193 BCX0">remain</span><span class="NormalTextRun SCXW176476193 BCX0"> the most stable, secure, and compatible of all computing platforms. From the client-server model of computing in the early 90s to the significant increase </span><span class="NormalTextRun SCXW176476193 BCX0">o</span><span class="NormalTextRun SCXW176476193 BCX0">f </span><span class="NormalTextRun SCXW176476193 BCX0">scalability and performance</span><span class="NormalTextRun SCXW176476193 BCX0"> and capacity today the mainframe computers evolved to meet new challenges.</span></span><span class="EOP SCXW176476193 BCX0" data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><img decoding="async" class="aligncenter wp-image-24731 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/2Evolution-du-mainframe-et-de-ses-composants.jpg" alt="" width="657" height="420" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/2Evolution-du-mainframe-et-de-ses-composants.jpg 657w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/2Evolution-du-mainframe-et-de-ses-composants-299x191.jpg 299w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/2Evolution-du-mainframe-et-de-ses-composants-61x39.jpg 61w" sizes="(max-width: 657px) 100vw, 657px" /></p>
<p style="text-align: center;"><a href="https://www.redbooks.ibm.com/redbooks/pdfs/sg246366.pdf"><em><span class="TextRun SCXW122406273 BCX0" lang="EN-GB" xml:lang="EN-GB" data-contrast="auto"><span class="NormalTextRun SCXW122406273 BCX0">Growth of the mainframe and its components</span></span></em></a></p>
<p style="text-align: justify;"><span data-contrast="auto">Z/16 generation mainframe are multiprocessor servers. Each processor has a small private area of memory that is unique to that processor called Prefix Storage Area (PSA) the processor can access other processor’s PSA through special programming, although this is normally done only for error recovery purposes.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">The mainframe disk drives are accessible through an associated Control Unit that has up to four fiber channel connections to one or more processors (through switch).</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p> </p>
<h3><span data-contrast="none">System control and partitioning</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:40,&quot;335559739&quot;:0}"> </span></h3>
<p style="text-align: justify;"><span data-contrast="auto">There are many ways to illustrate a mainframe internal structure. The figure bellow illustrates several internal functions of the mainframes. The internal controllers are microprocessors they are usually known as controllers to avoid confusion with mainframe processors.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><img decoding="async" class="aligncenter wp-image-24733 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/3Controle-du-systeme-et-partitionnement.jpg" alt="" width="735" height="470" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/3Controle-du-systeme-et-partitionnement.jpg 735w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/3Controle-du-systeme-et-partitionnement-299x191.jpg 299w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/3Controle-du-systeme-et-partitionnement-61x39.jpg 61w" sizes="(max-width: 735px) 100vw, 735px" /></p>
<p style="text-align: center;"><a href="https://www.redbooks.ibm.com/redbooks/pdfs/sg246366.pdf"><em><span class="TextRun SCXW106491300 BCX0" lang="EN-GB" xml:lang="EN-GB" data-contrast="auto"><span class="NormalTextRun SCXW106491300 BCX0">System control and partitioning</span></span></em></a></p>
<p style="text-align: justify;"><span data-contrast="auto">The mainframe can be partitioned into separated </span><b><span data-contrast="auto">L</span></b><span data-contrast="auto">ogical </span><b><span data-contrast="auto">PAR</span></b><span data-contrast="auto">titions </span><b><span data-contrast="auto">(LPARs)</span></b><span data-contrast="auto"> where system resources (memory, processors, and I/O devices) can be divided or shared among them under the control of </span><b><span data-contrast="auto">LPAR hypervisor </span></b><span data-contrast="auto">(type 1 hypervisor / native) which comes with the standard Processor Resource/ Systems Manager </span><b><span data-contrast="auto">(PR/SM) </span></b><span data-contrast="auto">feature on all mainframes. </span><b><span data-contrast="auto">Each LPAR support independent operating system (OS)</span></b><span data-contrast="auto"> loaded by a separate initial program load (IPL) operation and has its own copy (most of the z/OS system libraries can be shared).</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Today’s machines can be configured with </span><b><span data-contrast="auto">up to 60 LPAR</span></b><b><span data-contrast="none">,</span></b> <span data-contrast="auto">each one is considered as a distinct server with different OS environments. The system administrator can assign one or more system processors to the exclusive use of an LPAR through system control functions (firmware).</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:0}"> <img loading="lazy" decoding="async" class="aligncenter wp-image-24735 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/4Partition-logique.jpg" alt="" width="633" height="367" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/4Partition-logique.jpg 633w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/4Partition-logique-329x191.jpg 329w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/4Partition-logique-67x39.jpg 67w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/4Partition-logique-120x70.jpg 120w" sizes="auto, (max-width: 633px) 100vw, 633px" /></span></p>
<p style="text-align: center;"><a href="https://www.redbooks.ibm.com/redbooks/pdfs/sg246366.pdf"><i><span data-contrast="auto">Logical partition</span></i></a></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:0}"> </span></p>
<h3><span data-contrast="none">Clustering</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:40,&quot;335559739&quot;:0}"> </span></h3>
<p style="text-align: justify;"><span data-contrast="auto">Most z/OS installations nowadays use one or more of the following clustering technics:</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0}"> </span></p>
<ul style="text-align: justify;">
<li data-leveltext="" data-font="Wingdings" data-listid="2" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Wingdings&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><b><span data-contrast="auto">Basic Shared DASD (Direct Access Storage Devices):</span></b><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:360,&quot;335559739&quot;:0}"> </span></li>
</ul>
<p style="text-align: justify;"><span data-contrast="auto">A basic shared DASD system is typically used where the operations staff controls which jobs go to which system and ensures that there is no conflict, such as both systems trying to update the same data at the same time. Despite this limitation, a basic shared DASD environment is useful for testing, recovery, and careful load balancing.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:360,&quot;335559739&quot;:0}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:360,&quot;335559739&quot;:0}"> <img loading="lazy" decoding="async" class="aligncenter wp-image-24737 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/5Basic-shared-DASD.jpg" alt="" width="580" height="260" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/5Basic-shared-DASD.jpg 580w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/5Basic-shared-DASD-426x191.jpg 426w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/5Basic-shared-DASD-71x32.jpg 71w" sizes="auto, (max-width: 580px) 100vw, 580px" /></span></p>
<p style="text-align: center;"><a href="https://www.redbooks.ibm.com/redbooks/pdfs/sg246366.pdf"><i><span data-contrast="auto">Basic shared DASD</span></i></a><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:720,&quot;335559739&quot;:0}"> </span></p>
<ul style="text-align: justify;">
<li data-leveltext="" data-font="Wingdings" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Wingdings&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><b><span data-contrast="auto">CTC rings:</span></b><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:360,&quot;335559739&quot;:0}"> </span></li>
</ul>
<p style="text-align: justify;"><span data-contrast="auto">CTC rings (Chanel To Chanel) function simulate an input/output device that can be used by one System Control Program (SCP) to communicate with another SCP. It provides the data path and synchronization for data transfer.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:360,&quot;335559739&quot;:0}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">z/OS can use the CTC ring to pass control information among all systems in the ring. This information can include usage and locking information for data sets on disks, job queue information, security controls and disk metadata controls.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:360,&quot;335559739&quot;:0}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:360,&quot;335559739&quot;:0}"> <img loading="lazy" decoding="async" class="aligncenter wp-image-24739 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/6Basic-sysplex.jpg" alt="" width="563" height="250" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/6Basic-sysplex.jpg 563w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/6Basic-sysplex-430x191.jpg 430w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/6Basic-sysplex-71x32.jpg 71w" sizes="auto, (max-width: 563px) 100vw, 563px" /></span></p>
<p style="text-align: center;"><a href="https://www.redbooks.ibm.com/redbooks/pdfs/sg246366.pdf"><i><span data-contrast="auto">Basic sysplex</span></i><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:720,&quot;335559739&quot;:0}"> </span></a></p>
<p style="text-align: justify;"><span data-contrast="auto">The ring aspect is more obvious when more than two systems are involved.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:360,&quot;335559739&quot;:0}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:360,&quot;335559739&quot;:0}"> </span></p>
<ul style="text-align: justify;">
<li data-leveltext="" data-font="Wingdings" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Wingdings&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><b><span data-contrast="auto">Parallel Sysplex:</span></b><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:360,&quot;335559739&quot;:0}"> </span></li>
</ul>
<p style="text-align: justify;"><span data-contrast="auto">A sysplex system is one or more (up to 32 LPARS) z/OS images joined into a cooperative single unit using specialized hardware and software. It uses unique messaging services and can share special file structures contained within couple facility (CF) data sets.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:360,&quot;335559739&quot;:0}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">The Coupling facility (CF) is a logical partition that provides high speed caching, list processing and locking functions for sysplex. It contains one or more mainframe processors and a built-in operating system.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:360,&quot;335559739&quot;:0}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">A Parallel Sysplex is a symmetric sysplex using multisystem data-sharing technology. This is the mainframe’s clustering technology. It allows direct, concurrent read/write access to shared data from all processing servers in the configuration without impacting performance or data integrity. Each LPAR can concurrently cache shared data in the CF processor memory through hardware-assisted, cluster-wide serialization and coherency controls.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:360,&quot;335559739&quot;:0}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">This technic allows requests that are associated with a single workload to:</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:360,&quot;335559739&quot;:0}"> </span></p>
<ul style="text-align: justify;">
<li data-leveltext="" data-font="Wingdings" data-listid="11" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Wingdings&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Dynamically be balanced across systems with high performance.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:360,&quot;335559739&quot;:0}"> </span></li>
</ul>
<ul style="text-align: justify;">
<li data-leveltext="" data-font="Wingdings" data-listid="11" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Wingdings&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">Improve availability.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:360,&quot;335559739&quot;:0}"> </span></li>
</ul>
<ul style="text-align: justify;">
<li data-leveltext="" data-font="Wingdings" data-listid="11" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Wingdings&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">Provide a rolling maintenance for systems and applications.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:360,&quot;335559739&quot;:0}"> </span></li>
</ul>
<ul style="text-align: justify;">
<li data-leveltext="" data-font="Wingdings" data-listid="11" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Wingdings&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="4" data-aria-level="1"><span data-contrast="auto">Offer a scalable workload.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:360,&quot;335559739&quot;:0}"> </span></li>
</ul>
<ul style="text-align: justify;">
<li data-leveltext="" data-font="Wingdings" data-listid="11" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Wingdings&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="5" data-aria-level="1"><span data-contrast="auto">View multiple-system environments as a single logical route.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:360,&quot;335559739&quot;:0}"> </span></li>
</ul>
<ul style="text-align: justify;">
<li data-leveltext="" data-font="Wingdings" data-listid="11" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Wingdings&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="6" data-aria-level="1"><span data-contrast="auto">Synchronizing the TOD clocks (Time Of Day clock service) on multiple servers which allows events occurring on different servers to be properly sequenced in time.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:360,&quot;335559739&quot;:0}"> </span></li>
</ul>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:360,&quot;335559739&quot;:0}"> <img loading="lazy" decoding="async" class="aligncenter wp-image-24741 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/7Parallel-Sysplex.jpg" alt="" width="562" height="356" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/7Parallel-Sysplex.jpg 562w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/7Parallel-Sysplex-302x191.jpg 302w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/7Parallel-Sysplex-62x39.jpg 62w" sizes="auto, (max-width: 562px) 100vw, 562px" /></span></p>
<p style="text-align: center;"><a href="https://www.redbooks.ibm.com/redbooks/pdfs/sg246366.pdf"><i><span data-contrast="auto">Parallel Sysplex</span></i><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:720,&quot;335559739&quot;:0}"> </span></a></p>
<p> </p>
<h3><span data-contrast="none">Mainframe security</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:40,&quot;335559739&quot;:0}"> </span></h3>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:720,&quot;335559739&quot;:0}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Mainframe Z system security systems (access control, authentication, access control lists…) are centralized inside one unique service called </span><b><span data-contrast="auto">SAF</span></b><span data-contrast="auto"> (System authorization Facility).</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">SAF doesn’t require any other security product, but it is generally completed with other security product called ESM (External Security Manager) like TSS and RACF.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0}"> </span></p>
<ul style="text-align: justify;">
<li data-leveltext="" data-font="Wingdings" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Wingdings&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"><b><span data-contrast="auto">RACF:</span></b><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:360,&quot;335559739&quot;:0}"> </span></li>
</ul>
<p style="text-align: justify;"><span data-contrast="auto">RACF (Resource Access Facility) is part of a global </span><b><span data-contrast="auto">IBM offer</span></b><span data-contrast="auto"> named z/Os Security Server that includes an LDAP server, a z/Os Firewall technology, an Enterprise Identity Mapping component, RACF, …</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:360,&quot;335559739&quot;:0}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">RACF provides Discretionary Access Control (DAC) and Role Based Access Control (RBAC) functionality.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:360,&quot;335559739&quot;:0}"> </span></p>
<ul style="text-align: justify;">
<li data-leveltext="" data-font="Wingdings" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Wingdings&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="4" data-aria-level="1"><b><span data-contrast="auto">TSS:</span></b><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:360,&quot;335559739&quot;:0}"> </span></li>
</ul>
<p style="text-align: justify;"><span data-contrast="auto">The mainframe z/OS SAF (System Authorization Facility) can be used to delegate all security tasks to </span><b><span data-contrast="auto">Broadcom TSS</span></b><span data-contrast="auto"> (Top Secret Services). </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:360,&quot;335559739&quot;:0}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">TSS is an External Security Manager (ESM) developed by Broadcom and it is responsible of managing identification, authentication, and access control for z/OS resources like datasets, TCP/IP stacks, and programs. Each process has an owner (UserID) who starts with no permissions by default, and a TSS security officer must grant access to resources. Application isolation is achieved by carefully managing the permissions given to different resources. Additionally, firewall filtering can be applied to both incoming and outgoing traffic of the mainframe.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:360,&quot;335559739&quot;:0}"> </span></p>
<p> </p>
<h2><span data-contrast="none">Mainframe compliance with the LPM</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:240,&quot;335559739&quot;:0}"> </span></h2>
<h3><span data-contrast="none">What is the LPM?</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:40,&quot;335559739&quot;:0}"> </span></h3>
<p style="text-align: justify;"><span data-contrast="auto">The LPM is a strategic French defence plan whose objective is to ensure the security of operators of vital importance, companies, or organizations, for whom the interruption of one or their vital mission(s) would have an impact on the security of the nation.</span><span data-contrast="auto">​</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">It concerns the protection of Information Systems of Vital Importance (SIIV), on which these vitally important missions are based, and Points of Vital Importance (PIV), places hosting sensitive IS.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">It is relatively close to the NIS (Network and Information Security) directive about the security requirements to be applied to its SIIV but integrates new notions and obligations which make it more restrictive.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0}"> </span></p>
<h3><span data-contrast="none">Why is the mainframe subject to the LPM?</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:40,&quot;335559739&quot;:0}"> </span></h3>
<p style="text-align: justify;"><span data-contrast="auto">Mainframe z/OS (MFRz) is in the heart of the banking activity due to several reasons:</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0}"> </span></p>
<ul style="text-align: justify;">
<li data-leveltext="" data-font="Wingdings" data-listid="4" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Wingdings&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Its capability of managing big transaction and compute volumes.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0}"> </span></li>
</ul>
<ul style="text-align: justify;">
<li data-leveltext="" data-font="Wingdings" data-listid="4" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Wingdings&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">It offers a modularity inside a centralized system.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0}"> </span></li>
</ul>
<ul style="text-align: justify;">
<li data-leveltext="" data-font="Wingdings" data-listid="4" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Wingdings&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">Scalability and openness of the system.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0}"> </span></li>
</ul>
<ul style="text-align: justify;">
<li data-leveltext="" data-font="Wingdings" data-listid="4" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Wingdings&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="4" data-aria-level="1"><span data-contrast="auto">Interesting costs.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0}"> </span></li>
</ul>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335559685&quot;:720}"> <img loading="lazy" decoding="async" class="aligncenter wp-image-24743 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/8SIIV-et-MFRz.jpg" alt="" width="1163" height="172" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/8SIIV-et-MFRz.jpg 1163w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/8SIIV-et-MFRz-437x65.jpg 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/8SIIV-et-MFRz-71x11.jpg 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/8SIIV-et-MFRz-768x114.jpg 768w" sizes="auto, (max-width: 1163px) 100vw, 1163px" /></span></p>
<h2><span data-contrast="none">How can we perform segmentation in the mainframe?</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:240,&quot;335559739&quot;:0}"> </span></h2>
<p style="text-align: justify;"><span data-contrast="auto">To ensure isolation of assets inside the mainframe we can identify three possible scenarios (complete isolation, dedicated LPAR and network isolation). </span><span data-ccp-props="{&quot;335559739&quot;:0}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">The following scenarios however does not provide microsegmentation between assets in the same VLAN or sharing the same TCP/IP stack.</span><span data-ccp-props="{&quot;335559739&quot;:0}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335559739&quot;:0}"> </span></p>
<h3><span data-contrast="none">Complete isolation</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:40,&quot;335559739&quot;:0}"> </span></h3>
<p style="text-align: justify;"><span data-contrast="auto">A dedicated mainframe instance is dedicated for the SIIV assets. All communications with external asset are filtered through the mainframe firewall. However, this solution has a high material cost with a big operational risk. SIIV asset should be all migrated to this new mainframe instance and the building of this new environment require human resources.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0}"> </span></p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-24745 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/9Exemple-disolation-complete-.jpg" alt="" width="731" height="392" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/9Exemple-disolation-complete-.jpg 731w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/9Exemple-disolation-complete--356x191.jpg 356w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/9Exemple-disolation-complete--71x39.jpg 71w" sizes="auto, (max-width: 731px) 100vw, 731px" /></p>
<p style="text-align: center;"><i><span data-contrast="auto">Complete isolation example</span></i><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:0}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335559739&quot;:0}"> </span></p>
<h3><span data-contrast="none">Dedicated LPAR</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:40,&quot;335559739&quot;:0}"> </span></h3>
<p style="text-align: justify;"><span data-contrast="auto">In this isolation scenario an LPAR is dedicated for the SIIV assets. As discussed in the “System control and partitioning” chapter mainframe can be partitioned into separated logical partitions </span><b><span data-contrast="auto">(LPARs)</span></b><span data-contrast="auto"> where system resources and each LPAR support independent operating system (OS).</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:0,&quot;335559739&quot;:0}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Isolating all the SIIVs in one LPAR is not feasible because each asset runs on a different OS (Linux, z/OS…).</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:0,&quot;335559739&quot;:0}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:0,&quot;335559739&quot;:0}"> <img loading="lazy" decoding="async" class="aligncenter wp-image-24747 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/10Exemples-disolation-LPAR-.jpg" alt="" width="902" height="513" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/10Exemples-disolation-LPAR-.jpg 902w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/10Exemples-disolation-LPAR--336x191.jpg 336w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/10Exemples-disolation-LPAR--69x39.jpg 69w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/10Exemples-disolation-LPAR--768x437.jpg 768w" sizes="auto, (max-width: 902px) 100vw, 902px" /></span></p>
<p style="text-align: center;"><em> <span class="TextRun SCXW179288589 BCX0" lang="EN-GB" xml:lang="EN-GB" data-contrast="none"><span class="NormalTextRun SCXW179288589 BCX0">LPAR isolation examples</span></span><span class="EOP SCXW179288589 BCX0" data-ccp-props="{&quot;335559685&quot;:3544,&quot;335559739&quot;:0}"> </span></em></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:0}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335559739&quot;:0}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">A dedicated LPAR per SIIV OS can be set to remediate to that. This solution has however some weakness:</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:0,&quot;335559739&quot;:0}"> </span></p>
<ul style="text-align: justify;">
<li data-leveltext="" data-font="Wingdings" data-listid="8" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Wingdings&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">The SIIV assets share the same physical server with non SIIV assets.</span><span data-ccp-props="{}"> </span></li>
</ul>
<ul style="text-align: justify;">
<li data-leveltext="" data-font="Wingdings" data-listid="8" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Wingdings&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">Adding resources allocated to these new LPARs will induce an increase of the cost. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0}"> </span></li>
</ul>
<p style="text-align: justify;"><span data-ccp-props="{}"> </span></p>
<h3><span data-contrast="none">Network isolation</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:40,&quot;335559739&quot;:0}"> </span></h3>
<p style="text-align: justify;"><span data-contrast="auto">Assets can be logically partitioned through PR/SM (IBM processor resource / system manager). Using this feature mainframe urbanization can be designed to optimize the use of resources, by dedicating partitions by environment or by type of service. Each partition has its own TCP/IP stack and one or more OSA cards (network cards that can be shared between partitions). </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Mainframes can be connected to different networks, that are accessible through these various TCP/IP stacks. Multiple stacks can run on one mainframe instance allowing one z/OS partition to communicate to multiple networks at the same time and each stack is not necessarily active on each z/OS partition. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0}"> </span></p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="aligncenter wp-image-24749 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/11Exemple-disolation-reseau-.jpg" alt="" width="474" height="589" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/11Exemple-disolation-reseau-.jpg 474w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/11Exemple-disolation-reseau--154x191.jpg 154w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/11Exemple-disolation-reseau--31x39.jpg 31w" sizes="auto, (max-width: 474px) 100vw, 474px" /></p>
<p style="text-align: center;"><span class="TextRun SCXW84561537 BCX0" lang="EN-GB" xml:lang="EN-GB" data-contrast="auto"><span class="NormalTextRun SCXW84561537 BCX0"><em>Network isolation example</em></span></span><span class="EOP SCXW84561537 BCX0" data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:0}"> </span></p>
<ul style="text-align: justify;">
<li data-leveltext="" data-font="Wingdings" data-listid="7" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Wingdings&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Two assets sharing the same TCP/IP stack can directly communicate with each other without the mainframe firewall filtering (example: communication between “SIIV asset 1” and “SIIV asset 2”).</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0}"> </span></li>
<li data-leveltext="" data-font="Wingdings" data-listid="7" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Wingdings&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Two assets hosted in different LPAR but sharing the same VLAN can directly communicate with each other without the mainframe firewall filtering (example: communication between “SIIV asset 1” and “SIIV asset 3”).</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0}"> </span></li>
<li data-leveltext="" data-font="Wingdings" data-listid="7" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Wingdings&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Two assets hosted in different LPAR and different VLAN have their communication filtered by the mainframe firewall (example: communication between “SIIV asset 1” and “Other asset 4”).</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0}"> </span></li>
<li data-leveltext="" data-font="Wingdings" data-listid="7" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Wingdings&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Any communication with assets outside of the mainframe is filtered by the mainframe firewall.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0}"> </span></li>
</ul>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">This network isolation scenario allows isolation of SIIV from non-SIIV resources inside the mainframe, the optimization of the mainframe is preserved and there is a low operational risk as we don’t move the SIIV resources outside the mainframe.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0}"> </span></p>
<h3><span data-contrast="none">Summary of solutions</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:40,&quot;335559739&quot;:0}"> </span></h3>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-24751 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/12Synthese-des-solutions-.jpg" alt="" width="1140" height="381" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/12Synthese-des-solutions-.jpg 1140w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/12Synthese-des-solutions--437x146.jpg 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/12Synthese-des-solutions--71x24.jpg 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/12Synthese-des-solutions--768x257.jpg 768w" sizes="auto, (max-width: 1140px) 100vw, 1140px" /></p>
<p> </p>
<h2><span data-contrast="none">Do the segmentation scenarios respond to the architecture security filtering criteria of the LPM?</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:240,&quot;335559739&quot;:0}"> </span></h2>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">The Complete isolation scenario responds fully to the LPM Partitioning and filtering requirement as the mainframe will be dedicated to the SIIVs and the incoming and outcoming flows will be filtered by the mainframe firewall. However as stated above this solution has several disadvantages mostly related to the cost and operational risk of moving all the SIIVs to another physical machines. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">The Dedicated LPAR provides a logical isolation layer. The SIIVs are hosted in dedicated LPARs each one with its dedicated resources inside the mainframe. However this solution can lead to performance issues and high material cost.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;469777462&quot;:[1589],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">The network isolation scenario provides an extra layer of network isolation relying on TCP/IP stacks however non-SIIV application hosted in the same network as SIIV applications can still directly access it without filtering to remediate that the following conditions must be met:</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;469777462&quot;:[1589],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}"> </span></p>
<ul style="text-align: justify;">
<li data-leveltext="" data-font="Wingdings" data-listid="10" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Wingdings&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Dedicated SIIV zones must be set in the IS where group application will be hosted.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;469777462&quot;:[426],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}"> </span></li>
</ul>
<ul style="text-align: justify;">
<li data-leveltext="" data-font="Wingdings" data-listid="10" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Wingdings&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">Dedicated TCP/IP stacks must be set in the mainframe to which the SIIVs will be </span><span data-contrast="none">connected</span><span data-contrast="auto">.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;469777462&quot;:[426],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}"> </span></li>
</ul>
<p style="text-align: justify;"><span data-contrast="auto">In this scenario non-group critical resources communications with SIIVs will be forced to go through the firewall filtering.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;469777462&quot;:[426],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;469777462&quot;:[426],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}"> <img loading="lazy" decoding="async" class="aligncenter wp-image-24753 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/13LPM-requirements-respect.jpg" alt="" width="722" height="689" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/13LPM-requirements-respect.jpg 722w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/13LPM-requirements-respect-200x191.jpg 200w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/13LPM-requirements-respect-41x39.jpg 41w" sizes="auto, (max-width: 722px) 100vw, 722px" /></span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;469777462&quot;:[426],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}"> </span></p>
<h2><span data-contrast="none">Administration of the mainframe</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:240,&quot;335559739&quot;:0}"> </span></h2>
<h3 style="text-align: justify;"><span data-ccp-props="{}"> </span><span data-contrast="none">HMC</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:40,&quot;335559739&quot;:0}"> </span></h3>
<p style="text-align: justify;"><span data-contrast="auto">IBM z systems hardware monitoring and control services are performed through a dedicated console (HMC: Hardware Management Console) located in operator area and a Support Element console (SE) located inside a CEC (central electronic complex – mainframe “box”) that can only be used by operators. The HMC is a physical computer located in an operator area and is dedicated to the management of the hardware and software of the mainframe. The HMC can’t be used for another purpose. IBM can perform support actions through distant connections RSF (Remote Support Facility) for reporting and patching hardware issues.</span> <span data-contrast="auto">Access to the OS and application layers can’t be performed through these consoles. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<ul style="text-align: justify;">
<li data-leveltext="" data-font="Wingdings" data-listid="6" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Wingdings&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto"> To ensure compliance with the LPM, the HMC access must be protected by a firewall and restricted to a Bastion.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
</ul>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:1440}"> </span></p>
<h3><span data-contrast="none">Administration applications</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:40,&quot;335559739&quot;:0}"> </span></h3>
<p style="text-align: justify;"><span data-contrast="auto">IBM z systems embed several applications use to administrate the mainframe, such as</span><b><span data-contrast="auto"> TSO </span></b><span data-contrast="auto">(Time Sharing Option)</span><b><span data-contrast="auto">, ISPF </span></b><span data-contrast="auto">(Interface System Productivity Facility). These command-line interfaces allow users to run commands, submit batch jobs, manage rights and perform various administrative tasks. Access to those applications is managed through </span><b><span data-contrast="auto">RACF </span></b><span data-contrast="auto">(Resource Access Control Facility) which authenticate users and control the permissions based on assigned roles and access rights.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">To restrict the access to these administrative applications, the following measures must be deployed:</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<ul style="text-align: justify;">
<li data-leveltext="" data-font="Wingdings" data-listid="6" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Wingdings&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">Two network interfaces must be configured: one dedicated to mainframe administration, and one dedicated to business. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li data-leveltext="" data-font="Wingdings" data-listid="6" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Wingdings&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">RACF protection must be enabled on those interfaces to restrict the access based on the accounts. To do so, RACF should be configured to check the Terminal class</span><span data-contrast="auto">4</span><span data-contrast="auto"> and grant access based on its content:</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
</ul>
<ul>
<li style="list-style-type: none;">
<ul style="text-align: justify;">
<li data-leveltext="" data-font="Wingdings" data-listid="15" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:1080,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Wingdings&quot;,&quot;469769242&quot;:[9642],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="2"><span data-contrast="auto">Administrators accounts can only access the administration interface</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
</ul>
</li>
</ul>
<ul>
<li style="list-style-type: none;">
<ul style="text-align: justify;">
<li data-leveltext="" data-font="Wingdings" data-listid="15" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:1080,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Wingdings&quot;,&quot;469769242&quot;:[9642],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="2"><span data-contrast="auto">Business users accounts can only access the business interface</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
</ul>
</li>
</ul>
<p style="text-align: justify;"><span data-contrast="auto">To ensure compliance with the LPM, the administration interface access must be protected by a firewall and restricted to a Bastion.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p> </p>
<p> </p>
<p> </p>
<p> </p>
<p style="text-align: justify;"><span data-contrast="auto">Mainframe segmentation remains a critical component for organizations managing SIIVs. As we have explored, mainframe architecture provides a robust foundation for implementing effective segmentation strategies.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">The isolation solutions we have discussed each offers unique advantages and challenges. Complete isolation using dedicated mainframes is fully compliant with the LPM but at a higher cost, higher operational risk with reduced flexibility. LPAR isolation have a high operational cost and breaks the optimization of the MFRz. Network isolation using TSS or RACF to dedicate TCP/IP stacks offer a more cost-effective, flexible solution with less operational risks but this solution is partially compliant with the LPM as the mainframe is not physically dedicated to the SIIVs. In addition to that the mainframe provides the necessary tools to secure its administration interfaces and to segregate it from the production.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Choosing between these solutions requires careful consideration of an organization specific needs, security requirements and resource constraint. It is crucial to remember that there is no one-size-fits-all solution. The optimal approach will vary depending on the nature of the SIIV and the organization overall IT infrastructure</span><span data-contrast="auto">.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/12/segmentation-in-mainframe-z-os-and-lpm/">Segmentation in mainframe z/OS and LPM</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2024/12/segmentation-in-mainframe-z-os-and-lpm/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Agile Security, Emma Barféty interview</title>
		<link>https://www.riskinsight-wavestone.com/en/2021/10/agile-security/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2021/10/agile-security/#respond</comments>
		
		<dc:creator><![CDATA[Emma Barfety]]></dc:creator>
		<pubDate>Mon, 11 Oct 2021 10:00:00 +0000</pubDate>
				<category><![CDATA[Cloud & Next-Gen IT Security]]></category>
		<category><![CDATA[Interview]]></category>
		<category><![CDATA[agile]]></category>
		<category><![CDATA[agility]]></category>
		<category><![CDATA[DevSecOps]]></category>
		<category><![CDATA[scrum]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=17026</guid>

					<description><![CDATA[<p>Emma, could you please introduce the topic ? Historically, the Agile approach is a set of practices used for IT development projects.  The Manifesto published in 2001 proposes 4 main values to revolutionise the performance of companies: This emphasis on...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/10/agile-security/">Agile Security, Emma Barféty interview</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h1 style="text-align: justify;"><strong>Emma, could you please introduce the topic ?</strong></h1>
<p style="text-align: justify;"><strong>Historically</strong>, the Agile approach is a set of practices used for <strong>IT development projects</strong>. </p>
<p style="text-align: justify;">The Manifesto published in 2001 proposes 4 main values to revolutionise the performance of companies:</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-17027 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/Image-1-EN.png" alt="" width="1512" height="281" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/Image-1-EN.png 1512w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/Image-1-EN-437x81.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/Image-1-EN-71x13.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/Image-1-EN-768x143.png 768w" sizes="auto, (max-width: 1512px) 100vw, 1512px" /></p>
<p style="text-align: justify;">This emphasis on human interaction between the development team and business teams aims at reducing the time to market of the products developed, as opposed to projects conducted in V-model which, once delivered, may no longer satisfy changing business requirements.</p>
<p style="text-align: justify;">Today, this practice is applied in <strong>most companies at all levels</strong>. In the latest <a href="https://stateofagile.com/#ufh-i-661275008-15th-state-of-agile-report/7027494"><em>State of Agile Report</em></a>, out of more than 4,000 companies surveyed worldwide, 95% declared that they use agile and 65% of them have been practising it for at least 3 years.  In addition to IT, the methodology is also used in marketing, human resources, sales, and finance departments. 52% of the companies surveyed stated that at least half of their company&#8217;s departments adopt agile processes and therefore the scalability of such practices should not be ignored.</p>
<p style="text-align: justify;">Beyond a project management method, it is a new philosophy with gamified elements. We no longer speak of meetings but of ceremonies, with new roles appearing such as product owner and scrum master. Using this philosophy, the desire is to create an <strong>atmosphere of co-construction and to make maximum use of collective intelligence</strong> to improve the company&#8217;s performance.</p>
<p style="text-align: justify;">Although the concept of security is present in the manifesto, the integration of such measures into product development is not properly addressed. The method by which security is implemented in V-model projects does not apply to the agile philosophy and thus new ways of implementing security should be identified for it.</p>
<p> </p>
<h1 style="text-align: justify;"><strong>What are the trends and challenges of this field? </strong></h1>
<p style="text-align: justify;">One of our challenges is to provide our clients with a global view of their problems. Adopting an <strong>agile approach requires a change in all levels</strong> of the business from security, to quality teams and as such the effect on all levels of the business must be considered.</p>
<p style="text-align: justify;"><strong>In terms of organisation</strong>, the ISS must reposition itself as <strong>a service to the business</strong> and thus shift its image from a ‘policeman’ to a support function. The role of <strong>Security Champion </strong>(a member of the feature team such as a developer) becomes the point of contact for the ISS teams. In doing this a connection can be created with each feature team, thus increasing autonomy over security integration. This is not something that can be achieved overnight, it requires training to highlight cybersecurity issues and share knowledge (particularly the basics of ISS and secure development). In addition to this, a security Guild should be created, bringing together ISS experts, security champions as well as security enthusiasts. This allows members to exchange information on the latest security news, good practices as feedback and lessons learned from the field. This Guild must be set-up in such a way to allow easy communication between members (such as on an internal wiki).</p>
<p style="text-align: justify;">After the security champion receives training from the ISS team, they become the security referent and thus developers can turn to them for questions and advice. Therefore, the role in itself is fairly technical. In adopting an agile approach, the ISS experts will keep their role, but the relationship will change from that of control and audit to support and facilitative. Audits can still be carried out (such as penetration tests) at the request of the feature team or on the initiative of the security experts. Methodological tools must also be available to help the Champions in their tasks and this includes rewriting risks in conversational format. To adapt to the use of User Stories by feature teams, the ISS team could try writing Evil User Stories, which correspond to an action carried out from the point of view of an attacker. For example:</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-17029 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/Image-2-EN.png" alt="" width="1793" height="264" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/Image-2-EN.png 1793w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/Image-2-EN-437x64.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/Image-2-EN-71x10.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/Image-2-EN-768x113.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/Image-2-EN-1536x226.png 1536w" sizes="auto, (max-width: 1793px) 100vw, 1793px" /></p>
<p style="text-align: justify;">Faced with these risks, there are Security User Stories, proposing remediation solutions for EUS, with ready-to-use acceptance criteria. All this can be integrated into a security baseline (also in backlog format, in a product management tool, such as JIRA for example), proposing a <strong>minimum-security base</strong> to be integrated into the products.</p>
<p style="text-align: justify;">In addition to organisational support for the teams, technical support must be provided by optimising the continuous integration and deployment chain (CI/CD) with tools aimed at <strong>automating security as much as possible</strong>, which can be called the <strong>Security Stack</strong> or <strong>Security Pipeline</strong>: code review, vulnerability scans, detection of secrets, security of the Infrastructure as Code, etc.).  Particular attention must be paid to its own security, so as not to produce the opposite effect&#8230; From a shift-left security perspective, security is integrated into the product by default, right from the start. It therefore adapts its velocity to that of an agile approach and enables a shift from a DevOps logic to that of DevSecOps. </p>
<p style="text-align: justify;">Another role can be created, that of <strong>AppSec Manager</strong>. This is part of the ISS team and is an expert in software security as well as an expert in the security stack. Their role is to help the developers to prioritise and remedy the vulnerabilities reported by the Stack. They work in tandem with the <strong>Risk Manager</strong>/IS expert, who provides them with knowledge of the risks associated with the product, which enables a more detailed analysis of the vulnerabilities to be dealt with as a priority. All this helps to create a culture of security by design.</p>
<p style="text-align: justify;"> </p>
<h1 style="text-align: justify;"><strong>What do customer expect? </strong></h1>
<p style="text-align: justify;">CISO customers expect to be reassured that security in agile mode will not cause them to &#8220;lose control&#8221; over the proper implementation of security. The model we propose empowers the feature teams, gives them tools, but security retains control by centralising the performance indicators, by having the capacity to carry out random checks/according to predefined criteria, via bug bounty for example or an envelope of pentester days, to be distributed over the various products.</p>
<p style="text-align: justify;">Secondly, as a consultant, I think that clients expect us to share our <strong>convictions and very concrete examples</strong> of what we have been able to achieve for other clients. To meet this demand, Wavestone&#8217;s Cybersecurity and Digital Trust (CDT) practice has created several methodological accelerators based on feedback from the field, ready to be shared and adapted. Being able to carry out the mission in Agile mode was also part of the expectations, favouring <strong>co-construction</strong> rather than providing fixed and almost finalised deliverables from the first draft. In this gamification perspective, which is very important from an agile approach, we offer original co-construction workshops based on collective intelligence, thanks to our <strong>Creadesk</strong> asset, which trains consultants and provides them with tools for remote collective work.</p>
<p> </p>
<h1 style="text-align: justify;"><strong>Any final advice for our readers? </strong></h1>
<p style="text-align: justify;">Implementing a true <strong>test &amp; lean </strong>approach is crucial. In order to extract the most benefit from using co-constructing tools, we must regularly test and verify them in the field. While anticipating problems is crucial, significant value can be achieved when one we confront the problems as they arise. It allows us to be in direct contact with the business and feature teams, to show them that concrete actions are being implemented. The approach is agile, flexible, and scalable. The accelerators, methodologies and tools proposed evolve during the pilots and become even more relevant for the second wave of pilots, until all the feature teams are integrated.</p>
<p style="text-align: justify;">At the same time, it is important to remember that change management is essential. A real communication plan is needed &#8211; building communities of practice/guilds from the beginning of the pilots and identifying early adopters who will be valuable drivers of change within the teams. Agile has a real and rapid impact in everyday life and at all team levels: implementing this change is essential.  </p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/10/agile-security/">Agile Security, Emma Barféty interview</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2021/10/agile-security/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to improve your cyber detection by moving to the Cloud</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/12/how-to-improve-your-cyber-detection-by-moving-to-the-cloud/</link>
		
		<dc:creator><![CDATA[AdRi3nM3rlieR]]></dc:creator>
		<pubDate>Mon, 07 Dec 2020 08:00:14 +0000</pubDate>
				<category><![CDATA[Cloud & Next-Gen IT Security]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[cyber detection]]></category>
		<category><![CDATA[detection]]></category>
		<category><![CDATA[How-to]]></category>
		<category><![CDATA[move]]></category>
		<category><![CDATA[providers]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=14777</guid>

					<description><![CDATA[<p>Cloud is on everyone’s lips, especially in these unusual times of remote work. Many organisations are reviewing the way they design and implement their activities in order to move to Cloud Services Providers (CSP). But this “Move to Cloud” trend...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/12/how-to-improve-your-cyber-detection-by-moving-to-the-cloud/">How to improve your cyber detection by moving to the Cloud</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Cloud is on everyone’s lips, especially in these unusual times of remote work. Many organisations are reviewing the way they design and implement their activities in order to move to Cloud Services Providers (CSP). But this “Move to Cloud” trend might also be an opportunity for security teams to take back control and detect incidents better than ever!</p>
<p>In the past year, I had the chance to work with different organisations in their Cloud transformation, and each of them has provided our team of Wavestone consultants with insights and key lessons on what Cloud-based detection systems can and cannot bring to an organisation.</p>
<p><em>For this article, bear in mind that we will consider <u>any change of configuration leading to a degradation of the security level as an incident</u>. While it does not perhaps fit the exact, usual definition of a security incident, misconfiguration of a Public Cloud service (where resources and data can be directly accessible through the internet) is too serious of an issue to not raise an immediate alert for the security of the information system.</em></p>
<p>&nbsp;</p>
<h2>Embrace the quick wins</h2>
<p>When using Public Cloud from the main providers (Amazon Web Services, Microsoft Azure and Google Cloud Platform), it is fairly easy to turn on the native detection features and kickstart a basic, yet effective detection capability. <strong>Most platforms will provide a central security platform</strong> that enables you to <strong>detect misconfiguration</strong> in the infrastructure you have deployed, <strong>score your compliance level</strong> against a given standard and <strong>raise some alerts</strong> when the most typical incidents will occur (see further). There is virtually no reason to skip this feature, which is sometimes free to enable (either for trial or permanently).</p>
<p>Additionally, logging is virtually a non-issue in your security roadmap. Cloud providers will typically allow you to stream the logs from both your virtual machines (through agents), your PaaS components (via a handful of clicks, or a couple of parameters in your Infrastructure as Code templates) and the management plane of your subscription (activated from scratch). This enables your security team to swiftly understand the ongoing activity on the platform and start building on the logs to get some alerts. Moreover, some Cloud providers SIEM systems (such as Azure Sentinel) have ready-to-be-plugged connectors for appliances and external data sources which will parse the logs and remove some of the heavy lifting required when bringing the logs home to the SIEM.</p>
<p>&nbsp;</p>
<h2>Take the opportunity to improve security right away</h2>
<p>Once you have learned the basics of the native Cloud detection tools, it is time to build your own expertise to be able to rely on your own tools! You can also leverage third-party solutions such as Cloud Security Posture Management (CSPM) solutions and configure it to cover your needs.</p>
<p>As hinted above, the native features from Cloud Providers offer some basics alerts which can go a long way. With AWS Guard Duty, you can detect compromising of AWS EC2 access tokens or abnormal access to S3 buckets, Azure Security Center will notify you when potentially malicious activity is detected on a virtual machine, or when Azure AD accounts are likely to be taken over&#8230; If you need to be quickly capable to detect attacks, there is a way to leverage the native, ready-to-be-used alerts available (although some of them might require the premium license after a free trial).</p>
<p><strong>One of the key perks of Cloud detection is that you can right away act upon them with automatic remediation!</strong> For example, misconfigurations are a real source of concern for security teams, as the Terabytes of data leaked through accidentally exposed S3 buckets will testify. So why not reconfigure any bucket exposed, unless it has specifically been set in an “<em>Allow List</em>”? Automation will allow you to detect the exposition pattern, launch a serverless function which will fix the misconfiguration and could even notify the resource owner or the security team.</p>
<p>This can be done for misconfiguration, but also for malicious activity: if you detect an EC2 token being stolen from the metadata of an instance, you can temporarily remove its access rights. If you notice logging is being disabled, re-enable it and lock the responsible user accounts. <strong>This will drastically improve your time-to-react to security incidents.</strong></p>
<p>Of course, you still need to work on the overall incident management process: both on how to avoid the misconfiguration of services (through training of developers and controls in the CICD channels if existing) and on how to manage them once they occur (the operating model is tackled further below).</p>
<p>&nbsp;</p>
<h2>Get closer to business and continuous improvement</h2>
<p>Moving to Cloud is usually a time where applications and workloads will have to pass again through a security review to ensure the architecture and design are sound and safe. But <strong>it is also an opportunity to make security detection more relevant to the application</strong>.</p>
<p>To make it count, <strong>my advice would be:</strong></p>
<ul>
<li><strong>Go through the process of “Service Enablement” for new services: </strong>as moving to the cloud allow business and IT teams to use hundreds of new features and components, it is important to bring together architects and security teams to assess the main risks for each new technology, find countermeasures to limit these risks and start thinking about the alerts that will need to be implemented in the SIEM ;</li>
<li><strong>Build an alert catalog for each typical risk scenario and component</strong>, with the logic of the alert already pre-defined and only the business specifics to be customised. <strong>The &#8220;time to market” for supervision should also drop</strong>, as a good share of the components used for cloud operations is common to most applications (virtual machines, databases, serverless applications and functions, decoupling systems);</li>
<li><strong>Keep up to date with Cloud-related attacks</strong> to understand the latest vulnerabilities/attackers paths, and integrate them in your detection systems.</li>
</ul>
<p><strong>All these applications specifics should sit on top of transversal alerts covering your core Cloud functions</strong> (IAM, networking, landing zones, etc.). To help you build this core-detection capability, you can obviously count on our team, but I should also recommend checking on the ever-growing CloudSec community, which continuously share its expertise through open-source tooling (as this <a href="https://github.com/toniblyx/my-arsenal-of-aws-security-tools">consolidated-view</a> will prove) or on live and online platforms (such as the Cloud Security Forum and its first <a href="https://fwdcloudsec.org/index.html#intro">Fwd:CloudSec</a> conference this year).</p>
<p>&nbsp;</p>
<h2>Not everything is easy though!</h2>
<p>Based on everything written above, it might seem effortless to get a solid cloud detect and react proficiency. However, some challenges remain to be tackled.</p>
<p>The first one to come to mind is pricing. Often suggested as a selling point for Move to Cloud programs, <strong>accurately estimating how much your provider will charge you for Cloud detections is not as easy as it sounds</strong>. Over the years, many CSP security solutions have moved to component-based pricing for IaaS and transaction-based pricing for PaaS components. Log storage and alerting are sometimes even more complex, as some solutions will charge you based on log transit and aggregation, while some solutions will charge you for the number of assessments against alerts you run. Significant work is required to determine a truthful budget, and not go bankrupt.</p>
<p>The second key attention point is to <strong>understand what your provider offers and what it does not offer in terms of detection</strong>. While most solutions will claim to solve all your problems at once, it is unfortunately far from true. And for each security use case, there needs to be a call on whether you are fine with the free option if it exists, if the premium one is required, or if your security teams can make it on their own. <strong>Realistically, you will need to start with the native option, until your security team is mature enough, cloud-wise, to move to a homemade process</strong>.</p>
<p>Additionally, and maybe the most significant aspect, <strong>you need to design an operating model that will allow you to work with multiple subscriptions, multiple teams/businesses and possibly multiple Cloud Providers</strong>. More and more organisations are parallelising operations by picking different CSPs for different use cases, which leads to increased complexity for security teams – as they need to manage incidents on different platforms, with responsibilities divided between DevOps, SecOps and the on-premise teams. This will be especially difficult as some misconfiguration will lead to immediate security risks, and a choice needs to be made on whether the Ops or Security is expected to act. Without a strong division of duties across all providers and teams, there is a fair chance a small misconfiguration will snowball its way into a major data leak.</p>
<p>Finally, remember that monitoring your Cloud applications in the Cloud can also create risks. Besides vendors lock-in, you can lose all security functions along with your applications if everything sits under the same management plane. If the global administration rights of the SIEM tenant are taken over by an attacker, he or she will have all the liberty to affect the underlying resources (meaning erase logs, disable alerts or remove remediation capabilities). It is worth thinking about it before stacking your SIEM and critical applications under the same roof.</p>
<p>In the end, to sum it up:</p>
<ul>
<li><strong>Grab the low hanging fruits</strong>: your Cloud Provider will help you collect and consolidate the logs easily. There are virtually no technical barriers to not use the logs anymore. In addition to that, enable the basic security features provided by your CSP to detect the most obvious attacks.</li>
<li><strong>Grow your cloud maturity together with cloud teams:</strong> The Cloud movement has pushed the business and IT teams (SecDevOps) to work closer than ever. Embrace this philosophy by better understanding the business needs in terms of security, customise alerts and automate your response to allow your capability to scale.</li>
<li><strong>Optimise costs and operating models to excel</strong>:<strong> </strong>Virtualisation has made a lot of technical aspects easier for teams, but processes can be hard to adapt. Make sure to carefully design your detection/incident response operating model to ensure all your applications and Cloud Providers are covered. Finally, think about cost optimisation when it comes to log management!</li>
</ul>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/12/how-to-improve-your-cyber-detection-by-moving-to-the-cloud/">How to improve your cyber detection by moving to the Cloud</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Key Enablers in Creating a Seamless and Secure User Experience</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/11/key-enablers-in-creating-a-seamless-and-secure-user-experience/</link>
		
		<dc:creator><![CDATA[Florian Pouchet]]></dc:creator>
		<pubDate>Thu, 19 Nov 2020 08:00:16 +0000</pubDate>
				<category><![CDATA[Cloud & Next-Gen IT Security]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Identity Control Tower]]></category>
		<category><![CDATA[IT]]></category>
		<category><![CDATA[model]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[user experience]]></category>
		<category><![CDATA[user side]]></category>
		<category><![CDATA[Workplace]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=14632</guid>

					<description><![CDATA[<p>With remote working and digital interactions becoming more and more common, it is essential for businesses to offer the best possible experience for day-to-day digital activities and collaboration with suppliers and partners. One way of providing a seamless and yet...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/11/key-enablers-in-creating-a-seamless-and-secure-user-experience/">Key Enablers in Creating a Seamless and Secure User Experience</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>With remote working and digital interactions becoming more and more common, it is essential for businesses to offer the best possible experience for day-to-day digital activities and collaboration with suppliers and partners. One way of providing a seamless and yet secure user experience is by employing and putting in place the necessary steps toward an <strong>Identity Control Tower</strong> model as described in this article.</p>
<p>&nbsp;</p>
<h2>The Workplace and its Collaboration Tools</h2>
<p>It’s great to be able to work from anywhere, any device and having the technology work when you need it. More than a luxury, it’s a <strong>necessity</strong> in the current intensified remote working situation, or for international organisations with very mobile, distributed, fluid users. While so many changes happen during the crisis, your workplace should support your business reconfiguration through enabling staff, partners, suppliers to work with different applications, different teams, etc.</p>
<p>The word “Workplace” used in this context refers to <strong>more than the workstations and collaboration tools</strong>. It extends to wider areas such as enterprise architecture, application security &amp; identity and access management. Arguably, we’re talking about the wider IT foundation/digital capabilities, to support and enable business needs –<strong> the workplace might just be the tip of the iceberg</strong>.</p>
<p>&nbsp;</p>
<h2>Legacy upon Legacy adds Complexity</h2>
<p>On the <strong>user side</strong>, as soon as you go through multiple use-cases, e.g. accessing a legacy system on premise or a Software as a Service application, you are likely to require multiple accounts and therefore a cumbersome user experience.</p>
<p>On the <strong>IT operation side</strong>, it is equally a burden to make it work: workstations are still most of the time a physical device bound to a rigid corporate domain; they need to be configured, then shipped to remote staff or external parties, and accounts still need to be provisioned in target environments, with access rights set appropriately. <strong>All the above usually being different processes which are repeated for each supplier or partner, leading to as many devices and set ups. </strong></p>
<p>More importantly, <strong>how secure is this</strong> disorganised and overlapping situation? Having visibility and control on who has access to what, end to end and for all environments, is a challenge because of the siloed use-cases. And as users join and leave, applications evolve, the security level likely decreases by lack of keeping accounts and rights accurate.</p>
<p>In our experience at Wavestone, all these challenges stem from the accumulation of new use-cases and technology, implemented in silo, for their own use or limited group of use-cases. The platform, which was first designed with one primary use, has now altered into a manifold use platform with an ill-fitting model and processes. Many organisations today can be proud to rely on a federated platform and modern access experience for cloud applications on one side – and a different, yet reasonably good, experience on internal applications side. However, often both are not integrated and therefore don’t get the benefits we described in the introduction. We believe this comes from the lack of a truly shared model/architecture to support a modern experience, <strong>across all use-cases</strong><em>.</em></p>
<p>.</p>
<figure id="post-14634 media-14634" class="align-center"><img loading="lazy" decoding="async" class=" wp-image-14634 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/image1.png" alt="" width="995" height="387" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/image1.png 812w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/image1-437x170.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/image1-71x28.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/image1-768x299.png 768w" sizes="auto, (max-width: 995px) 100vw, 995px" /></figure>
<p style="text-align: center;">Figure 1 &#8211; <em>Example of a corporate model in which each entity manages identities and their access separately: duplicating pro</em>cesses</p>
<p>&nbsp;</p>
<h2>One Model for a streamline experience</h2>
<p>For this reason and for the future of user experience, at Wavestone we believe in a <strong>model based on Identity Control Tower</strong>(s).</p>
<p>An Identity Control Tower is a platform to enforce your access policies. Its purpose is to <strong>verify access requests coming from trusted sources of identity and determine if that identity is allowed to access a target digital resource.</strong> For the metaphor, a pilot willing to get clearance for take-off will submit their flight plan using a trusted channel, and after its approval and other verification by controllers, the pilot can proceed to take-off. If we were to transpose this metaphor digitally, we would talk about a user: in order for said user to access X platform, (s)he would need to use a corporate process which itself is trusted by an Identity Control Tower. Said user would provide their “access plan” (e.g. session token) to the Identity Control Tower. After the Identity Control Tower has verified the authenticity of the “access plan” against its access policies it will perform other checks of context, such as: time of the request, location of origin of the access, trust level of the device etc, the user can then proceed to access the resources. Should these verifications highlight anything unusual or inconsistent in authenticating the user, additional requests can be made to allow the user in (re-authentication or step up).</p>
<p>The Identity Control Tower is under your control and holds the conditions of access i.e. access policies and accepts users from specific sources thanks to a pre-established trust relationship between organisations.</p>
<p>For instance, in the diagram below, imagine a situation in which a supplier is developing a new service in your cloud environment. Users from the supplier would keep their device and authentication process they use within their corporate environment, while the Identity Control Tower (ICT) would enforce access control to the cloud environment – without having to use and manage a different account and re-authenticate. For environments with very granular privileges like AWS, building a decoupled ICT is maybe not a realistic approach and the ICT is then probably the identity platform from Amazon that is managed by your organisation and linked to the identity provider of the supplier. The Identity Control Tower model is basically an extension of federation, implemented to cover all use-cases.</p>
<p>&nbsp;</p>
<figure id="post-14636 media-14636" class="align-center"><img loading="lazy" decoding="async" class="aligncenter wp-image-14636" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/image2.png" alt="" width="979" height="383" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/image2.png 874w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/image2-437x171.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/image2-71x28.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/image2-768x301.png 768w" sizes="auto, (max-width: 979px) 100vw, 979px" /></figure>
<p style="text-align: center;">Figure 2 – <em>Access of a Partner user to a Cloud Provider resource through an Identity Control Tower</em></p>
<p>&nbsp;</p>
<p>In another scenario, as seen in this diagram, let’s consider an applicant applying for a job in your organisation, thanks to a recruitment portal you offer. They would initiate an application in your portal using their government-backed digital identity, and once they provide their consent to access their LinkedIn profile, you could obtain a digital CV. For the applicant, it is as simple as showing their ID and giving a copy of their CV, rather than filling-in registration form(s) asking once again for the same standard identity information and risking a typo in their contact details – or even having to send copies of sensitive documents like their passport.</p>
<p>&nbsp;</p>
<figure id="post-14638 media-14638" class="align-center"><img loading="lazy" decoding="async" class="aligncenter wp-image-14638" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/image-3-5.png" alt="" width="986" height="377" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/image-3-5.png 842w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/image-3-5-437x167.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/image-3-5-71x27.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/image-3-5-768x294.png 768w" sizes="auto, (max-width: 986px) 100vw, 986px" /></figure>
<p style="text-align: center;">Figure 3 &#8211; <em>An alternative scenario presenting the trust relationship between a government ID platform and the corporate</em></p>
<p>&nbsp;</p>
<h2>One Model, Three Key Pillars</h2>
<p>Using our knowledge and experience, we believe that this model should be built upon three key pillars:<strong> a unique identity across all systems</strong>, a <strong>common</strong> and <strong>flexible</strong> model to access information and, the establishment of a <strong>360</strong>°<strong> trust relationship.</strong></p>
<p><strong>A Unique Identity Architecture: this</strong> is achieved by following a simple rule: don’t duplicate identity data. The less identity records you create for the same physical person, the more streamline the digital experience will be – as cumbersome steps start to appear when an additional account, device or authentication action is required for the user to access the target resource. The key behind a unique identity data is to <strong>try reusing the data from its (authoritative) source</strong> instead of duplicating/copying it in your own systems. For instance, the suppliers or partners working with your organisation likely already have professional digital identities for their own IT use – what would be the conditions to leverage them instead of re-creating them?<a href="#_ftn1" name="_ftnref1">[1]</a> The next two pillars contribute to answering this question.</p>
<p><strong>A Common and Flexible Model:</strong> The second pillar is to use a common and flexible model to allow/restrict access to information. To provide flexibility, an attribute-based access control (ABAC) model enables granular rules and is well suited to a risk-based and adaptive approach. To make it work though, it is essential to <strong>define the “grammar” of the authorisation model</strong>: what are the actual attributes used to provide accesses that make sense at the enterprise level? How do they translate into “privileges”? What are their formats/values? When the Identity Control Tower is provided by a cloud provider (e.g. from a Cloud provider as Azure or AWS), the grammar is often determined by the said service. Furthermore, to make this model as widespread as possible across use-cases, both on the identity source side and on providing access on the target service side, we recommend implementing your platform following market standards to maximise inter-operability (SAML, OpenID Connect, OAuth, FIDO, etc.).</p>
<p><strong>360° Trust Relationship: </strong>Finally, the last pillar is to ensure the establishment of a 360° Trust Relationship. In other words, <strong>perform due diligence and establish confidence thresholds</strong> to accept interconnection (“technical trust”) of identity platforms. The due diligence should extend to all upstream processes leading to feeding the platform with identities, for instance the HR/procurement processes to vet identities, up to the IT on-boarding process itself – because trusting an identity platform is a first step for these identities to access your digital resources, you need to be within tolerance of the risk it comes with. This trust relationship should then be implemented through security level expectations, auditability in contractual clauses, and enforced via the supplier service management governance. With such strong requirements, one organisation must be prepared to temporarily on-board suppliers or partners within the organisation’s own platform, while suppliers or partners remediate their processes and platforms to be compliant.</p>
<p>&nbsp;</p>
<h2>Two key success factors</h2>
<p>In order to implement these three key pillars, Wavestone has identified two key success factors: being <strong>sponsored by appropriate level of management</strong> and <strong>building resilience and privacy by design</strong>. A transformation programme to establish this model would have implications and requirements in several of your organisation’s departments (HR, sourcing, legal, IT, risk, security etc.), hence should be sponsored by top-management and driven with a pan-organisation approach.<br />
Additionally, as it should always be, the supporting platform should be designed and built with <strong>security</strong>, <strong>privacy</strong> and <strong>resilience</strong> considerations from the beginning.</p>
<p>&nbsp;</p>
<h3>Final Thoughts</h3>
<p>As you have been able to understand throughout this article, looking at the user experience end to end and across use-cases is key to really streamline digital services. This can be achieved with a pan-organisation shift to enforce a unique identity across all systems, a common and flexible model to access information and, the establishment of a 360° trust relationship with third parties.</p>
<p>To go further in your reflection on the subject and understand the current state of your organisation, think about these questions and try to answer them: <em>picking users from different departments, what does the typical day to day digital experience look like? How long does my organisation take to on-board contractors and third parties? How does my organisation actually give access to its data and resources for external users? How many duplicate identities exist across my IT estate?</em></p>
<p>&nbsp;</p>
<p><a href="#_ftnref1" name="_ftn1">[1]</a> A technical entry might still exist within your systems, for reference purposes &#8211; but from the user perspective there is no new account, no duplicate, if they don’t have to register a new login, credentials etc.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/11/key-enablers-in-creating-a-seamless-and-secure-user-experience/">Key Enablers in Creating a Seamless and Secure User Experience</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>A &#8220;SHORT&#8221; GUIDE TO THE JUNGLE OF MICROSOFT 365 SECURITY AND COMPLIANCE LICENSING &#8211; PART 2</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/09/a-short-guide-to-the-jungle-of-microsoft-365-security-and-compliance-licensing-part-2/</link>
		
		<dc:creator><![CDATA[GEneviEveLardon]]></dc:creator>
		<pubDate>Fri, 04 Sep 2020 07:00:45 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[Microsoft 365]]></category>
		<category><![CDATA[Office 365]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[services]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=14170</guid>

					<description><![CDATA[<p>Who hasn’t already felt lost looking for information on Office 365 licensing? In this article, I will help you decipher the existing plans, as well as provide a few tips and reminders on recent announcements from the publisher. In today’s modern...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/09/a-short-guide-to-the-jungle-of-microsoft-365-security-and-compliance-licensing-part-2/">A &#8220;SHORT&#8221; GUIDE TO THE JUNGLE OF MICROSOFT 365 SECURITY AND COMPLIANCE LICENSING &#8211; PART 2</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Who hasn’t already felt lost looking for information on Office 365 licensing? In this article, I will help you decipher the existing plans, as well as provide a few tips and reminders on recent announcements from the publisher.</p>
<p>In today’s <em>modern workplace</em>, it is essential for security and compliance teams to know the native capabilities of collaboration and communication platforms. This knowledge will enable them to <strong>define a coherent strategy that takes into account data protection needs as well as regulations, the urbanization of the information system and the unavoidable subject of user experience.</strong></p>
<p>For companies  using the highest licensing plan, Microsoft 365 E5, there is no problem: all functionalities are available. For others, the subject is much more complex.</p>
<p><em>This article is oriented for companies with more than 300 employees. For other organizations (education, associations, small and medium enterprises) the license plans are slightly different, but the information below is still applicable for most of them.</em></p>
<p>Part 1 of this article is <a href="https://www.riskinsight-wavestone.com/en/2020/08/a-short-guide-to-the-jungle-of-microsoft-365-security-and-compliance-licensing-part-1/">available here</a>.</p>
<p>&nbsp;</p>
<h2>2/ Appropriating the licensing logic</h2>
<p>For those unfamiliar with Microsoft <em>licensing</em>, there are three principles governing the allocation of licenses according to the population concerned:</p>
<ul>
<li><span style="text-decoration: underline;">An internal user</span> of a service or benefiting indirectly from the product (e.g. dynamic group, classification of a SharePoint site, sharing of Power BI dashboards) must have the required license;</li>
<li>Most <span style="text-decoration: underline;">administration roles</span> require the license of the managed service to access the administration portal or associated PowerShell commands;</li>
<li><span style="text-decoration: underline;">External users</span> or guest users <a href="https://docs.microsoft.com/en-us/sharepoint/external-sharing-overview">do not need a specific license</a> to collaborate on Office 365 content. This is made possible by the free capabilities of Azure AD. However, if a guest user is subject to Azure AD Premium features (P1 or P2), a <a href="https://docs.microsoft.com/en-us/azure/active-directory/external-identities/licensing-guidance">sufficient number of licenses must be available</a> (1 license purchased for 5 guest users).</li>
</ul>
<p>Licenses are nominative and are per user and per month.</p>
<p>Please note that the same product may be available with <strong>more or less advanced functionalities depending on the level of licenses chosen</strong>. A recurrent example concerns the unified audit logs: these logs are kept for 90 days with Office E1 or E3 licenses, whereas with Office E5 licenses the duration is 365 days.</p>
<p>&nbsp;</p>
<h2>3/ Unlocking the mystery of licensing plans</h2>
<p>As a reminder, the Microsoft licensing model consists of the following elements:</p>
<ul>
<li><strong>Licensing plan</strong>: A plan that defines the services available to the publisher in the tenant. Most of the time, a license plan will be a collaborative bundle (Office 365), a security bundle (EMS) or a package (Microsoft 365);</li>
<li><strong>License</strong>: To be considered as active, and thus be able to connect to the holder, a user must at least have a;</li>
<li><strong>Service</strong>: A service is a Microsoft 365 product, feature or capability that requires a license. This license can come from several different license plans: for example Office 365 E1 provides SharePoint Online Plan 1 while Ofice 365 E3 and E5 provide SharePoint Online Plan 2;</li>
<li><strong>SKU</strong>: In Microsoft language, this term from inventory management refers to the implementation of a license that can be assigned to a user.</li>
</ul>
<p>&nbsp;</p>
<h3>Office 365 collaborative bundles: natively included data protection and compliance capabilities</h3>
<p>Collaborative licensing plans, also known as Office 365 bundles, are the basis of Microsoft 365 licensing. These plans natively incorporate increasing compliance features. Security options, however, are quite limited and must be purchased independently.</p>
<p>The first plan is <strong>Office 365 E1</strong>. This plan integrates all office automation services in web mode only. The compliance and security products are the bare minimum of what can be expected from an enterprise SaaS service today: Security Defaults (basic MFA), Audit Logs, Content Search and Retention Tags.</p>
<p><strong>Office 365 E3</strong> adds the thick clients of the Office Suite (now called Microsoft 365 Apps), as well as data protection features (Information Protection for Office 365 and Office DLP), Core eDiscovery and default retention policies. This licensing plan is the preferred licensing plan for standard users in today&#8217;s enterprises.</p>
<p>Finally, <strong>Office 365 E5</strong> is designed for special office populations with telephony, Power BI Pro and statistics on the use of the Office 365 suite. It also integrates automatic classification (outside machine learning), compliance options for populations subject to regulations (Records Management, Customer Key, Customer Lockbox, Information Barriers, Communications Compliance) and advanced investigation options (Advanced eDiscovery and Data Investigations), as well as Office ATP and Office CAS.</p>
<p>Two important points to note:</p>
<ul>
<li>Office DLP and AIP P1 can be purchased as additional licenses for Office E1 users, in order to have data protection features similar to Office E3;</li>
<li>The Multi-Geo option is an additional license, regardless of the license plan chosen.</li>
</ul>
<p>&nbsp;</p>
<h3>Security bundles: additional security features</h3>
<p>Introduced in 2014, the EMS security bundle (Enterprise Mobility Suite, then Enterprise Mobility + Security) integrates various security products. These products are designed to control identities, mobile devices and applications accessing Office 365 data.</p>
<ul>
<li><strong>EMS E3</strong>: Intune, Azure AD P1, AIP 1, Advanced Threat Analytics;</li>
<li><strong>EMS E5</strong>: Azure AD P2, AIP P2, Azure ATP and Microsoft Cloud App Security.</li>
</ul>
<p>Today, EMS E3 is a must-have for organizations that choose to go with a &#8220;Full Microsoft&#8221; strategy. Intune and Azure AD P1 provide a consistent strategy for managing access to the Office 365 platform. On the other hand, few organizations have chosen to generalize EMS E5, a bundle rather oriented for sensitive populations or administrators, due to a lack of consistency between the different security products included.</p>
<p>&nbsp;</p>
<h3>Microsoft 365 packages: a complete but expensive offer</h3>
<p>Announced in 2017, Microsoft 365 is now the flagship product of the Redmond-based publisher. This licensing plan combines the functionalities of Office 365, the EMS suite and Windows 10:</p>
<ul>
<li><strong>Microsoft 365 E3</strong> = Office 365 E3 + EMS E3 + Windows 10 E3;</li>
<li><strong>Microsoft 365 E5</strong> = Office 365 E5 + EMS E5 + Windows 10 E5.</li>
</ul>
<p>Contrary to popular belief, and despite the various name changes introduced in 2020 (Office 365 Groups to Microsoft 365 Groups, Office Pro Plus to Microsoft 365 Apps), the Office 365 brand has not disappeared.</p>
<p>We should note that <strong>Microsoft 365 E5 is the only office automation subscription that includes Trainable Classifiers</strong> (classification via Machine Learning), <strong>Insider Risk Management or Safe Documents</strong> (extension of Windows Defender ATP to scan open documents in protected mode).</p>
<p>&nbsp;</p>
<h3>Microsoft 365 E5 Compliance and Security: A Turning Point in Security and Compliance License Management</h3>
<p>Microsoft 365 E5 Compliance and Microsoft 365 Security were introduced in early 2020 to simplify security and compliance licensing by grouping products under consistent licensing plans. This was good news, as the situation between EMS products and legacy compliance products (e.g. Advanced Data Governance and Advanced Data Compliance) had become increasingly complex</p>
<p><strong>Microsoft 365 E5 Compliance</strong> combines the full range of information protection, governance and investigation capabilities. Depending on requirements, three sub-bundles can be considered:</p>
<ul>
<li><strong>Microsoft 365 E5 Information Protection &amp; Governance</strong>: AIP P2, Microsoft Cloud App Security, Advanced Retention Policies, Records Management, Advanced Office DLP and Advanced OME, Customer Key and Trainable Classifiers;</li>
<li><strong>Microsoft 365 E5 Insider Risk Management</strong>: Insider Risk Management, Communications Compliance, Information Barriers, Customer Lockbox and PAM;</li>
<li><strong>Microsoft 365 E5</strong> <strong>eDiscovery &amp; Audit</strong>: Advanced eDiscovery, Advanced Auditing and Data Investigations.</li>
</ul>
<p>Officially presented as extensions to Microsoft 365 E3, the documentation suggests that the licensing requirements would be lower. The Information Protection &amp; Governance extension would &#8220;only&#8221; require AIP P1 and Plans 2 for Exchange Online and SharePoint Online (i.e. Office 365 E3).</p>
<p><strong>Microsoft 365 E5 Security</strong> combines Azure AD P2, the Advanced Threat Protection suite (Azure ATP, Office ATP, Windows Defender ATP) and Cloud App Security. This bundle will be interesting for organizations that are not large enough to manage many security tools (MFA, EDR, AD Monitoring, Mail Gateway, CASB).</p>
<div class="slate-resizable-image-embed slate-image-embed__resize-full-width"><img decoding="async" src="https://media-exp1.licdn.com/dms/image/C4E12AQFxLmQqT3wTLA/article-inline_image-shrink_1000_1488/0?e=1604534400&amp;v=beta&amp;t=L1UU6tiw24hoSoxQkhEfITRhltg42kgkrhyrcurkGl0" alt="Aucun texte alternatif pour cette image" data-media-urn="" data-li-src="https://media-exp1.licdn.com/dms/image/C4E12AQFxLmQqT3wTLA/article-inline_image-shrink_1000_1488/0?e=1604534400&amp;v=beta&amp;t=L1UU6tiw24hoSoxQkhEfITRhltg42kgkrhyrcurkGl0" /></div>
<h3></h3>
<h3><em>Firstline Workers </em>focus</h3>
<p>The Office 365 F3 and Microsoft 365 F1 and F3 licensing plans are intended for <a href="https://www.microsoft.com/en-us/licensing/news/m365-firstline-workers" target="_blank" rel="nofollow noopener noreferrer">Firstline Workers</a>:</p>
<ul>
<li><strong>Microsoft 365 F1 </strong>is a licensing plan that includes EMS E3, Teams and SharePoint (content sharing and consumption only);</li>
<li><strong>Microsoft 365 F3</strong> combines EMS E3, Windows 10 E3 and Office 365 F3;</li>
<li><strong>Office 365 F3 </strong>is a lighter version of Office 365 E1, with similar functionality (mainly Exchange, SharePoint, OneDrive, Teams and Power Platform) but much more limited storage for OneDrive and Exchange.</li>
</ul>
<p>Microsoft defines this population as “users without a dedicated terminal, with occasional use.” Concretely, a dedicated terminal is a computer equipment with a screen of more than 10.1 inches, used by an employee for more than 60% of his working time. Examples can be medical populations, salespeople in a store, or workers in a factory.</p>
<p>Therefore, Fx licenses cannot be used to optimize licensing costs for populations with no advanced needs.</p>
<p>&nbsp;</p>
<h2>4/ Getting the right tools to find relevant information</h2>
<p>There is no official roadmap that makes it easy to find one’s way between products and license levels (E1, E3, E5, F1, F3, etc.), and it seems that everything is done to steer companies towards the most expensive licenses. Therefore, it is not surprising to see companies specializing in the very specific Microsoft <em>licensing</em> segment (optimization consulting or management solution publishers).</p>
<p>&nbsp;</p>
<h3>How to find out what exists (official sources)</h3>
<p>For licenses related to compliance and security products, the most comprehensive reference is the documentation &#8220;<a href="https://docs.microsoft.com/en-us/office365/servicedescriptions/microsoft-365-service-descriptions/microsoft-365-tenantlevel-services-licensing-guidance/microsoft-365-security-compliance-licensing-guidance">Microsoft 365 Compliance &amp; Security Licensing Guidance</a>&#8220;. Unfortunately, this official documentation is not exhaustive. For example, it is missing:</p>
<ul>
<li>Products concerned by private or public pre-versions. For example, the new Endpoint DLP requires a Microsoft 365 E5 Compliance or Microsoft 365 E5 Information Protection &amp; Governance license;</li>
<li>Details about some compliance products. For example, Office DLP is available with an additional license;</li>
<li>Information related to Azure Active Directory Premium P1 or P2 features and information related to Intune.</li>
</ul>
<p>Note that a <strong>fairly complete table</strong>, available in .pdf and .xlsx, provides a <strong>cross-reference of use cases and compliance licenses</strong>. Beware, this table can be scary!</p>
<p>There is not yet an equivalent official summary for security licenses. Product documentation (e.g. <a href="https://docs.microsoft.com/en-us/mem/intune/fundamentals/licenses">Intune</a>) and licensing information pages (e.g. <a href="https://azure.microsoft.com/en-us/pricing/details/active-directory/">Azure Active Directory</a>) remain the best sources of information.</p>
<p>Important point: most official sources specify that they do not constitute a sufficient contractual commitment. Only an exchange with the Microsoft TAM will confirm the availability of a specific license and the associated price.</p>
<p>&nbsp;</p>
<h3>How to find out what exists (unofficial sources)</h3>
<p>Apart from the official documentation, I use two rather interesting sources when talking about Microsoft 365 licensing:</p>
<ul>
<li><a href="https://github.com/AaronDinnage/Licensing">Unofficial mapping of Microsoft 365 products</a>, by Aaron Dinnage (Microsoft): this is the most complete document available on the subject;</li>
<li><a href="https://www.infusedinnovations.com/blog/secure-modern-workplace/complete-office-365-and-microsoft-365-licensing-comparison">Details and public pricing</a> (in dollars) of the various Microsoft 365 licensing plans, by Dan Chemistruck (Infused Innovation).</li>
</ul>
<p>&nbsp;</p>
<h3>How to find out what&#8217;s available in the holder</h3>
<p>There are three possibilities to master the licenses (unit licenses, bundles, or packages) and products acquired in an Office 365 holder.</p>
<p>The first and simplest is simply to use the <strong>information available in the Office 365 or Azure administration portals</strong>. However, these portals only offer basic functionalities: no actions for a large number of users, a global dashboard (licenses acquired, used and non-compliant) without granularity by country or entity, etc.</p>
<p>The second option is to acquire a <strong>license management or optimization tool</strong> (e.g., ManageEngine, QuadroTech, CoreView). This type of solution is more suited to SMBs than large corporations, which prefer the third option because of economies of scale.</p>
<p>The last option is to develop a licensing tool (based on PowerShell scripts and Microsoft Graph APIs) and a dashboard (usually on Power BI). This choice will make it possible not only to overcome the limitations of native tools, but also to delegate the control of licenses to the various IT localities in a decentralized context.</p>
<p>&nbsp;</p>
<h3>Focus on development: how to find your way among the names</h3>
<p>The development itself is not particularly complex. On the other hand, a common problem appears very quickly – the names of the services obtained by PowerShell and Graph API are simply incomprehensible. These names often come from buyouts or internal Microsoft project names (e.g. ADALLOM for MCAS, RIGHTSMANAGEMENT for AIP P1 or SPE_E3 for Microsoft 365 E3).</p>
<p>By experience, it is then <strong>essential to keep an up-to-date list of correspondences between the SKU names obtained by scripting and the official names</strong>:</p>
<p>&#8211;        The <a href="https://docs.microsoft.com/en-us/azure/active-directory/users-groups-roles/licensing-service-plan-reference">official Microsoft list</a> is unfortunately far from being exhaustive and is not regularly updated;</p>
<p>&#8211;        Several unofficial lists are maintained and available on the Internet.</p>
<p>&nbsp;</p>
<h2>5/ Seven tips to define your security and compliance licensing strategy</h2>
<div class="slate-resizable-image-embed slate-image-embed__resize-full-width">
<figure id="post-14171 media-14171" class="align-center"><img loading="lazy" decoding="async" class="aligncenter wp-image-14171 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/09/O365_licensing-e1599137374839.png" alt="" width="945" height="406" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/09/O365_licensing-e1599137374839.png 945w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/09/O365_licensing-e1599137374839-437x188.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/09/O365_licensing-e1599137374839-71x31.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/09/O365_licensing-e1599137374839-768x330.png 768w" sizes="auto, (max-width: 945px) 100vw, 945px" /></figure>
</div>
<ol>
<li><strong>Identify your needs</strong> in terms of security (identity, threats, terminals, etc.) and compliance (data protection, regulatory compliance, etc.) for Office 365;</li>
<li><strong>Formalize an inventory</strong> of all the security and compliance tools related to the Digital Workplace available in the enterprise (including mail gateway, EDR, classification, DLP, etc.);</li>
<li><strong>Formalize a roadmap for security and compliance tools</strong>, consistent with the modern workplace (rationalization, native security without agents, zero trust);</li>
<li><strong>Define a licensing model with different user profiles</strong>, in conjunction with the architectural and workplace teams. It can be interesting to favor bundles by considering medium- and long-term needs. The acquisition of unit licenses (or add-on) without global negotiation would be expensive;</li>
<li><strong>Anticipate product targeting capabilities</strong>. Some products (such as the functionalities of Azure Active Directory or MCAS) are difficult to adapt to a complicated licensing model in an international multi-entity context;</li>
<li><strong>Activate what is available on opportunity</strong> in the acquired bundles, avoiding duplication with existing tools in order to not interfere with the signals;</li>
<li><strong>Keep watch</strong>. The functionalities associated with a license may evolve as a result of a development or purchase of a third-party solution. In some instances, although very rare,Microsoft will embed premium features in basic plans. The message center of the administration portal and the <a href="https://techcommunity.microsoft.com/t5/microsoft-security-and/ct-p/MicrosoftSecurityandCompliance">Security and Compliance blogs</a> are indispensable here.</li>
</ol>
<p>&nbsp;</p>
<p>To go further, find in this article the <a href="https://www.riskinsight-wavestone.com/en/2020/07/how-to-migrate-your-work-environment-serenely-to-office-365/">different subjects to be dealt with during the preparation of the Microsoft 365 adventure</a>.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/09/a-short-guide-to-the-jungle-of-microsoft-365-security-and-compliance-licensing-part-2/">A &#8220;SHORT&#8221; GUIDE TO THE JUNGLE OF MICROSOFT 365 SECURITY AND COMPLIANCE LICENSING &#8211; PART 2</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>&#8220;Security Twins&#8221;: A new security &#038; trust guarantee for connected devices (2/2)</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/08/security-twins-a-new-security-trust-guarantee-for-connected-devices-2-2-2/</link>
		
		<dc:creator><![CDATA[Raquel De Faria Cristas]]></dc:creator>
		<pubDate>Fri, 28 Aug 2020 13:07:38 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[IoT & Consumer goods]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[Jitsuin]]></category>
		<category><![CDATA[POC]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Smart House]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=14147</guid>

					<description><![CDATA[<p>In a previous article, we discovered how &#8220;Security Twins&#8221; could improve the security and trust of connected devices. In this new article we will now look at how the “Security Twins” can improve the security of physical accesses to a building...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/08/security-twins-a-new-security-trust-guarantee-for-connected-devices-2-2-2/">&#8220;Security Twins&#8221;: A new security &#038; trust guarantee for connected devices (2/2)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="text-align: justify;">In a <a href="https://www.riskinsight-wavestone.com/en/2020/07/security-twins-a-new-security-trust-guarantee-for-connected-devices-2-2/">previous article</a>, we discovered how &#8220;Security Twins&#8221; could improve the security and trust of connected devices. In this new article we will now look at how the “Security Twins” can improve the security of physical accesses to a building through a PoC made by Wavestone in collaboration with the start-up Jitsuin using their tool: “Jitsuin Archivist”.</p>
<p>&nbsp;</p>
<h2>What does “Jitsuin Archivist” look like?</h2>
<p style="text-align: justify;">The start-up Jitsuin has developed a tool called &#8220;Jitsuin Archivist&#8221; based on Distributed Ledger Technology (DLT). The purpose of this tool is to know &#8220;Who did what to a Thing and When”.</p>
<p style="text-align: justify;">As of today, 5 types of users can interact with the tool: Archivist Administrator, System Administrator, Maintenance Operator, Auditor, Custom (currently in beta version).</p>
<p>&nbsp;</p>
<figure id="post-14148 media-14148" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-14148 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/1.png" alt="" width="1277" height="275" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/1.png 1277w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/1-437x94.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/1-71x15.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/1-768x165.png 768w" sizes="auto, (max-width: 1277px) 100vw, 1277px" /></figure>
<p style="text-align: center;">Figure 1 – The 5 user roles of “Jitsuin Archivist”</p>
<p>&nbsp;</p>
<p style="text-align: justify;">On this tool the user has access to the &#8220;Security Twins&#8221; of the connected devices. Indeed, after logging in, the user accesses a dashboard through which he has a global view of all the connected devices linked to the tool. He can see relevant statistics related to his IoT deployment, such as the number of critical incidents, the activity of connected objects, etc.</p>
<p style="text-align: justify;">The user can also access the &#8220;Manage Assets&#8221; page where he will find a map with the location of all the connected objects linked to the tool and a list of them (where he can also see in more detail the events linked to a particular connected device).</p>
<p>&nbsp;</p>
<figure id="post-14150 media-14150" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-14150 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/2.png" alt="" width="1339" height="653" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/2.png 1339w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/2-392x191.png 392w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/2-71x35.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/2-768x375.png 768w" sizes="auto, (max-width: 1339px) 100vw, 1339px" /></figure>
<p style="text-align: center;">Figure 2 &#8211; The different views of the tool &#8220;Jitsuin Archivist&#8221;: 1. dashboard with a global view, 2. all the objects and their location, 3. detailed view of an object, 4. all the actions of the object useful during security audits</p>
<p>&nbsp;</p>
<h2>The PoC: A House with a digital lock</h2>
<p style="text-align: justify;">Wavestone used Jitsuin&#8217;s tool to first address the issue of identity and access management in buildings in at the dawn of digital transformation and the to illustrate the usefulness of &#8220;Security Twins&#8221;.</p>
<p style="text-align: justify;">To do this Wavestone used the lego house &#8220;SmartHouse&#8221; :</p>
<p>&nbsp;</p>
<figure id="post-14152 media-14152" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-14152 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/3.jpg" alt="" width="1085" height="955" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/3.jpg 1085w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/3-217x191.jpg 217w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/3-44x39.jpg 44w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/3-768x676.jpg 768w" sizes="auto, (max-width: 1085px) 100vw, 1085px" /></figure>
<p style="text-align: center;">Figure 3 – The “SmartHouse”</p>
<p>&nbsp;</p>
<p style="text-align: justify;">Equipped with an RFID card reader, a Raspberry Pi microcontroller and a servomotor, the entrance door of the &#8220;SmartHouse&#8221; only opens to users who have an authorized access card. All actions related to opening, closing, granting of entry rights, etc. are recorded on &#8220;Jitsuin Archivist&#8221; (see figure 4).</p>
<p>&nbsp;</p>
<figure id="post-14154 media-14154" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-14154 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/4.png" alt="" width="1037" height="474" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/4.png 1037w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/4-418x191.png 418w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/4-71x32.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/4-768x351.png 768w" sizes="auto, (max-width: 1037px) 100vw, 1037px" /></figure>
<p style="text-align: center;">Figure 4 – The functional diagram of the “SmartHouse”</p>
<p>&nbsp;</p>
<p style="text-align: justify;">In order to facilitate the interaction with the digital lock of the “SmartHouse”, a platform allowing the simulation of different operations made by different peopled involved in the life cycle of connected devices has been created using the Django web framework and Bootstrap. This platform allows, among other things, to:</p>
<ul style="text-align: justify;">
<li>Send security patches to the connected lock (using Azure IoTHub)</li>
<li>Assign access rights to the “SmartHouse”</li>
<li>View the history of access rights requests made and those awaiting validation, etc.</li>
</ul>
<p style="text-align: justify;">This is what the platform looks like:</p>
<p>&nbsp;</p>
<figure id="post-14156 media-14156" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-14156 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/5.png" alt="" width="1426" height="729" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/5.png 1426w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/5-374x191.png 374w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/5-71x36.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/5-768x393.png 768w" sizes="auto, (max-width: 1426px) 100vw, 1426px" /></figure>
<p style="text-align: center;">Figure 5 &#8211; SmartHouse&#8217;s management platform</p>
<p>&nbsp;</p>
<p style="text-align: justify;">The use of “Jitsuin Archivist” in this PoC is very interesting when regards to security audits of connected devices. Indeed, as “Jitsuin Archivist” is based on Distributed Ledger Technology (DLT), this system can be considered as &#8220;secure by design&#8221; since an auditor has a technical guarantee on the non-compromise of data (provided that the sending of this data is secure).</p>
<p style="text-align: justify;">Here is the &#8220;Auditor View&#8221; on “Jitsuin Archivist” where it is possible to see all the information regarding the connected devices linked to the platform and to know who has done what to the connected device:</p>
<p>&nbsp;</p>
<figure id="post-14158 media-14158" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-14158 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/6.png" alt="" width="1804" height="884" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/6.png 1804w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/6-390x191.png 390w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/6-71x35.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/6-768x376.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/6-1536x753.png 1536w" sizes="auto, (max-width: 1804px) 100vw, 1804px" /></figure>
<p style="text-align: center;">Figure 6 &#8211; The &#8220;Auditor View&#8221; of “Jitsuin Archivist”</p>
<p>&nbsp;</p>
<h2>The PoC scenario: WaveHouse rents “SmartHouses” in France &#8230;</h2>
<figure id="post-14160 media-14160" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-14160 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/7.png" alt="" width="1246" height="566" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/7.png 1246w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/7-420x191.png 420w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/7-71x32.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/7-768x349.png 768w" sizes="auto, (max-width: 1246px) 100vw, 1246px" /></figure>
<p>Here is the general architecture of the PoC:</p>
<p>&nbsp;</p>
<figure id="post-14162 media-14162" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-14162 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/8.png" alt="" width="1326" height="831" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/8.png 1326w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/8-305x191.png 305w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/8-62x39.png 62w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/8-768x481.png 768w" sizes="auto, (max-width: 1326px) 100vw, 1326px" /></figure>
<p style="text-align: center;">Figure 7 &#8211; The general architecture of the PoC</p>
<p>&nbsp;</p>
<p style="text-align: justify;">As one can see, the digital lock (represented by the RFID card reader, the Raspberry Pi microcontroller and the servomotor) interacts with Azure IoTHub as well to facilitate the management of its firmware updates.</p>
<p>&nbsp;</p>
<h2 style="text-align: justify;">The main use cases studied by Wavestone and Jitsuin</h2>
<p>The main use cases studied by Wavestone and Jitsuin are explained in the video below:</p>
<p><div style="width: 640px;" class="wp-video"><video class="wp-video-shortcode" id="video-14147-1" width="640" height="360" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/video-article-720p-mp4.mp4?_=1" /><a href="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/video-article-720p-mp4.mp4">https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/video-article-720p-mp4.mp4</a></video></div></p>
<p>&nbsp;</p>
<h2>Conclusion</h2>
<p style="text-align: justify;">Wavestone and Jitsuin were able to demonstrate &#8211; with the different use cases illustrated above in the video &#8211; how to improve the security of connected devices:</p>
<ul style="text-align: justify;">
<li>First of all, all of the people involved in the life cycle of the digital lock of the “SmartHouse” had access to its &#8220;Security Twin&#8221;. Indeed, each of them had access to a decentralized and unchangeable register provided by “Jitsuin Archivist” with all the information regarding the security of the digital lock.</li>
<li>Then, as mentioned above, this architecture is &#8220;secure by design&#8221; because as “Jitsuin Archivist” is based on Distributed Ledger Technology (DLT), one has a technical guarantee on the non-compromising of data.</li>
<li>The &#8220;Security Twin&#8221; of the digital lock ensured physical security since it had the rights management information, allowing all the people involved to know who had access to the &#8220;SmartHouse&#8221;.</li>
<li>Finally, since the “Security Twin” also had firmware information, the different people involved could easily know which connected devices had vulnerabilities and quickly plan the distribution of security patches.</li>
</ul>
<p style="text-align: justify;">The &#8220;Security Twins&#8221; would therefore ultimately improve the security of the connected devices, since it would be easy to know which objects are secure and which are not.</p>
<p>&nbsp;</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/08/security-twins-a-new-security-trust-guarantee-for-connected-devices-2-2-2/">&#8220;Security Twins&#8221;: A new security &#038; trust guarantee for connected devices (2/2)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>A &#8220;SHORT&#8221; GUIDE TO THE JUNGLE OF MICROSOFT 365 SECURITY AND COMPLIANCE LICENSING &#8211; PART 1</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/08/a-short-guide-to-the-jungle-of-microsoft-365-security-and-compliance-licensing-part-1/</link>
		
		<dc:creator><![CDATA[GEneviEveLardon]]></dc:creator>
		<pubDate>Wed, 26 Aug 2020 16:00:54 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[Microsoft 365]]></category>
		<category><![CDATA[Office 365]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[services]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=14086</guid>

					<description><![CDATA[<p>Who hasn’t already felt lost looking for information on Office 365 licensing? In this article, I will help you decipher the existing plans, as well as provide a few tips and reminders on recent announcements from the publisher. In today’s modern...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/08/a-short-guide-to-the-jungle-of-microsoft-365-security-and-compliance-licensing-part-1/">A &#8220;SHORT&#8221; GUIDE TO THE JUNGLE OF MICROSOFT 365 SECURITY AND COMPLIANCE LICENSING &#8211; PART 1</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="reader-article-content" dir="ltr">
<p>Who hasn’t already felt lost looking for information on Office 365 licensing? In this article, I will help you decipher the existing plans, as well as provide a few tips and reminders on recent announcements from the publisher.</p>
<p>In today’s <em>modern workplace</em>, it is essential for security and compliance teams to know the native capabilities of collaboration and communication platforms. This knowledge will enable them to <strong>define a coherent strategy that takes into account data protection needs as well as regulations, the urbanization of the information system and the unavoidable subject of user experience.</strong></p>
<p>For companies  using the highest licensing plan, Microsoft 365 E5, there is no problem: all functionalities are available. For others, the subject is much more complex.</p>
<p><em>This article is oriented for companies with more than 300 employees. For other organizations (education, associations, small and medium enterprises) the license plans are slightly different, but the information below is still applicable for most of them.</em></p>
<p>&nbsp;</p>
<h2>1/ Understand the security and compliance services available</h2>
<p>Historically focused on office automation services (with Microsoft Office) and collaboration services (with Exchange and SharePoint on-premise), Microsoft’s offering has evolved strongly <strong>by integrating not only codeless application development services (with the Power Platform), but also security and compliance bricks</strong>.</p>
<p>These can be grouped into seven categories:</p>
<ul>
<li><strong>Security</strong>: Identity and Access Management, Endpoint Management and Threat Management;</li>
<li><strong>Compliance</strong>: Information Protection, Governance, Service Control, and Cloud Control.</li>
</ul>
<figure id="post-14092 media-14092" class="align-none">
<figure id="post-14094 media-14094" class="align-none">
<figure id="post-14094 media-14094" class="align-center"><img loading="lazy" decoding="async" class="aligncenter wp-image-14094" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/O365_licensing.png" alt="" width="846" height="513" data-wp-editing="1" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/O365_licensing.png 1029w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/O365_licensing-315x191.png 315w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/O365_licensing-64x39.png 64w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/O365_licensing-768x465.png 768w" sizes="auto, (max-width: 846px) 100vw, 846px" /></figure>
</figure>
</figure>
<div class="slate-resizable-image-embed slate-image-embed__resize-full-width"></div>
<h3>Identity and access management</h3>
<p><a href="https://docs.microsoft.com/fr-fr/azure/active-directory/fundamentals/active-directory-whatis" target="_blank" rel="nofollow noopener noreferrer">Azure Active Directory</a> is the fundamental building block of Microsoft Cloud Services (Office 365, but also Azure IaaS and PaaS). It is not just a simple domain controller of the on-premises identity source in the Cloud; it is also an IAM service in its own right. Several licensing plans are available for Microsoft 365 use, whose main features are listed below:</p>
<ul>
<li><strong>Azure Active Directory Basic </strong>for Office 365: Single Sign On, Manual Management of Users, Groups and Applications, Endpoint Registration, Security Defaults (basic security policies for users and administrators);</li>
<li><strong>Azure Active Directory Premium Plan 1</strong> (or AAD P1): Azure MFA, Conditional Access, Proxy Application (exposure of on-premise applications on the Internet), Group Lifecycle (expiration, dynamic groups, classification), Advanced Password Protection (Cloud and on-premise), Integration with a third-party MFA or Identity Governance Solution;</li>
<li><strong>Azure Active Directory Premium Plan 2</strong> (or AAD P2): Azure AD Identity Protection (assessment of connections and accounts at risk), Risk-based Conditional Access, Azure PIM (Privileged Account Management with <em>Just-in-Time</em> Access), Access Review, Entitlement Management (assignment of predefined rights on collaboration spaces to internal or external users).</li>
</ul>
<p>Experience has shown that the Azure AD Premium P1 license is now a must for a number of companies. At a minimum, these companies must have the following two features: conditional access and group classification. Azure AD Premium P2 is intended for administrative populations in the first instance.</p>
<p>As a reminder, the functionalities available for adding or modifying objects (groups, users or terminals) vary according to the implementation mode chosen: Identity Federation, Password Hash Sync (PHS) and Pass Through Authentication (PTA).</p>
<p>&nbsp;</p>
<h3>Terminal management</h3>
<p><a href="https://docs.microsoft.com/fr-fr/azure/active-directory/fundamentals/active-directory-whatis" target="_blank" rel="nofollow noopener noreferrer">Intune</a> is the Mobile Device Management (MDM) and Mobile Access Management (MAM) solution offered by Microsoft.</p>
<p>The <strong>Intune MDM</strong> part is historically a mobile device management solution: deployment of applications or certificates on enrolled devices, hardening of parameters, fleet management, etc.</p>
<p>The <strong>Intune MAM</strong> part represents the functionalities that control the data within applications via apps protection policies. MAM can be used even in a BYOD context. It is important to note that third-party MDM solutions can be integrated with Intune MAM to control Microsoft 365 Apps (such as Office for iOS or Android), but the license will still be required to use the SDK’s functionalities.</p>
<p>In the context of modern management, the Intune MDM part of Intune is positioned as an Enpoint Unified Management (or UEM) solution to manage all devices (mobile or not) in a unified way. The ultimate goal is to replace the SCCM tool, also known as Configuration Manager, by positioning itself in direct competition with other MDM solutions already in place within companies.</p>
<p>&nbsp;</p>
<h3>Threat Management</h3>
<p>The <a href="https://docs.microsoft.com/fr-fr/microsoft-365/security/mtp/microsoft-threat-protection?view=o365-worldwide" target="_blank" rel="nofollow noopener noreferrer">Microsoft Threat Protection</a> suite brings together all the advanced threat prevention, detection, investigation and response capabilities of the Microsoft 365 environment: messaging, collaboration spaces, endpoints and identities.</p>
<p>Although the various components of the suite have historically been considered less efficient than other &#8220;pure players&#8221; in their respective segments, they have the undeniable advantage of offering unified management and correlation of indicators. However, this gap has been narrowing over the past two years, with Gartner even recognizing <a href="https://www.microsoft.com/security/blog/2019/12/03/microsoft-security-leader-5-gartner-magic-quadrants/">several components of the ATP Advanced Threat Protection (ATP) suite as leaders in their segments</a> by the end of 2019.</p>
<p>There are three components:</p>
<ul>
<li><strong>Office ATP</strong>: Solution to fight threats related to documents, emails and malicious links. While it is possible to add a third-party email gateway, Office ATP is the only advanced protection option for collaborative spaces (SharePoint, OneDrive and Teams);</li>
<li><strong>Windows Defender ATP</strong>: Redmond publisher&#8217;s BDU solution;</li>
<li><strong>Azure ATP</strong>: Detection and investigation solution against identity compromise, through the analysis of signals from the local Active Directory. Microsoft announced in February that it will <a href="https://techcommunity.microsoft.com/t5/microsoft-security-and/end-of-mainstream-support-for-advanced-threat-analytics-january/ba-p/1539181">end support for the legacy solution</a>, Microsoft Advanced Threat Analytics (ATA), by January 2021.</li>
</ul>
<p>&nbsp;</p>
<h3>Protection of information</h3>
<p>Microsoft has recently grouped all data discovery, classification and protection functionalities under the Microsoft Data Protection Framework: <a href="https://docs.microsoft.com/fr-fr/microsoft-365/compliance/protect-information?view=o365-worldwide" target="_blank" rel="nofollow noopener noreferrer">Microsoft Information Protection</a>.</p>
<p>At the base is the <span style="text-decoration: underline;">engine for identifying sensitive data</span>. Microsoft&#8217;s engine is based on two elements:</p>
<ul>
<li><strong>Sensitive Information Type</strong> (SIT): Predefined regular expressions (e.g. social security number or credit card) combined with keywords, document fingerprints (e.g. patent or form) or keyword dictionaries;</li>
<li><strong>Information Classifiers</strong>: <em>Machine learning</em> algorithms, with predefined or constructed models. Introduced this year and still in pre-version, the classifiers can only be used with Microsoft E5 licenses..</li>
</ul>
<p>The current trend is to <span style="text-decoration: underline;">classify Office 365 data</span> (emails, documents and now Power BI) using <strong>Azure Information Protection</strong> (or AIP). The choice of classification level can be done manually or automatically with the engine presented above. AIP has been gradually integrated into the Office 365 service package, under the name <strong>Information Protection for Office</strong> <strong>365</strong> (or unified classification). Although less necessary today, AIP uses the new solution as well as the non-Office 365 document coverage and classification bar in office applications.</p>
<p>It is also possible to classify a shared space (SharePoint site, Teams or Groups Office 365), but the classification of data and space is still decorrelated.</p>
<p>The actual <span style="text-decoration: underline;">protection of information</span> consists of data encryption and restriction of rights (DRM). Microsoft&#8217;s proprietary protocol is <strong>Azure RMS</strong>, or Rights Management. Keys can be managed by Microsoft, in BYOK or Double Key Encryption (DKE) (HYOK equivalent for Unified Labeling presented in July 2020).</p>
<p>Azure RMS can be applied to data manually or by inheriting the classification level. The implementation may have a different name depending on the use case involved, but the mechanisms are identical:</p>
<ul>
<li><strong>AIP</strong> or <strong>RMS</strong> for documents;</li>
<li><strong>Information Rights Management</strong> (or IRM) for SharePoint: Data downloaded from a list or library inherits protection consistent with the user&#8217;s rights;</li>
<li><strong>Office Message Encryption </strong>(or OME) for electronic messaging.</li>
</ul>
<p>In addition to the above protection, it is also possible to apply <span style="text-decoration: underline;">shared space protection</span> to harden access according to the chosen classification level, e.g. restricting endpoints or guest users.</p>
<p>In addition to the mechanisms attached to the data (the protection remains even when sharing or copying), it is possible to <u>control the distribution of data</u> through the following tools:</p>
<ul>
<li><strong>Office DLP</strong>: control of the distribution of e-mails and documents;</li>
<li><strong>Communications DLP</strong>: instant messaging control;</li>
<li><strong>Cloud App Security</strong>: Extension of Office DLP capabilities to integrated SaaS applications;</li>
<li><strong>Windows Information Protection: </strong>equivalent of Intune MAM for Windows 10, aimed at separating business data from personal data;</li>
<li><strong>Windows Endpoint DLP</strong>: new DLP solution for Windows 10 presented in July 2020.</li>
</ul>
<p>Finally, a <span style="text-decoration: underline;">discovery of the information</span> can be made afterwards to locate and correct the level of protection if necessary. Again, a different solution must be used depending on the use case:</p>
<ul>
<li><strong>AIP Scanner</strong>: search and classification of data on on-premises directories;</li>
<li><strong>Cloud App Security</strong>: search and classification of data on Cloud spaces;</li>
<li><strong>Windows Defender ATP</strong>: search and classification of data on Windows 10;</li>
<li><strong>eDiscovery</strong>: Cloud data search (by hijacking the original functionality).</li>
</ul>
<p>The <a href="https://docs.microsoft.com/fr-fr/information-protection/develop/overview" target="_blank" rel="nofollow noopener noreferrer">SDK Microsoft Information Protection</a> can be used by third-party applications to apply classification or protection to data, or simply consume protected data.</p>
<p>As you can see, there are a number of tools with different names to protect organizations&#8217; data. The important thing to remember is that users will only be directly confronted with classification and protection.</p>
<p>&nbsp;</p>
<h3>Governance</h3>
<p>The year 2020 may be selected as the year of compliance for Office 365. Microsoft has reorganized existing products and introduced new ones to address various HR and regulatory risks. All these products are grouped together in the new <strong>Compliance Center</strong>, which replaces the equivalent part in the Security &amp; Compliance Center.</p>
<p>The first group of these products is related to information retention. <strong>Retention policies</strong> (retention, legal registration, deletion, etc.) are defined via retention labels applied to a piece of data or a shared space. Labeling can be done manually, by default on containers (e.g. user mailboxes or SharePoint sites), or automatically, in the same way as privacy labels.</p>
<p>The products related to traceability and audit of the holder are then found. By design, the <strong>Unified audit logs</strong> can trace the actions of users or administrators. These logs, although very complete, are not exhaustive and are regularly completed. In order to increase the 90-day retention period of the unified logs, last year Microsoft introduced <strong>Advanced auditing</strong>, which offers a retention period of up to one year and more complete logs (such as all accesses to a mailbox).</p>
<p>In addition to logging, four products offer investigation possibilities:</p>
<ul>
<li><strong>Core eDiscovery</strong> allows to extract content according to a query (e.g.: messages sent by a user containing this or that information);</li>
<li><strong>Advanced eDiscovery</strong> is an advanced feature to filter the most relevant content and provide visualization possibilities on the results;</li>
<li><strong>Microsoft Data Investigations</strong>,still in pre-version, is a clone of Advanced eDiscovery allowing to trace the context that may have led to a data leak;</li>
<li><strong>Data Subject Request</strong>was introduced when the GDPR came into force, in order to identify and export data related to a natural person. Again, this is a clone of Core eDiscovery, which can be searched in this context.</li>
</ul>
<p>Note that the eDiscovery functionalities of Exchange Online (Hold, search, etc.) will gradually be phased out in favor of those of the Compliance Center.</p>
<p>Finally, Microsoft recently presented a whole <a href="https://docs.microsoft.com/en-us/microsoft-365/compliance/insider-risk-management?view=o365-worldwide">range of products to combat internal risks</a> (insider trading, data leakage by users on departure, discrimination, illegitimate access to data, etc.). In concrete terms, these products are designed to implement and automate existing principles in organizations&#8217; existing HR, legal and business policies:</p>
<ul>
<li><strong>Insider Risk Management</strong> is a feature to raise alerts in case of suspicious actions performed by an internal user (e.g. massive downloads performed by a user on departure, breach of security policy). The product is centered around the following axes: alert, investigation, automatic or manual remediation;</li>
<li><strong>Information Barriers</strong> allows to regulate exchanges (OneDrive, SharePoint and Teams) between internal persons, in order to technically force bans on content exchanges between entities due to regulatory requirements;</li>
<li><strong>Communications Compliance</strong> extends Office DLP&#8217;s functionality by enabling alerts when inadequate communication is detected (Teams, Mail or Yammer), such as regulatory non-compliance, non-compliance with an internal policy (e.g. harassment) or exchanges around a specific project;</li>
<li><strong>Privileged Access Management</strong> (PAM) is Azure PIM&#8217;s counterpart for operational administrative tasks. In order to perform a task, a person will have to request a privilege elevation for a defined perimeter and time;</li>
<li><strong>Customer Lockbox</strong> : is the name of the internal Microsoft process that allows a support person to access data within an organization. Customer Lockbox adds a validation step by the customer in question. In practice, this product ensures that a Microsoft employee does not inadvertently modify data, but does not protect against <a href="https://docs.microsoft.com/en-us/microsoft-365/compliance/customer-lockbox-requests?view=o365-worldwide#frequently-asked-questions">government requests</a>. On the latter subject, Microsoft <a href="https://www.microsoft.com/en-us/corporate-responsibility/law-enforcement-requests-report?rtc=1">regularly publishes statistics</a>.</li>
</ul>
<p>Most of these products are still in pre-version. There is still very little feedback from the field on these solutions, which are expected to become more mature.</p>
<p>&nbsp;</p>
<h3>Control of services</h3>
<p>In addition to the products described in the previous chapter, Microsoft provides organizations with two additional tools to comply with local regulations.</p>
<p>First, <strong>Customer Key</strong> allows an organization to add an overlay of encryption at the application level (Exchange Online, OneDrive, SharePoint Online and Teams), that manages the lifecycle of the keys used. This overlay is in addition to the encryption applied by construction to data at rest on Microsoft servers. However, be careful not to lose the keys, which would lead to a total loss of data.</p>
<p>Secondly, <strong>Multi-geo</strong>&#8216;s functionalities ensure that data is kept at rest in a given geographical area. The challenge with this functionality is to be able to differentiate between personal and shared spaces according to the target location.</p>
<p>&nbsp;</p>
<h3>Mastering the Cloud</h3>
<p>With <a href="https://docs.microsoft.com/fr-fr/cloud-app-security/what-is-cloud-app-security" target="_blank" rel="nofollow noopener noreferrer">Cloud App Security</a>, Microsoft has its Cloud Access Security Broker (CASB): fighting against Shadow IT (using the APIs of supervised solutions or SaaS applications not managed via proxy log analysis), Data Protection, Detection of abnormal behavior and Analysis of SaaS application compliance.</p>
<p>Again, three levels of functionality are available:</p>
<ul>
<li><strong>Cloud App Discovery</strong>: Accessible with Azure AD P1, this level allows you to take advantage of Shadow IT;</li>
<li><strong>Office 365 Cloud App Security</strong>: Accessible with an Office E5 license, this is an intermediate level allowing you to benefit from degraded functionalities limited to Office 365;</li>
<li><strong>Microsoft Cloud App Security</strong>: Highest level of CASB functionality.</li>
</ul>
<p>It is important to remember here that Azure AD P1 will be required if one wishes to implement conditional access policies for connected applications (including Office 365).</p>
<p>With the Governance features presented above, Cloud App Security is the least exploited brick today, mainly due to the excessively high level of licensing.</p>
<p>&nbsp;</p>
<p>Find the rest of this writing in the article &#8220;A short guide to find your way through the jungle of Microsoft 365 security and compliance licenses &#8211; Part 2&#8221;.</p>
</div>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/08/a-short-guide-to-the-jungle-of-microsoft-365-security-and-compliance-licensing-part-1/">A &#8220;SHORT&#8221; GUIDE TO THE JUNGLE OF MICROSOFT 365 SECURITY AND COMPLIANCE LICENSING &#8211; PART 1</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
