Mainframe Cybersecurity & Compliance

 View Only

  • 1.  Support for Privilege Escalation Detection

    Broadcom Employee
    Posted May 16, 2024 02:49 PM

    Privilege escalation detection lets you identify vendors and malicious actors that may be modifying strategic ACEE areas, logonid record fields (LIDREC), and TOKEN fields in the resource and user security token, to gain access to resources. ACF2 supports a new field in the GSO OPTS record. The new field, PRIVESC|NOPRIVSC, detects ACEE, LIDREC, and TOKEN field modifications during RACROUTE REQUEST=AUTH calls. Implementing the GSO OPTS record PRIVESC field lets you validate ACEE integrity by analyzing where modifications occurred and whether modifications are expected. Validation helps you ensure that ACEE modifications comply with the security policies of your organization and do not introduce unnecessary risk. For more information, see Define Privilege Escalation Detection and ACF2 Option Specifications (OPTS) and messages CAS2710ICAS2711ICAS27121ICAS2713I, and CAS2714I.



    ------------------------------
    Laura Fletcher
    Principal Technical Writer
    Broadcom
    Illinois
    ------------------------------

    #ACF2


  • 2.  RE: Support for Privilege Escalation Detection

    Posted Sep 01, 2024 08:15 PM
    Edited by Jason McClellan Sep 02, 2024 07:21 PM

    Hello,

    The PRIVESC field in the GSO OPTS record provides a powerful mechanism for detecting privilege escalation attempts in ACF2. By analyzing modifications to ACEE, LIDREC, and TOKEN KY fields during RACROUTE REQUEST=AUTH calls, you can identify potential security breaches and ensure compliance with your organization's security policies. This feature is particularly valuable in environments where there is a high risk of unauthorized access or malicious activity.