APF Authorization
First, the most dangerous to our clients, allowing detection warnings to be made. Getting APF authorized essentially allows you to become the system, or operate in ring zero.
Finding mainframe security experts is a challenge. As a result, mainframes are often passed over during security reviews, which increases the security risk to your business-critical infrastructure. NetSPI’s mainframe penetration testing is led by the world’s leading experts who bring valuable insight into your LPAR security, provide actionable guidance on how to improve your mainframe security, and help you meet compliance requirements.
NetSPI’s mainframe penetration testing provides valuable insight into your LPAR security, with actionable guidance on how to improve your mainframe security and help meet compliance requirements. Our process simulates advanced adversarial attacks and emulates threats that exist today against your mainframe environment.
NetSPI dives deep into both your CICS region and application layers to identify potential vulnerabilities. This comprehensive CICS testing approach goes well beyond individual risk assessments to bridge visibility gaps often overlooked when different teams manage each layer.
NetSPI is positioned as the industry leader in mainframe pentesting because of our team’s unmatched experience and expertise. Led by Philip Young, with over 15 years providing mainframe testing and advisory services at Fortune 500 giants such as Visa and Wells Fargo. A few highlights of the team include, but are not limited to:
Certifications / Experience:
Presentations at Global Conferences:
Developed open source mainframe tools:
Philip Young
Director Mainframe Penetration Testing
David Bryan
Principal overseeing z/OS and IBMi Penetration Testing
Michelle Eggers
CICS Application Security Expert
NetSPI’s Mainframe Team
Michelle, David, Philip at SHARE
First, the most dangerous to our clients, allowing detection warnings to be made. Getting APF authorized essentially allows you to become the system, or operate in ring zero.
Simple misconfigurations could lead to an entire system compromise. We look at all the running services and their configurations to ensure they’re closed to the most common misconfiguration gaps we encounter.
Weak ESM configurations raise major red flags if they’re considered to be insecure. This can lead to passwords being stored with DES (dez), not triple DES, single DES.
Update access to any APF authorized libraries is a critical vulnerability, but update access to configuration files / folders, in Unix could also allow for privilege escalation.
Insecure protocols like regular FTP, Basic Auth over HTTP, Telnet, unencrypted TN3270. Every service on the mainframe supports TLS encryption, but many don’t turn it on, making stealing credentials over the network trivial.
TN3270 Field Testing checks the hidden or locked fields in CICS / IMS applications. We define applications as vulnerable if hidden fields contain sensitive information (SSN #s) , or if a modification to a field that is locked carries through to other screens.
Executive & Technical Blogs written by NetSPI’s Mainframe Security Experts