Skip to Main Content
IBM Z Hardware and Operating Systems Ideas Portal


This is the public portal for all IBM Z Hardware and Operating System related offerings. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).


Shape the future of IBM!

We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:

Search existing ideas

Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updates on them if they matter to you. If you can't find what you are looking for,

Post your ideas
  1. Post an idea.

  2. Get feedback from the IBM team and other customers to refine your idea.

  3. Follow the idea through the IBM Ideas process.


Specific links you will want to bookmark for future use

Welcome to the IBM Ideas Portal (https://www.ibm.com/ideas) - Use this site to find out additional information and details about the IBM Ideas process and statuses.

IBM Unified Ideas Portal (https://ideas.ibm.com) - Use this site to view all of your ideas, create new ideas for any IBM product, or search for ideas across all of IBM.

ideasibm@us.ibm.com - Use this email to suggest enhancements to the Ideas process or request help from IBM for submitting your Ideas.

Status Not under consideration
Workspace z/OS
Created by Guest
Created on Mar 10, 2017

mainframe vulnerability patch or ptf level equivalent information

Over the past years, there have been a regular discussion with our internal auditors about the state (and value) of a vulnerability test for the mainframe.

With each audit, the internal auditors have elevated their assessments deeper and deeper into the controls that exist with the z/OS architecture; and with some context, their requests attempts to align what exist in the distributed world that is of

In the last internal audit, there was a finding by the internal auditors that there is a lack of vulnerability test for the mainframe platform. More specifically, the auditors are looking for an independent validation to assess, test and validate that the mainframe z/OS infrastructure (and likely, in the future, the other infrastructure technology products like IMS, CICS, MQ, DB2, WAS/z) have the correct level of patch maintenance as well as a version that is supported by the vendor. From a patch maintenance perspective, the audit's requirements was to ensure that any security vulnerability patches have been applied. The internal auditors are fully aware of the process that the z/OS system programmers perform where we apply z/OS maintenance to our LPARs on a quarterly basis, we subscribe to the IBM Security bulletin board.

Our requirement is in two folds….
a) A command or module in z/OS that will identify the i) z/OS version and ii) PUT or RSU level plus any PTFs that is identified in the IBM security bulletin board
b) Extract information for an IBM site that will provide the supportable version(s) of z/OS (from our side, n and n-1 would be sufficient, since we rarely be at n-2 from the latest version of z/OS) as well as the PUT or RSU levels with available dates

Idea priority Medium
  • Guest
    Reply
    |
    Oct 4, 2022
    for sudit related questions, please see FAQ (https://www.ibm.com/downloads/cas/EAO940BR) where we suggest that auditors have access and what to do if it is a third party auditor.
  • Guest
    Reply
    |
    Sep 26, 2017

    We would rather see (patch/PTF management):
    -- Automate the process of downloading IBM Security SMPE files such as ASSIGN (source ids) and Security HOLDDATA. Today you have to login in ResourceLink and manually download the files
    -- Automated process to feed CVSS ratings into Vulnerability management tools such as QRadar Vulnerability manager (unsure the proper name of IBM tool). I believe IBM calls it "C-IBM-zSeries: z/OS Security/Integrity CVSS" in ResourceLink.
    -- Automated process for such tools or agents (Vulnerability management tools) to verify systems are protected for such vulnerabilities (check actual systems, not SMPE zones)

  • Guest
    Reply
    |
    Sep 14, 2017

    Thank you for your insights on security patch management. At a high level we have heard similar requests from others and are in the process of identifying an architecture that will enhance the user experience, address your pain point and integrate with the future direction of z/OS management for all supported releases.

  • Guest
    Reply
    |
    Jun 13, 2017

    Very High. The effort to track remediation is a significant manual task that would benefit greatly with simplified tooling.

  • Guest
    Reply
    |
    Mar 20, 2017

    Due to processing by IBM, this request was reassigned to have the following updated attributes:
    Brand - Servers and Systems Software
    Product family - z Systems Software
    Product - z/OS
    Component - Policy
    Operating system - IBM z/OS
    Source - zBLC

    For recording keeping, the previous attributes were:
    Brand - Servers and Systems Software
    Product family - zBLC family
    Product - zBLC
    Component - zBLC Requirements
    Operating system - IBM z/OS
    Source - None