Skip to main content
MainTegrity Cyber Security Framework (CSF)
MainTegrity Cyber Security Framework (CSF)
End-to-End Cyber Security for IBM z/OS
The CSF Suite // Early Warning //

Early Warning

What Makes Early Warning Unique

Early Warning is the behavior-focused module of CSF. It catches attackers during reconnaissance and exploit attempts—before they achieve their objectives.

Early Warning answers the question: "Is someone probing my system or trying to escalate privileges?"


Early Warning Capabilities

  • Detect z/OS Authority / Security Tampering — Monitors for changes to security settings, exits, and audit configurations
  • Prevent UserID Impersonation — Detects and can block attempts to assume another user's identity
  • Stop Rogue Encryption in Seconds — Identifies ransomware encryption patterns and suspends immediately
  • Alert on Suspicious User Behavior — Tracks unusual access patterns, privilege escalation, and reconnaissance

Why Early Warning Matters

Most attacks follow a predictable pattern:

  1. Reconnaissance — Attacker maps environment, tests permissions, looks for vulnerabilities
  2. Exploit — Attacker leverages a gap to escalate privileges or gain unauthorized access
  3. Attack — Attacker executes their objective (ransomware, data theft, sabotage)

Early Warning detects phases 1 and 2, enabling you to stop attackers before phase 3.

Attacks Are Easier Than You Think

From real-world penetration testing:

  • Privilege escalation (becoming RACF SPECIAL) requires only 6 assembler instructions
  • User impersonation (acting as another user) requires only 7 instructions
  • AI assistance: ChatGPT generated working mainframe hardware encryption assembler code
  • Tools freely available: Pen testing tools on GitHub can be used by attackers

You don't need 40 years of mainframe experience to attack a mainframe. Early Warning levels the playing field.


Three Layers of Detection

Layer 1: Reconnaissance Detection

Monitors user activities and generates alerts when thresholds are exceeded:

  • Excessive read accesses to APF libraries, PARMLIB, PROCLIB, VTAMLST, TCPPARMS
  • RACF commands indicating environmental mapping (SETROPTS LIST, LU *, SEARCH)
  • Similar coverage for Top Secret and ACF2

When thresholds are exceeded:

  1. Immediate alert that thresholds were passed
  2. Summary report detailing all reconnaissance activity

Layer 2: Exploit Detection

Monitors for activities indicating attack preparation:

  • Authorization escalation — non-authorized program becomes authorized
  • Privilege escalation — user gains RACF SPECIAL or equivalent
  • User impersonation — assuming another user's identity
  • Dynamic exit alteration — installing exits to suppress activity tracking
  • Security audit modification — altering audit settings to cover tracks
  • Privileged command usage — SET PROG APF ADD, SET commands

Layer 3: Attack Detection

Monitors suspicious activities from batch or TSO programs:

  • Excessive file scanning, updating, or deleting
  • Hardware encryption while updating excessive files (ransomware signature)
  • High CPU usage combined with high I/O
  • Mass deletion or corruption patterns

Countermeasures: Stop Attacks, Don't Just Alert

Early Warning can automatically block certain attack techniques:

Attack TypeCountermeasure Result
Authorization escalationSystem 47 abend — privileged operation blocked
Privilege escalationCountered — user remains unprivileged
User impersonationCountered — impersonation attempt fails

When countermeasures are enabled, attackers receive cryptic system errors while Early Warning alerts your team.


The IBMUSER Attack Vector

Every z/OS system has IBMUSER—a high-powered default account. Most sites disable it, but it often remains available in a revoked state. Attackers who gain RACF SPECIAL can:

  1. Resume the IBMUSER account
  2. Set their own password
  3. Log on with superuser capabilities

Early Warning detects successful IBMUSER logons—which should never occur in production.


Extended Tracking

Early Warning monitors activities beyond normal z/OS capabilities. Attackers plan reconnaissance to avoid activities the system normally records—Early Warning catches them doing things they wouldn't expect to be tracked.


Coverage: 42 Unique Monitoring Items

Early Warning monitors up to 42 unique items for RACF implementations, with similar coverage for ACF2 and Top Secret.

Access pattern monitoring includes:

  • Protected datasets and operator commands
  • BPX resources and FACILITY class
  • JES Spool resources and SDSF functions
  • ICSF functions and certificate resources

Early Warning vs. Other CSF Products

If you need to...Use...
Catch attackers in recon/exploit phaseEarly Warning
Detect file changes and ransomwareFIM+
Stop data leaving your mainframeData Exfiltration Defense
Verify vendor software before installSupply Chain

CRM Product Quote Description

Monitors up to 42 unique security items across three detection categories: Reconnaissance Detection (excessive library reads, access checking, privileged command usage), Exploit Detection (authorization escalation, privilege escalation, user impersonation with immediate actions), and Attack Detection (excessive file scanning, updating, deleting, encryption activity). Supports RACF, ACF2, and Top Secret.


Early Warning runs on CSF Foundation, which provides Real-time Reaction, Human Interface, Whitelisting, and Restore Assist capabilities.