Book description
Every organization has a core set of mission-critical data that must be protected. Security lapses and failures are not simply disruptions—they can be catastrophic events, and the consequences can be felt across the entire organization. As a result, security administrators face serious challenges in protecting the company’s sensitive data. IT staff are challenged to provide detailed audit and controls documentation at a time when they are already facing increasing demands on their time, due to events such as mergers, reorganizations, and other changes. Many organizations do not have enough experienced mainframe security administrators to meet these objectives, and expanding employee skillsets with low-level mainframe security technologies can be time-consuming.
The IBM® Security zSecure suite consists of multiple components designed to help you administer your mainframe security server, monitor for threats, audit usage and configurations, and enforce policy compliance. Administration, provisioning, and management components can significantly reduce administration, contributing to improved productivity, faster response time, and reduced training time needed for new administrators.
This IBM Redbooks® publication is a valuable resource for security officers, administrators, and architects who wish to better understand their mainframe security solutions.
Table of contents
- Front cover
- Notices
- Preface
- Summary of changes
- Part 1 Architecture and design
- Chapter 1. Business context
- Chapter 2. IBM Security zSecure component structure
-
Chapter 3. IBM Security zSecure Admin
- 3.1 An easy to use RACF administration interface
-
3.2 Automating and simplifying routine administration tasks
- 3.2.1 Mass changes to RACF and block command support
- 3.2.2 RACF Offline
- 3.2.3 Timed actions
- 3.2.4 Single action to perform an access check
- 3.2.5 Complete access report
- 3.2.6 Automated verification and cleanup
- 3.2.7 Access Monitor for additional cleanup
- 3.2.8 Automated reporting using CARLa
- 3.2.9 Recovering from administrator errors
- 3.3 Delegating RACF administration tasks
- 3.4 Preventing and identifying problems to minimize threats
- 3.5 Other enhancements for RACF administration
- 3.6 Conclusion
- Chapter 4. IBM Security zSecure Alert
- Chapter 5. IBM Security zSecure Audit
- Chapter 6. IBM Security zSecure Visual
- Chapter 7. IBM Security zSecure Command Verifier
- Chapter 8. IBM z/OS compliance enablers
- Chapter 9. IBM Security zSecure CICS Toolkit
- Chapter 10. Planning for deployment
- Part 2 Customer scenario
- Chapter 11. Delft Transport Authority
- Chapter 12. Project requirements and design
-
Chapter 13. Implementation phase I
- 13.1 Post systems programmer installation setup
- 13.2 CKFREEZE, Signature, and UNLOAD generation data groups
- 13.3 RACF security for IBM zSecure
- 13.4 Running initial analysis reports
- 13.5 Implementing initial improvements in system security posture
- 13.6 Post implementation verification reports
- 13.7 Conclusion
- Chapter 14. Implementation phase II
-
Chapter 15. Implementation phase III
- 15.1 Delegated RACF administration
-
15.2 Ensuring system integrity
- 15.2.1 Enforcing standards
- 15.2.2 Preventing unwanted SETROPTS changes
- 15.2.3 No profiles in WARNING mode
- 15.2.4 No high UACC
- 15.2.5 Preventing or allowing elevation of authority
- 15.2.6 Lockdown profiles for segregation of responsibilities
- 15.2.7 Additional controls required for group special users
- 15.2.8 Assigning mandatory values
- 15.3 Processes for managing authorization
- 15.4 Reporting processes
- 15.5 Joiners, leavers, and movers processing
- 15.6 Segregation of duties
- 15.7 Conclusion
- Part 3 Appendixes
- Appendix A. Troubleshooting
- Appendix B. An introduction to CARLa
- Appendix C. User roles for IBM Security zSecure Visual
- Appendix D. A look at the Consul to IBM Tivoli transformation
- Related publications
- Back cover
Product information
- Title: IBM z/OS Mainframe Security and Audit Management Using the IBM Security zSecure Suite
- Author(s):
- Release date: August 2011
- Publisher(s): IBM Redbooks
- ISBN: 9780738435886
You might also like
book
Storage Area Networks For Dummies®
If you’ve been charged with setting up storage area networks for your company, learning how SANs …
book
Using IBM Application Development Tools for z/OS and OS/390
This IBM Redbooks publication introduces the IBM Application Development Tools for z/OS and OS/390. The first …
book
IBM DB2 12 for z/OS Technical Overview
IBM® DB2® 12 for z/OS® delivers key innovations that increase availability, reliability, scalability, and security for …
book
IBM WebSphere Application Server Liberty Profile Guide for Developers
IBM® WebSphere® Application Server V8.5 includes a Liberty profile, which is a highly composable, dynamic application …