Skip to main content

IBM z/OS Mainframe Security and Audit Management Using the IBM Security zSecure Suite

An IBM Redbooks publication

thumbnail 

Published on 18 August 2011

  1. .EPUB (5.1 MB)
  2. .PDF (5.3 MB)

Apple BooksGoogle Play BooksRead in Google Books Order hardcopy
Share this page:   

ISBN-10: 0738435880
ISBN-13: 9780738435886
IBM Form #: SG24-7633-01


Authors: Axel Buecker, Michael Cairns, Monique Conway, Mark S. Hahn, Deborah McLemore, Jamie Pease and Lili Xie

    menu icon

    Abstract

    Every organization has a core set of mission-critical data that must be protected. Security lapses and failures are not simply disruptions—they can be catastrophic events, and the consequences can be felt across the entire organization. As a result, security administrators face serious challenges in protecting the company’s sensitive data. IT staff are challenged to provide detailed audit and controls documentation at a time when they are already facing increasing demands on their time, due to events such as mergers, reorganizations, and other changes. Many organizations do not have enough experienced mainframe security administrators to meet these objectives, and expanding employee skillsets with low-level mainframe security technologies can be time-consuming.

    The IBM® Security zSecure suite consists of multiple components designed to help you administer your mainframe security server, monitor for threats, audit usage and configurations, and enforce policy compliance. Administration, provisioning, and management components can significantly reduce administration, contributing to improved productivity, faster response time, and reduced training time needed for new administrators.

    This IBM Redbooks® publication is a valuable resource for security officers, administrators, and architects who wish to better understand their mainframe security solutions.

    Table of Contents

    Part 1. Architecture and design

    Chapter 1. Business context

    Chapter 2. IBM Security zSecure component structure

    Chapter 3. IBM Security zSecure Admin

    Chapter 4. IBM Security zSecure Alert

    Chapter 5. IBM Security zSecure Audit

    Chapter 6. IBM Security zSecure Visual

    Chapter 7. IBM Security zSecure Command Verifier

    Chapter 8. IBM z/OS compliance enablers

    Chapter 9. IBM Security zSecure CICS Toolkit

    Chapter 10. Planning for deployment

    Part 2. Customer scenario

    Chapter 11. Delft Transport Authority

    Chapter 12. Project requirements and design

    Chapter 13. Implementation phase I

    Chapter 14. Implementation phase II

    Chapter 15. Implementation phase III

    Appendix A. Troubleshooting

    Appendix B. An introduction to CARLa

    Appendix C. User roles for IBM Security zSecure Visual

    Appendix D. A look at the Consul to IBM Tivoli transformation

     

    Others who read this also read