Published on 18 August 2011
ISBN-10: 0738435880
ISBN-13: 9780738435886
IBM Form #: SG24-7633-01
Authors: Axel Buecker, Michael Cairns, Monique Conway, Mark S. Hahn, Deborah McLemore, Jamie Pease and Lili Xie
Every organization has a core set of mission-critical data that must be protected. Security lapses and failures are not simply disruptions—they can be catastrophic events, and the consequences can be felt across the entire organization. As a result, security administrators face serious challenges in protecting the company’s sensitive data. IT staff are challenged to provide detailed audit and controls documentation at a time when they are already facing increasing demands on their time, due to events such as mergers, reorganizations, and other changes. Many organizations do not have enough experienced mainframe security administrators to meet these objectives, and expanding employee skillsets with low-level mainframe security technologies can be time-consuming.
The IBM® Security zSecure suite consists of multiple components designed to help you administer your mainframe security server, monitor for threats, audit usage and configurations, and enforce policy compliance. Administration, provisioning, and management components can significantly reduce administration, contributing to improved productivity, faster response time, and reduced training time needed for new administrators.
This IBM Redbooks® publication is a valuable resource for security officers, administrators, and architects who wish to better understand their mainframe security solutions.
Part 1. Architecture and design
Chapter 1. Business context
Chapter 2. IBM Security zSecure component structure
Chapter 3. IBM Security zSecure Admin
Chapter 4. IBM Security zSecure Alert
Chapter 5. IBM Security zSecure Audit
Chapter 6. IBM Security zSecure Visual
Chapter 7. IBM Security zSecure Command Verifier
Chapter 8. IBM z/OS compliance enablers
Chapter 9. IBM Security zSecure CICS Toolkit
Chapter 10. Planning for deployment
Part 2. Customer scenario
Chapter 11. Delft Transport Authority
Chapter 12. Project requirements and design
Chapter 13. Implementation phase I
Chapter 14. Implementation phase II
Chapter 15. Implementation phase III
Appendix A. Troubleshooting
Appendix B. An introduction to CARLa
Appendix C. User roles for IBM Security zSecure Visual
Appendix D. A look at the Consul to IBM Tivoli transformation