Skip to main content

IBM z/OS Mainframe Security and Audit Management Using the IBM Security zSecure Suite

An IBM Redbooks publication

thumbnail 

Published on 18 August 2011

  1. .EPUB (5.1 MB)
  2. .PDF (5.3 MB)

Apple BooksGoogle Play BooksRead in Google Books Order hardcopy
Share this page:   

ISBN-10: 0738435880
ISBN-13: 9780738435886
IBM Form #: SG24-7633-01


Authors: Axel Buecker, Michael Cairns, Monique Conway, Mark S. Hahn, Deborah McLemore, Jamie Pease and Lili Xie

menu icon

Abstract

Every organization has a core set of mission-critical data that must be protected. Security lapses and failures are not simply disruptions—they can be catastrophic events, and the consequences can be felt across the entire organization. As a result, security administrators face serious challenges in protecting the company’s sensitive data. IT staff are challenged to provide detailed audit and controls documentation at a time when they are already facing increasing demands on their time, due to events such as mergers, reorganizations, and other changes. Many organizations do not have enough experienced mainframe security administrators to meet these objectives, and expanding employee skillsets with low-level mainframe security technologies can be time-consuming.

The IBM® Security zSecure suite consists of multiple components designed to help you administer your mainframe security server, monitor for threats, audit usage and configurations, and enforce policy compliance. Administration, provisioning, and management components can significantly reduce administration, contributing to improved productivity, faster response time, and reduced training time needed for new administrators.

This IBM Redbooks® publication is a valuable resource for security officers, administrators, and architects who wish to better understand their mainframe security solutions.

Table of Contents

Part 1. Architecture and design

Chapter 1. Business context

Chapter 2. IBM Security zSecure component structure

Chapter 3. IBM Security zSecure Admin

Chapter 4. IBM Security zSecure Alert

Chapter 5. IBM Security zSecure Audit

Chapter 6. IBM Security zSecure Visual

Chapter 7. IBM Security zSecure Command Verifier

Chapter 8. IBM z/OS compliance enablers

Chapter 9. IBM Security zSecure CICS Toolkit

Chapter 10. Planning for deployment

Part 2. Customer scenario

Chapter 11. Delft Transport Authority

Chapter 12. Project requirements and design

Chapter 13. Implementation phase I

Chapter 14. Implementation phase II

Chapter 15. Implementation phase III

Appendix A. Troubleshooting

Appendix B. An introduction to CARLa

Appendix C. User roles for IBM Security zSecure Visual

Appendix D. A look at the Consul to IBM Tivoli transformation

 

Others who read this also read