Skip to main content

IBM RACF Security Impact Forecasting using IBM zSecure

A draft IBM Redbooks publication

thumbnail 

Last updated on 07 February 2025

  1. .PDF (2.0 MB)

Share this page:   

IBM Form #: SG24-8578-00


Authors: Bill White, Mike Riches, Elijah Swift, Jeroen Tiggelman, Scott Woolley and Tom Zeehandelaar

    menu icon

    Abstract

    To guard against future cyberattacks efficiently, it is important to have a simple process to predict the impact of changes made to your security definitions. Security impact forecasting can provide a streamlined workflow in which historical data is captured automatically, and an intuitive interface allows for setting up security adaptations in a way that they can be quickly analyzed for effect and when deemed correct, applied automatically.

    In the context of IBM® RACF®, changes to existing access control definitions can be done in a proactive way with confidence, using IBM zSecure Admin. IBM zSecure Admin capabilities can help assess and build stronger access controls against cyberthreats, rather than just reacting to them after they happen.

    In this IBM Redbooks® publication, we look at the value of analytics for security impact forecasting in reference to IBM RACF and IBM zSecure Admin (RACF-Offline and the Access Monitor functions). Use cases, best practices, and step-by-step guidance with examples are also provided.

    This publication is for IT Managers and Security Architects responsible for the technology that protects their assets, and the change management staff and security administrators responsible for the safeguarding applications and data from unauthorized access.

    The reader is expected to have a basic understanding of IT security concepts and the principle of least privilege in a zero trust framework.

    Table of Contents

    Chapter 1. Tighten access controls with confidence

    Chapter 2. IBM zSecure capabilities for RACF administrators

    Chapter 3. Add a new set of profiles

    Chapter 4. Remove unused security definitions

    Chapter 5. Convert generic and specific access to group-based access

    Chapter 6. Minimize access control privileges

     

    Special Notices

    The material included in this document is in DRAFT form and is provided 'as is' without warranty of any kind. IBM is not responsible for the accuracy or completeness of the material, and may update the document at any time. The final, published document may not include any, or all, of the material included herein. Client assumes all risks associated with Client's use of this document.