Skip to main content

Empowering Security and Compliance Management for the z/OS RACF Environment using IBM Tivoli Security Management for z/OS

An IBM Redpaper publication

Note: This is publication is now archived. For reference only.

thumbnail 

Published on 12 August 2010

  1. .EPUB (0.8 MB)
  2. .PDF (1.3 MB)

Google Play BooksRead in Google Books
Share this page:   

ISBN-10: 0738450200
ISBN-13: 9780738450209
IBM Form #: REDP-4549-00


Authors: Axel Buecker and Michael Cairns

    menu icon

    Abstract

    Every organization has a core set of mission-critical data that requires protection. Security lapses and failures are not simply disruptions, they can be catastrophic events with consequences felt across the enterprise. The inadvertent mistakes of privileged users alone can result in millions of dollars in damages through unintentional configuration errors and careless security commands. Malicious users with authorized access can cause even greater damage. As a result, security management faces a serious challenge to adequately protect a company's sensitive data. Likewise, IT staff is challenged to provide detailed audit and controls documentation in the face of increasing demands on their time.

    Automation and simplification of security and compliance processes can help you meet these challenges and establish effective, sustainable user administration and audit solutions. This includes security database cleanup, repeatable audit of configurations and settings, and active monitoring of changes and events. IBM Tivoli Security Management for z/OS V1.11 provides these solutions to help enhance the security of mainframe systems through automated audit and administration.

    In this IBM® Redpaper™ document we discuss how Tivoli® Security Management for z/OS® allows you to submit mainframe security information from z/OS, RACF®, and DB2® into an enterprise audit and compliance solution and how to combine mainframe data from z/OS, RACF, and DB2 with that from other operating systems, applications, and databases in order to provide the ability to capture comprehensive log data, interpret that data through sophisticated log analysis, and communicate results in an efficient, streamlined manner for full enterprise-wide audit and compliance reporting.

    Table of Contents

    Chapter 1. IBM Tivoli Security Management for z/OS

    Chapter 2. Customer scenarios

     

    Others who read this also read