Our z/OS Security Administration and Auditing Company name Introducing z/OS Security 1 hour PowerPointOur z/OS Security PowerPoint Our z/OS Security Administration.

Slides:



Advertisements
Similar presentations
Our z/OS Security Introducing z/OS Security 1 hour PowerPointOur z/OS Security PowerPoint Our z/OS Security Administration and Auditing Webinar Understanding.
Advertisements

Information Systems Audit Program (cont.). PHYSICAL SECURITY CONTROLS.
1 DB2 Access Recording Services Auditing DB2 on z/OS with “DBARS” A product developed by Software Product Research.
Peter Plevka, BMC Software Managing IT and Your Business – Optimizing Mainframe Cost and Performance.
HORIZONT 1 ProcMan ® The Handover Process Manager Product Presentation HORIZONT Software for Datacenters Garmischer Str. 8 D München Tel ++49(0)89.
Introduction to the new mainframe © Copyright IBM Corp., All rights reserved. Chapter 2: z/OS Overview.
Click to add text Introduction to the new mainframe: Large-Scale Commercial Computing © Copyright IBM Corp., All rights reserved. Chapter 7: Systems.
Introduction to the new mainframe: Large-Scale Commercial Computing © Copyright IBM Corp., All rights reserved. Chapter 7: Systems Management.
Introduction to the new mainframe: Large-Scale Commercial Computing © Copyright IBM Corp., All rights reserved. Chapter 4: Integrity and security.
Chapter 18: Security on z/OS
Z/OS V14 March Copyright © 2012 PKWARE, Inc. and its licensors. All rights reserved. PKWARE, SecureZIP, and PKZIP are registered trademarks of PKWARE,
Introduction to the new mainframe © Copyright IBM Corp., All rights reserved. Chapter 7: Designing and developing applications for z/OS.
Monitoring and Troubleshooting Chapter 17. Review What role is required to share folders on Windows Server 2008 R2? What is the default permission listed.
Understanding CICS and Your Role Company Name Date - Time CICS TS - Introduction 1 hour PowerPointOur CICS Applications and Data PowerPoint Our CICS Systems.
Our IMS Systems IMS Overview 1 hour PowerPointOur IMS Applications and Data PowerPoint Our IMS Systems Webinar Understanding IMS and Your Role = Datatrain.
Supervisory Control and Data Acquisition (SCADA) Software.
Our Data Management and Transaction Processing Company Name 1 |Copyright © Interskill Learning Pty Ltd 2011 – Commercial in Confidence z/OS Application.
Presented and hosted by Smooth Sailing: How to Upgrade Sage 300.
©HCCS & IBM® 2009 Stephen Linkin 1 Security On z/OS Stephen S. Linkin Houston Community College © HCCS and IBM 2009.
Click to add text Introduction to the new mainframe: Large-Scale Commercial Computing © Copyright IBM Corp., All rights reserved. Chapter 4: Integrity.
Understanding Application Programming Procedures Company Name Date - Time 1 |Copyright © Interskill Learning Pty Ltd 2011 – Commercial in Confidence z/OS.
Understanding Systems Programming Procedures and Roles Company Name Date - Time 1 |Copyright © Interskill Learning Pty Ltd 2011 – Commercial in Confidence.
TWSd - Security Workshop Part I of III T302 Tuesday, 4/20/2010 TWS Distributed & Mainframe User Education April 18-21, 2010  Carefree Resort  Carefree,
Our Mainframe Networks Company name 1 |Copyright © Interskill Learning Pty Ltd 2012 – Commercial in Confidence Introducing Mainframe Networks 1 hour PowerPointOur.
Introduction to the new mainframe © Copyright IBM Corp., All rights reserved. Chapter 12 Understanding database managers on z/OS.
Our COBOL Programming COBOL Programming - Basics 1 hour PowerPoint Our COBOL Environment PowerPoint Our COBOL Programming Webinar Understanding COBOL and.
Knowing What You Missed Forensic Techniques for Investigating Network Traffic.
Managing Content with SharePoint 2007 Module 0. Overview  Introduction  About This Course  Course Outline  Using Virtual PC.
If you are looking for a solution to your training administration nightmares, look no further! For a once off fee (starting at the salary for a reasonably.
Our COBOL Environment COBOL Programming - Basics 1 hour PowerPoint Our COBOL Environment PowerPoint Our COBOL Programming Webinar Understanding COBOL and.
IBM CM OnDemand for z/OS & Multi-platform Hamardi IT Service v/Steen Camillo Hamardi Independent IT Services Specialist
Our DB2 Data DB2 Fundamentals 1 hour PowerPoint Our DB2 Data PowerPoint Our DB2 Systems Webinar Understanding DB2 and Your Role = Datatrain Course Modules.
Unit 3: Identifying and Safeguarding Vital Records Unit Introduction and Overview Unit objective:  Describe the elements of an effective vital records.
Our DB2 Systems Copyright © Interskill Learning Pty Ltd 2011 – Commercial in Confidence1 | Company name DB2 Fundamentals 1 hour PowerPoint Our DB2 Data.
Identifying and Gathering Problem Data Company Name 1 |Copyright © Interskill Learning Pty Ltd 2011 – Commercial in Confidence Identifying z/OS System.
Our Programming and Batch Systems Company Name 1 |Copyright © Interskill Learning Pty Ltd 2011 – Commercial in Confidence z/OS Application Development.
Our JES and Network Setup
Module 10: Implementing Administrative Templates and Audit Policy.
© 2009 IBM Corporation TWS for z/OS Release Upgrade Angelo D’Ambrosio & Giuseppe Longobardi – TWA customer support team.
Luminex Virtual Tape Storage System Brian Sullivan Director of Computer Operations Broward County Public Schools 1.
Understanding Data Center Operations and Your Role Company Name Date - Time 1 | Introduction to the IBM Enterprise Environment 45 minutes 1 hour PowerPoint.
Our Mainframe Network Operations Company name 1 |Copyright © Interskill Learning Pty Ltd 2012 – Commercial in Confidence Introducing Mainframe Networks.
Microsoft ® Official Course Implementing Enterprise Content Management Microsoft SharePoint 2013 SharePoint Practice.
Our IMS Applications and Data IMS Overview 1 hour PowerPointOur IMS Applications and Data PowerPoint Our IMS Systems Webinar Understanding IMS and Your.
Our Mainframe Under the Microscope Company name 1 | Introduction to the IBM Enterprise Environment 45 minutes 1 hour PowerPoint Our Data Centre Structure.
1 | Understanding Mainframe Networks and Your Role Company Name Date - Time Introducing Mainframe Networks 1 hour PowerPointOur Mainframe Networks PowerPoint.
HORIZONT XINFO – How to use XINFO in Development 1 HORIZONT XINFO – How to use XINFO in Development.
Unit 1: IBM Tivoli Storage Manager 5.1 Overview. 2 Objectives Upon the completion of this unit, you will be able to: Identify the purpose of IBM Tivoli.
Collecting and keeping job output 4401 Thursday, May 3rd TWS Education + Training April 29-May 3, 2012 Hyatt Regency Austin Austin, Texas.
Copyright © 2012, SAS Institute Inc. All rights reserved. SAS ENVIRONMENT MANAGER CARMINE VERRELLI - TECHNICAL TRAINING SPECIALIST.
1 DB2 Access Recording Services Auditing DB2 on z/OS with “DBARS” A product developed by Software Product Research.
XINFO – How to use XINFO in Development
Administration The Administration system forms part of the Basic System and has seven modules; the Translation Manager, Mandatory Fields Setup, Payroll.
Our Data Center Structure
System Monitoring Practices and Procedures
IST 353Competitive Success/tutorialrank.com
IST 353 Education for Service-- tutorialrank.com.
Understanding COBOL and Your Role
Our CICS Systems Company name CICS TS - Introduction Graphic
Our Mainframe Applications and Subsystems
Our z/OS System Setup Company Name Introduction to z/OS
GIS “PLANNING ORIENTED” FOR SMALL AND RURAL UTILITIES.
Understanding IMS and Your Role
Understanding DB2 and Your Role
System Problem Resolution Practices
Handling SMF and System Messages
System Start-Up and Shutdown
SYSTEM ACTIVITY MONITORING
Presentation transcript:

Our z/OS Security Administration and Auditing Company name Introducing z/OS Security 1 hour PowerPointOur z/OS Security PowerPoint Our z/OS Security Administration and Auditing Webinar Understanding z/OS Security and Your Role = Datatrain Course Modules Mainframe Security Basics z/OS Security Administration z/OS Security Auditing and Recording z/OS Authorized Program Facility 1 hour

Our SMF Logged to Coupling Facility Archived to tape every night: one onsite, one offsite Kept for 7 years Security related events also archived to datasets for reporting 2 |Copyright © Interskill Learning 2012 SMF RACF CICS DB2 z/OS

Our Other Logging IMS Archived to tape every night: one onsite, one offsite Kept for 7 years Operlog Archived to BMC Control/D every night Kept for one year Syslogd Routed to Operlog 3 |Copyright © Interskill Learning 2012

Our Log Access Tools SMF SAS/MXG Tivoli z/Secure Custom DFSORT ICETOOL jobs Operlog Control/D IMS Logs SAS/MXG Tivoli z/Secure 4 |Copyright © Interskill Learning 2012

Our Security Related Reports Logon IDs Suspended Logon IDs Not Used for More Than Three Months. RACF Rule Changes Updates to Sensitive Datasets Sensitive z/OS and USS Commands Issued Excessive Rule Violations Excessive Logons from a Logon ID Internal Firecall Utility Use 5 |Copyright © Interskill Learning 2012

Our Security Administration Tools Tivoli z/Secure RACF Panels RACF TSO Commands Internal Firecall ASPG ReAct 6 |Copyright © Interskill Learning 2012

Our Security Audits External Every Two Years External Audit Company Different Scope Every Audit Internal Every April Security Administrators Analyze Tivoli z/Secure Audit Reports 7 |Copyright © Interskill Learning 2012

Our APF Security Only Systems Programmers can update APF libraries Daily report of APF library updates Daily report of commands adding APF authorization Annual Audit of APF authorized modules and libraries 8 |Copyright © Interskill Learning 2012

Summary Our SMF Our Other Logging Our Log Access Tools Our Security Related Reports Our Security Administration Tools Our Security Audits Our APF Security 9 |Copyright © Interskill Learning 2012 Introducing z/OS Security 1 hour PowerPointOur z/OS Security PowerPoint Our z/OS Security Administration and Auditing Webinar Understanding z/OS Security and Your Role = Datatrain Course Modules Mainframe Security Basics z/OS Security Administration z/OS Security Auditing and Recording z/OS Authorized Program Facility 1 hour