Redbook Draft: z/OS Mainframe Security and Audit Management using IBM Tivoli zSecure

Every organization has a core set of mission-critical data that must be protected. Security lapses and failures are not simply disruptions—they can be catastrophic events, and the consequences can be felt across the entire organization. As a result, security administrators face serious challenges in protecting the company’s sensitive data. IT staff are challenged to provide detailed audit and controls documentation at a time when they are already facing increasing demands on their time, due to events such as mergers, reorganizations, and other changes. Many organizations do not have enough experienced mainframe security administrators to meet these objectives, and expanding employee skillsets with low-level mainframe security technologies can be time-consuming.

The IBM Tivoli zSecure suite consists of multiple components designed to help you administer your mainframe security server, monitor for threats, audit usage and configurations, and enforce policy compliance. Administration, provisioning and management components can significantly reduce administration, contributing to improved productivity, faster response time and reduced training time needed for new administrators.

This book is a valuable resource for security officers, administrators, and architects who wish to better understand their mainframe security solutions.

Table of Contents

Part 1. Architecture and design

  • Chapter 1. Business context
  • Chapter 2. Tivoli zSecure component structure
  • Chapter 3. zSecure Admin
  • Chapter 4. zSecure Alert
  • Chapter 5. zSecure Audit
  • Chapter 6. zSecure Visual
  • Chapter 7. zSecure Command Verifier
  • Chapter 8. z/OS compliance enablers
  • Chapter 9. zSecure CICS Toolkit
  • Chapter 10. Planning for deployment

Part 2. Customer scenario

  • Chapter 11. Delft Transport Authority
  • Chapter 12. Project requirements and design
  • Chapter 13. Implementation phase I
  • Chapter 14. Implementation phase II
  • Chapter 15. Implementation phase III

Part 3. Appendixes

  • Appendix A. Troubleshooting
  • Appendix B. An introduction to CARLa
  • Appendix C. User roles for zSecure Visual
  • Appendix D. A look at the Consul/Tivoli transformation

Download the PDF here.


Author: Xavier Ashe

Entrepreneur, Infosec Executive, CISSP, CISM, Ironman triathlete, traveler, UU, paleo, father of 8, goyishe, gamer, & geek.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s