Introduction |
|
1 | (6) |
|
Part One Securing Business Data |
|
|
|
Chapter 1 How the Mainframe Provides Security |
|
|
7 | (6) |
|
How RACF Does Access Checking |
|
|
9 | (1) |
|
The RACF Access Checking Diagram |
|
|
10 | (3) |
|
Chapter 2 RACF Special Privileges |
|
|
13 | (6) |
|
Logging Special Privilege Activities |
|
|
14 | (1) |
|
Mitigating the Risk of Special Privileges |
|
|
15 | (1) |
|
Alternatives to the OPERATIONS Privilege |
|
|
16 | (1) |
|
|
17 | (2) |
|
Chapter 3 The Data Security Monitor (DSMON) |
|
|
19 | (10) |
|
How to Produce DSMON Reports |
|
|
20 | (1) |
|
Understanding DSMON Reports |
|
|
20 | (8) |
|
|
28 | (1) |
|
Chapter 4 Security Event Logging and Auditing |
|
|
29 | (10) |
|
|
31 | (1) |
|
Auditing Resources at the Profile Level |
|
|
31 | (1) |
|
Using the GLOBALAUDIT Operand |
|
|
32 | (1) |
|
Auditing Resources at the Class Level |
|
|
32 | (2) |
|
Auditing Users with Special Privileges |
|
|
34 | (1) |
|
|
34 | (1) |
|
Auditing Failures to RACF Commands |
|
|
35 | (1) |
|
|
35 | (1) |
|
The Importance of Security Log Retention |
|
|
35 | (2) |
|
|
37 | (2) |
|
Chapter 5 The Global Access Checking (GAC) Table |
|
|
39 | (10) |
|
|
40 | (1) |
|
The Security Concerns of GAC |
|
|
40 | (1) |
|
|
41 | (1) |
|
Mitigating the Security Risks of GAC |
|
|
42 | (2) |
|
The Benefits of GAC Mirror Profiles |
|
|
44 | (1) |
|
Good Candidates for GAC Processing |
|
|
45 | (1) |
|
|
46 | (3) |
|
Chapter 6 Understanding the FACILITY Class |
|
|
49 | (6) |
|
Storage Administration Profiles |
|
|
50 | (1) |
|
|
50 | (1) |
|
|
50 | (1) |
|
|
51 | (1) |
|
Security Administration of FACILITY Class Profiles |
|
|
51 | (1) |
|
The FACILITY Class's Documentation |
|
|
52 | (1) |
|
Third-Party Vendor Products |
|
|
52 | (1) |
|
In-House Developed Products |
|
|
52 | (1) |
|
FACILITY Class Profiles: A Word of Caution |
|
|
52 | (3) |
|
Chapter 7 The Benefits of the SEARCH Command |
|
|
55 | (6) |
|
|
55 | (1) |
|
Cleaning Up the RACF Database |
|
|
56 | (1) |
|
Listing Profiles, User IDs, and Groups |
|
|
57 | (1) |
|
|
57 | (1) |
|
Finding Duplicate UIDs and GIDs |
|
|
58 | (1) |
|
Searching a User's Access to Profiles |
|
|
59 | (1) |
|
Finding Discrete Profiles |
|
|
59 | (1) |
|
|
59 | (2) |
|
Chapter 8 WARNING Mode and Its Implications |
|
|
61 | (4) |
|
The Proper Use of WARNING Mode |
|
|
62 | (1) |
|
The Incorrect Use of WARNING Mode |
|
|
63 | (1) |
|
Finding All Profiles in WARNING Mode |
|
|
63 | (1) |
|
Make Sure WARNING Mode Is Justified |
|
|
64 | (1) |
|
Remove WARNING Mode Where Inappropriate |
|
|
64 | (1) |
|
|
64 | (1) |
|
Chapter 9 Understanding z/OS UNIX Security |
|
|
65 | (10) |
|
How z/OS UNIX Security Works |
|
|
66 | (1) |
|
Planning for z/OS UNIX Security |
|
|
67 | (1) |
|
Unique UIDs and GIDs Recommended |
|
|
68 | (1) |
|
|
69 | (1) |
|
|
70 | (1) |
|
Implementing z/OS UNIX Controls |
|
|
71 | (1) |
|
FACILITY Class Considerations |
|
|
71 | (2) |
|
UNIXPRIV Class Considerations |
|
|
73 | (1) |
|
Other z/OS UNIX Considerations |
|
|
73 | (2) |
|
Chapter 10 The Benefits of RACF Commands in Batch Mode |
|
|
75 | (6) |
|
Capturing the Results of RACF Commands |
|
|
76 | (1) |
|
|
77 | (1) |
|
Performing an Action Repeatedly |
|
|
77 | (1) |
|
Entering Groups of RACF Commands |
|
|
78 | (1) |
|
When Batch Mode Is the Only Method |
|
|
79 | (1) |
|
|
79 | (2) |
|
Chapter 11 Security Administration: Beyond the Basics |
|
|
81 | (22) |
|
Doing It Right the First Time |
|
|
82 | (2) |
|
|
84 | (2) |
|
Understanding RACF User Profile Segments |
|
|
86 | (1) |
|
What Is a RACF Discrete Profile? |
|
|
87 | (1) |
|
What Are Undefined RACF User IDs? |
|
|
88 | (1) |
|
Universal Access (UACC) Considerations |
|
|
89 | (1) |
|
|
90 | (1) |
|
Disaster Recovery Considerations |
|
|
90 | (1) |
|
What Are RACF "Grouping Classes"? |
|
|
91 | (1) |
|
What Is RACF "Undercutting"? |
|
|
92 | (1) |
|
What Is a RACF "Back-Stop" Profile? |
|
|
92 | (1) |
|
Why User IDs Must Not Be Shared |
|
|
93 | (1) |
|
Granting Temporary Access to Resources |
|
|
94 | (1) |
|
Creating "Fully-Qualified" Generic Profiles |
|
|
94 | (1) |
|
Specifying Strong Passwords |
|
|
95 | (1) |
|
|
96 | (3) |
|
|
99 | (4) |
|
Part Two Securing The Z/Os Operating System |
|
|
|
Chapter 12 APF-Authorized Libraries |
|
|
103 | (6) |
|
|
103 | (1) |
|
Finding APF-Authorized Libraries |
|
|
104 | (1) |
|
How Do You Mitigate This Risk? |
|
|
105 | (2) |
|
|
107 | (2) |
|
Chapter 13 The System Management Facility (SMF) |
|
|
109 | (4) |
|
|
110 | (1) |
|
How Do You Mitigate This Risk? |
|
|
110 | (2) |
|
|
112 | (1) |
|
Chapter 14 Operating System Data Sets |
|
|
113 | (6) |
|
System Parameter Libraries |
|
|
113 | (2) |
|
|
115 | (1) |
|
Assorted Operating System Data Sets |
|
|
116 | (1) |
|
|
117 | (2) |
|
Chapter 15 RACF Databases |
|
|
119 | (4) |
|
|
119 | (1) |
|
How Do You Mitigate This Risk? |
|
|
120 | (2) |
|
|
122 | (1) |
|
|
123 | (4) |
|
|
124 | (1) |
|
How Do You Mitigate This Risk? |
|
|
124 | (2) |
|
|
126 | (1) |
|
|
127 | (4) |
|
|
128 | (1) |
|
How Do You Mitigate This Risk? |
|
|
128 | (1) |
|
|
128 | (3) |
|
Chapter 18 Started Procedures |
|
|
131 | (6) |
|
|
132 | (1) |
|
How Do You Mitigate This Risk? |
|
|
133 | (2) |
|
|
135 | (2) |
|
Chapter 19 Tape Bypass Label Processing (BLP) |
|
|
137 | (4) |
|
|
137 | (2) |
|
How Do You Mitigate This Risk? |
|
|
139 | (1) |
|
|
139 | (2) |
|
Chapter 20 The SYS1.UADS Data Set |
|
|
141 | (6) |
|
A Brief History of SYS1.UADS |
|
|
142 | (1) |
|
How SYS1.UADS Works with RACF |
|
|
143 | (1) |
|
Keeping SYS1.UADS Current |
|
|
144 | (1) |
|
|
145 | (2) |
|
Chapter 21 The System Display and Search Facility (SDSF) |
|
|
147 | (4) |
|
|
147 | (1) |
|
How Do You Mitigate This Risk? |
|
|
148 | (3) |
|
Chapter 22 The Program Properties Table (PPT) |
|
|
151 | (4) |
|
|
151 | (1) |
|
How Do You Mitigate This Risk? |
|
|
152 | (3) |
|
Chapter 23 Special-Use Programs |
|
|
155 | (4) |
|
|
156 | (1) |
|
How Do You Mitigate This Risk? |
|
|
156 | (3) |
|
Part Three Security Infrastructure Matters |
|
|
|
Chapter 24 Application and Batch ID Security |
|
|
159 | (4) |
|
Segregate Production from Non-Production |
|
|
159 | (1) |
|
Batch IDs Must Not Share Application Data |
|
|
160 | (1) |
|
Production JCL Must Not Refer to Personal Data Sets |
|
|
160 | (1) |
|
Be Careful About SURROGAT Class Access |
|
|
161 | (1) |
|
Restrict Direct Update Access to Production Data |
|
|
162 | (1) |
|
Chapter 25 Security Architecture |
|
|
163 | (6) |
|
Internal Vs. External Security |
|
|
164 | (1) |
|
The Benefits of External (RACF) Security |
|
|
165 | (1) |
|
Centralized Security or Decentralized Security? |
|
|
166 | (3) |
|
Chapter 26 The RACF Unload Database |
|
|
169 | (8) |
|
|
170 | (1) |
|
Creating the RACF Unload Database |
|
|
170 | (1) |
|
The Benefits of the RACF Unload Database |
|
|
171 | (1) |
|
The Uses of the RACF Unload Database |
|
|
171 | (2) |
|
Getting Quick Answers Using TSO |
|
|
173 | (3) |
|
|
176 | (1) |
|
Chapter 27 Increasing Your Productivity |
|
|
177 | (8) |
|
|
178 | (1) |
|
Learn More About ISPF Edit Capabilities |
|
|
178 | (2) |
|
|
180 | (1) |
|
|
180 | (1) |
|
|
181 | (1) |
|
|
181 | (1) |
|
|
182 | (1) |
|
Subscribe to Vendor Publications |
|
|
182 | (1) |
|
|
183 | (1) |
|
|
183 | (1) |
|
|
183 | (2) |
|
Chapter 28 Security Compliance |
|
|
185 | (2) |
|
Chapter 29 Security Best Practices |
|
|
187 | (10) |
|
Implement Role-Based Security |
|
|
188 | (2) |
|
Periodically De-Clutter Your Security Database |
|
|
190 | (1) |
|
Handle Employee Transfers and Terminations As They Occur |
|
|
190 | (1) |
|
Identify Your Important Data |
|
|
191 | (1) |
|
Assign Ownership to All Data |
|
|
192 | (1) |
|
Keep All Security Within RACF |
|
|
193 | (1) |
|
Log Accesses to Important Data |
|
|
193 | (1) |
|
Conduct Periodic Reviews of All Access Rights |
|
|
193 | (1) |
|
Implement Change Management for Production JCL |
|
|
194 | (1) |
|
Report and Monitor Security Activities |
|
|
195 | (1) |
|
Implement Segregation of Duties |
|
|
196 | (1) |
|
Require Approval Before Granting Access |
|
|
196 | (1) |
|
|
196 | (1) |
|
Chapter 30 Security Add-On Products |
|
|
197 | (4) |
|
The Benefits of RACF Add-On Products |
|
|
198 | (1) |
|
Simplified Security Administration |
|
|
199 | (1) |
|
|
199 | (1) |
|
|
200 | (1) |
|
|
200 | (1) |
|
Security Compliance and Enforcement |
|
|
200 | (1) |
|
|
200 | (1) |
Epilogue |
|
201 | (2) |
Index |
|
203 | |