Empowering Security and Compliance Management for the z/OS RACF Environment using IBM Tivoli Security Management for z/OS

Empowering Security and Compliance Management for the z/OS RACF Environment using IBM Tivoli Security Management for z/OS
Author :
Publisher : IBM Redbooks
Total Pages : 52
Release :
ISBN-10 : 9780738450209
ISBN-13 : 0738450200
Rating : 4/5 (200 Downloads)

Book Synopsis Empowering Security and Compliance Management for the z/OS RACF Environment using IBM Tivoli Security Management for z/OS by : Axel Buecker

Download or read book Empowering Security and Compliance Management for the z/OS RACF Environment using IBM Tivoli Security Management for z/OS written by Axel Buecker and published by IBM Redbooks. This book was released on 2010-08-12 with total page 52 pages. Available in PDF, EPUB and Kindle. Book excerpt: Every organization has a core set of mission-critical data that requires protection. Security lapses and failures are not simply disruptions, they can be catastrophic events with consequences felt across the enterprise. The inadvertent mistakes of privileged users alone can result in millions of dollars in damages through unintentional configuration errors and careless security commands. Malicious users with authorized access can cause even greater damage. As a result, security management faces a serious challenge to adequately protect a company's sensitive data. Likewise, IT staff is challenged to provide detailed audit and controls documentation in the face of increasing demands on their time. Automation and simplification of security and compliance processes can help you meet these challenges and establish effective, sustainable user administration and audit solutions. This includes security database cleanup, repeatable audit of configurations and settings, and active monitoring of changes and events. IBM Tivoli Security Management for z/OS V1.11 provides these solutions to help enhance the security of mainframe systems through automated audit and administration. In this IBM® RedpaperTM document we discuss how Tivoli® Security Management for z/OS® allows you to submit mainframe security information from z/OS, RACF®, and DB2® into an enterprise audit and compliance solution and how to combine mainframe data from z/OS, RACF, and DB2 with that from other operating systems, applications, and databases in order to provide the ability to capture comprehensive log data, interpret that data through sophisticated log analysis, and communicate results in an efficient, streamlined manner for full enterprise-wide audit and compliance reporting.


Empowering Security and Compliance Management for the z/OS RACF Environment using IBM Tivoli Security Management for z/OS Related Books

Empowering Security and Compliance Management for the z/OS RACF Environment using IBM Tivoli Security Management for z/OS
Language: en
Pages: 52
Authors: Axel Buecker
Categories: Computers
Type: BOOK - Published: 2010-08-12 - Publisher: IBM Redbooks

DOWNLOAD EBOOK

Every organization has a core set of mission-critical data that requires protection. Security lapses and failures are not simply disruptions, they can be catast
IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager
Language: en
Pages: 464
Authors: Axel Buecker
Categories: Computers
Type: BOOK - Published: 2010-07-16 - Publisher: IBM Redbooks

DOWNLOAD EBOOK

To comply with government and industry regulations, such as Sarbanes-Oxley, Gramm Leach Bliley (GLBA), and COBIT (which can be considered a best-practices frame
Keeping Up With Security and Compliance on IBM Z
Language: en
Pages: 136
Authors: Bill White
Categories: Computers
Type: BOOK - Published: 2023-06-23 - Publisher: IBM Redbooks

DOWNLOAD EBOOK

Non-compliance can lead to increasing costs. Regulatory violations involving data protection and privacy can have severe and unintended consequences. In additio
IBM z/OS Mainframe Security and Audit Management Using the IBM Security zSecure Suite
Language: en
Pages: 494
Authors: Axel Buecker
Categories: Computers
Type: BOOK - Published: 2011-08-18 - Publisher: IBM Redbooks

DOWNLOAD EBOOK

Every organization has a core set of mission-critical data that must be protected. Security lapses and failures are not simply disruptions—they can be catastr
Security on z/VM
Language: en
Pages: 348
Authors: Paola Bari
Categories: Computers
Type: BOOK - Published: 2007-12-05 - Publisher: IBM Redbooks

DOWNLOAD EBOOK

Discussions about server sprawl, rising software costs, going green, or moving data centers to reduce the cost of business are held in many meetings or conferen