SlideShare uma empresa Scribd logo
1 de 16
Baixar para ler offline
IBM Software
Buyer’s guide




Centralizing security on the mainframe
Improve security and compliance by choosing the right solution
2   Centralizing security on the mainframe




Today’s IT environments are often collections of distributed,         enabled by the mainframe to many different hardware and soft-
collaborative, multiplatform environments. That’s both the good       ware platforms. The answer is to seek mainframe security solu-
news, and the bad news. It’s good news because those qualities        tions that are specifically designed to both enhance and simplify
have made many organizations more agile, effective and compet-        security, with:
itive—by allowing them to match resources to needs without
being limited by a single IT platform. But at the same time,          ●   Extensive integration of security operations across platforms.
these qualities can make critical assets within an organization       ●   Widespread use of automation to reduce administrative
much more difficult to identify and protect.                              demands on IT staff.
                                                                      ●   Consolidated views of security and compliance activities
Heterogeneous IT environments today represent the inevitable              throughout the enterprise.
consequence of growth—not just data and application growth,           ●   Broad, deep audit and reporting to demonstrate regulatory
but business growth. In the wake of this unbridled growth, there          compliance.
are more assets and workloads to be secured than ever before.
And as organizations have grown in the number of customers or         Getting started with mainframe security
constituents they serve, and the number of products and services      This buyer’s guide outlines the features and capabilities of an
they deliver to those users, they have implemented more and           effective mainframe security strategy, addressing the following
more IT resources of varying kinds over time to meet changing         key areas:
business needs. The result: a larger, more complex, dispersed
IT environment that’s harder to secure because it comprises so        1. Security management
many different technologies.                                          2. Identity and access management
                                                                      3. Monitor, audit and alert
This level of complexity gives rise to numerous security              4. Audit and compliance reporting
problems. They include time-consuming, inefficient security
administration stemming from the need to manage security              For each category, this guide provides a checklist of features to
across so many different resources, as well as difficulties in con-   help you evaluate whether or not a particular vendor’s solutions
sistently applying access control policies and processes across the   address each of these functional areas effectively. You will also
enterprise. Organizations must also comply with regulatory and        find tips to help you select a vendor that has the solutions, sup-
audit requirements that combine growing numbers of regula-            port, financial stability and other qualities to address the full
tions with extremely diverse operating environments, as well as       range of your mainframe security requirements.
demonstrate compliance by providing audit data from a multi-
tude of sources.                                                      1. Security management
                                                                      Managing security in multiplatform environments can be
To address these problems, more and more organizations are            a complex and costly proposition, considering the magnitude of
discovering the advantages of centralizing security—and using         the task. Centralizing security operations on the mainframe is
the mainframe to do it. This approach makes sense, because            one key to getting control over it; the other is making security
resilience and security are hallmarks of mainframe computing,         management more effective and efficient. This begins with
especially when it comes to the industry-leading IBM System z®        ensuring that the security management tools you use are
platform. The question is how to extend the security that is
IBM Software   3




focused on maintaining the integrity of security operations. The              to spend more of their valuable time on strategic work that
next step is speeding and simplifying those operations at every               enhances the organization’s overall security posture, rather than
possible level.                                                               on day-to-day security administration. It’s simply a smarter
                                                                              way to allocate and apply skilled security resources in the IT
To maintain security integrity, you need a security management                organization.
solution that automatically takes steps to enforce policy compli-
ance, establish security baselines, and identify and analyze threats          One other issue that may arise as you transition to centralized,
for remediation. Look for a solution that allows you to exercise              mainframe-based security for your organization relates to staff
fine-grained control over security commands to prevent security                limitations. For example, you may not have staff with sufficient
errors from occurring or security intrusions from causing dam-                mainframe operations expertise to manage security effectively.
age. And look for capabilities that allow the solution to readily             Or you may have non-mainframe users who need to issue secu-
close off avenues of attack such as unused security definitions                rity commands to the mainframe from within their own applica-
and privileged-user and trusted-user abuses by maintaining a                  tion environments. The security management solution you select
security system that is current.                                              should be designed to accommodate such limitations. Look for a
                                                                              solution that allows tasks to be performed at the department
In the interest of efficiency, you want to be sure that your secu-            level, where staff members need not have access to all security
rity management solution is set up to handle most routine tasks               commands but might benefit from simpler departmental
automatically. This will not only reduce costs and complexity,                administration, or might benefit from ready access from their
but also improve user productivity—and allow administrators                   current online environment. Attention to these kinds of opera-
                                                                              tional details will help ensure successful centralization of security
                                                                              operations on the mainframe.


Security management

Look for a solution that:                                                                                IBM                   Other vendor

Automates and simplifies routine administrative tasks so that they can be performed with                   ✓
minimal training and little administrative effort.

Identifies and analyzes IBM Resource Access Control Facility (RACF®) problems for remedi-                  ✓
ation to minimize the threat of a security breach or compliance exposure and to lower
administrative costs.

Displays data from the active (live) RACF database, including recent changes by other                     ✓
administrators, to allow administrators to immediately verify the effect of changes.

Uses actual database usage information to analyze profiles and perform database cleanup,                   ✓
improving the integrity of system security (by eliminating unused or obsolete profiles and
permits) and minimizing the manual effort required by compliance processes.

Reports on actual usage of profiles and authorizations and relates that information to cur-                ✓
rent profiles and authorizations defined in the current RACF database, enabling a better
understanding of how profiles and authorizations are used in production.
4   Centralizing security on the mainframe




Security management

Look for a solution that:                                                                         IBM   Other vendor
Simplifies the management of multiple RACF databases, allowing you to send and execute             ✓
the same commands to multiple systems, keeping security synchronized.

Creates a mirrored copy of the RACF database offline so that administrators can verify con-       ✓
figuration changes before implementing them, reducing the risk of introducing errors into the
production database.

Combines audit and administrative capabilities to provide end-to-end monitoring and               ✓
remediation of security and security life cycle management for governance and compliance
purposes.

Stores non-security/non-RACF information (such as custom fields like telephone numbers,            ✓
accounting codes and email addresses) in the RACF database to reduce organizational
costs, improve compliance reporting and consolidate user information.

Supports policy definitions to provide mandatory and default values by automating the              ✓
process of ensuring that appropriate values are used, so that preventative controls can be
enabled to improve security.

Prevents non-compliant administrative command execution by automatically verifying com-           ✓
mand keywords against specified policies as soon as a command is issued, reducing the
risk of a security breach due to either error or malicious intent.

Stores changes to RACF database profiles to make it easy to detect profile changes without          ✓
labor-intensive searches, log files investigation or guesswork.

Can be independently installed on all systems on which you want to enforce policies, elimi-       ✓
nating the need to design, code and maintain custom-coded routines to handle parsing of
keywords along with installation exit code.

Allows selective distribution of command access to grant users granular access to only the        ✓
specific commands they need to do their jobs, reducing the risk of accidental or malicious
breaches by privileged users.

Allows decentralization of RACF administration so that routine tasks can be performed at          ✓
the department level using an intuitive easy UI, rather than at the corporate level, optimizing
use of administrator time by freeing skilled security administrators to focus on higher-value
activities.

Permits customization of commands so that administrators view only the commands they              ✓
are allowed to perform, reducing the risk of incorrect commands, insider breaches, and
abuse of privilege.

Enables decentralized administration over your standard network, eliminating the cost and         ✓
effort of rolling out extra TSO/ISPF terminals.

Allows customization of screens to show only pre-selected options and fields to decentral-         ✓
ized administrators, minimizing security exposures associated with providing too much
information.
IBM Software   5




Security management

Look for a solution that:                                                                               IBM                  Other vendor
Provides easy access to the active (live) RACF database so that help-desk staff can view                 ✓
accurate, current information about users, groups and resource profiles.

Makes it possible to add new users by simply cloning existing user templates and entering                ✓
new names, reducing the risk of assigning incorrect authorizations.

Offers robust, non-intrusive capabilities to help simplify the process of managing mainframe             ✓
security by reducing complex management tasks to one-step actions that can be per-
formed without extensive RACF knowledge.

Enables RACF administration from a user-friendly interface with IBM CICS® application                    ✓
servers so that CICS users can issue security commands directly without having to leave
the familiar CICS environment and without having to write custom CICS applications.

Provides a web-enablement CICS-RACF API so that web applications can use RACF func-                      ✓
tions for security administration, authentication and access control.

Facilitates access checks for more than 2,000 resources so that you can improve applica-                 ✓
tion performance by replacing internal application security with RACF security.

Centralizes (in the RACF database) security for legacy and internally developed CICS appli-              ✓
cations to enhance application security and auditability.

Enables you to empower managers to view, sort and annotate audit reports, and combine                    ✓
multiple reports for automatic distribution—saving time and providing focused reports.

Analyzes SMF log files (from live SMF data sets or from extracted SMF data on tape or disk)               ✓
to create a comprehensive audit trail.

Supports both IBM z/OS® and IBM z/VM® operating systems.                                                 ✓




2. Identity and access management                                             control policies across every application, data source, operating
Successful access management is an essential aspect of main-                  system and organizational boundary. They should be standards-
frame security. But keeping access to resources secure is a                   based and should easily integrate with other systems.
challenge in heterogeneous environments, where resources are
likely to be associated with many different web and non-web                   An effective identity and access management solution also needs
platforms. Managing access in such an environment requires the                to be designed to efficiently manage users and user information
ability to control access from a centralized point and to address             throughout the entire user life cycle—so that IT staff doesn’t
access issues in an integrated way. Accordingly, the identity and             end up spending an inordinate amount of time managing per-
access management capabilities that are part of your mainframe                missions and policies (not to mention user roles, identities and
security efforts should allow you to manage and enforce access
6   Centralizing security on the mainframe




access rights) on a painstaking case-by-case basis. A centralized,               Look for an identity and access management solution that
automated approach will enable you to manage tasks associated                    focuses on ease of use, too. For IT users, it should have an intu-
with user roles, identities, credentials and access permissions                  itive, easy-to-customize user interface; a variety of configuration
using consistent, standardized processes instead of slow, error-                 wizards and templates; and out-of-the-box integration with
prone manual methods.                                                            authentication applications. For business users such as managers
                                                                                 and auditors, it should describe access rights in business-friendly
                                                                                 language that’s easily understood by nontechnical personnel.


Identity and access management

Look for a solution that:                                                                                  IBM                   Other vendor

Provides integrated role-based access control (RBAC), rule/attribute-based access control                   ✓
(ABAC) and request-based provisioning options.

Tightly integrates user provisioning with role management, separation of duties and recertifi-               ✓
cation with open interfaces for integration with continuous business controls systems.

Supports tools to build user provisioning workflows using both simple wizard-based naviga-                   ✓
tion and a drag-and-drop GUI for more advanced business processes—all from a common
web interface.

Reconciles accounts automatically and in an on-demand way to rapidly and reliably dis-                      ✓
cover invalid “orphaned” accounts and unnecessary entitlements, and to initiate either
automatic or manual remediation processes.

Offers an intuitive, customizable administration GUI with point-and-click capabilities that                 ✓
make it easy to create new user GUI views and to track status.

Provides a complete and integrated federation and trust management solution that includes                   ✓
a general-purpose security token service for common standards-based identity propaga-
tion within a web services/SOA environment.

Provides standards-based development for extension of the security token service via                        ✓
Eclipse-based plug-ins.

Includes robust directory and directory integration and synchronization products at no addi-                ✓
tional charge.

Provides standards-based (XACML) entitlements management (roles, rules, attributes) for                     ✓
data security and fine-grained access control.

Provides SOA security policy management (message protection policies support).                              ✓
IBM Software   7




Identity and access management

Look for a solution that:                                                                        IBM   Other vendor
Integrates widely with identity servers, applications, middleware, operating systems and plat-   ✓
forms including enterprise service bus.

Supports multiple standards for cross-site authentication, including Security Assurance          ✓
Markup Language (SAML), Liberty Alliance, OpenID and Web Services Federation
Language (WS-Federation) protocols.

Supports Java™ EE and Microsoft® .NET application and web services integration using             ✓
existing application identity (e.g. LTPA, Kerberos and SAML) protocols.

Supports mainframe application and web services integration including using RACF                 ✓
PassTicket protocol.

Integrates with IBM WebSphere® DataPower® for secured web-services support in the                ✓
demilitarized zone.

Provides business-to-consumer (B2C) self-service interfaces for user enrollments, user vali-     ✓
dation, account updates, and password resets and synchronization.

Utilizes a web authorization approach that offers high performance and scales to user            ✓
implementations in the tens of millions as well as to hundreds of applications.

Offers a flexible Java web-based architecture that can protect resources using either a           ✓
hardened reverse proxy, or a plug-in module to an existing web server. (In certain cases, a
dedicated proxy can offer a higher level of security.)

Provides session management services that allow for the immediate termination of all active      ✓
sessions for a malicious user.

Offers a post office (anti-spam) feature that aggregates like emails and user work items.        ✓

Supports B2C federation with emerging user-centric identities including OpenID and               ✓
Information Card Profile using identity selectors such as Microsoft CardSpace or Higgins
identity framework.

Includes an enterprise single sign-on (ESSO) solution that is distinguished in the market-       ✓
place by its advanced capabilities to work with many different kinds of applications, integra-
tion with strong authentication, flexible approach to session management, and ability to log
and audit end-user activities.
8   Centralizing security on the mainframe




Identity and access management

Look for a solution that:                                                                       IBM   Other vendor
Provides an ESSO solution that integrates with web, desktop, teletype and mainframe appli-      ✓
cations, as well as many client device platforms such as Microsoft Windows® CE and
Windows XPe to accommodate the broadest possible range of applications.

Offers a wide choice of authentication factors, including user IDs and passwords, USB           ✓
smart tokens, building access badges, active RFID, biometrics and an open authentication
devices interface for easy integration of third-party devices.

Enables account usage auditing by tracking application logins/logouts.                          ✓

Integrates with provisioning to provide automated check-out/check-in of shared and privi-       ✓
leged identities for privileged identity management.

Allows administrators to apply a meaningful description to a fine-grained resource, catego-      ✓
rize it for quick reference and search, assign an owner to it, define unique approval and
recertification workflows, and provide detailed reports on these resources.

Allows enterprise architects to model security policies and create security policy templates    ✓
for consistent use across the organization.

Allows application owners to create data entitlements using application roles and attributes    ✓
without requiring knowledge of the IT operations environment.

Has a workflow that seamlessly integrates with SAP and Oracle ERP, and fine-grained               ✓
separation-of-duties checking with flexible exception-handling methods.

Provides a centralized management GUI for control and making modifications, eliminating          ✓
the need to manually update each individual adapter to reflect changes in authentication
and authorization methodology.

Incorporates business rules into access control decisions and evaluates these rules dynami-     ✓
cally at run time.

Sets an access policy that automatically detects and remediates both intentional and inad-      ✓
vertent non-compliance events in real time.

Scales to tens of millions of users for authentication and authorization; also scales to meet   ✓
the needs of intranet, extranet and Internet user populations.

Enables multiple policy enforcement points in a web-services infrastructure, for DataPower,     ✓
WebSphere and other web services resources.

Enables multiple policy enforcement points for application and data sources such as             ✓
Microsoft SharePoint, WebSphere Portal, WebSphere Application Server, IBM FileNet®,
IBM DB2®, and other application and data resources.
IBM Software   9




3. Monitor, audit and alert                                                    security events. End-to-end monitoring and remediation are
To keep resources secure, you need mainframe security that con-                essential to effectively dealing with potential exposures in
tinually monitors for access breaches and other security events,               centralized-security scenarios.
and then alerts the proper administrative staff of any anomalies
that are detected. This is especially true in environments where               The solutions you choose should place a high priority on moni-
resources are likely to be associated with a variety of platforms              toring and alerts related to areas that you have designated as par-
and types of users.                                                            ticularly sensitive. If your organization is a public company, for
                                                                               example, you want to be able to monitor critical system settings
Real-time monitoring is essential to effective audit-and-alert                 that are specifically required by SOX, for example. Or if you are
capabilities. You need to be able to conduct live data analysis, for           at high risk for insider threats to security, the solution you
up-to-the-minute accuracy in detecting problems and alerting                   choose should include features such as privileged user monitor-
administrators to them. And you need this capability not just                  ing to help control that risk.
within the mainframe operating system, but in databases and
other subsystems that are also affected when you are using the                 Finally, audit and alert capabilities should be easy to use and
mainframe as a security hub. You also need audit-and-alert capa-               manage—automatically detecting system changes to minimize
bilities that are integrated to enterprise audit, compliance and               risk, issuing timely alerts with no special action required on
monitoring solutions, to enable appropriate responses to                       the part of administrators, and providing a single view of
                                                                               security events to make it easier to monitor events across the
                                                                               organization.


Monitor, audit and alert

Look for a solution that:                                                                                IBM                  Other vendor

Allows live data access and analysis for up-to-the-minute audit accuracy, including ranking               ✓
and highlighting current security concerns and audit priorities.

Provides live analysis beyond z/OS and RACF to detect problems in UNIX® subsystem                         ✓
security definitions and to display critical activity in DB2 systems on the mainframe.

Checks for and enforces program signatures by identifying programs that are expected to                   ✓
have a valid signature and verifying whether the signature is present, to aid in compliance
with PCI Data Security Standard.

Delivers optional custom reports daily via email when specific events occur or when there is               ✓
a possible security breach.

Uses flexible and customized reporting and alert language to make it easy to create new                    ✓
reports (installation-specific, RACF and SMF) without the need for consulting assistance.

Includes DBCS support for audit reports, with built-in support for translating reports and                ✓
menus for NLS support.

Includes NLS support for translating report titles, column headers, constants, and selection              ✓
and scan values to support DBCS characters in search strings and formatted output.
10 Centralizing security on the mainframe




Monitor, audit and alert

Look for a solution that:                                                                         IBM   Other vendor
Analyzes SMF log files to create a comprehensive audit trail in the event of incidents such as     ✓
policy exceptions (for example, logging in after work hours).

Leverages external files from existing databases and corporate applications (such as a per-        ✓
sonnel database) and presents the data alongside technical data to make reports highly
usable.

Uses the RACF database to analyze profiles and get fast answers to questions such as               ✓
“Who has access to this data set?” Allows you to map your own events into the W7 model
(who, what, when, on what, where, where from, and where to) and filter out events on the
mainframe side without editing the data set.

Detects system changes (such as whether a member was added, deleted or changed) to                ✓
minimize security risks.

Helps define a baseline for RACF security parameters, detects profiles and parameters that          ✓
differ from the baseline, and monitors and measures baseline changes to simplify imple-
mentation of security auditing.

Includes a powerful system integrity analysis feature to detect and analyze system integrity      ✓
breaches and other irregularities and rank them according to degree of exposure to help
determine appropriate corrective action.

Provides integrated, end-to-end monitoring and remediation capabilities to quickly diagnose       ✓
and address failures or exposures so that administrators can move quickly to remediate
them.

Links seamlessly to enterprise audit and compliance solutions to include mainframe security       ✓
information in company-wide reports.

Provides a threat knowledge base with parameters from active configurations to help isolate        ✓
relevant attack threats and patterns, detect multiple types of attacks and configuration
threats (including those external to the event log) and enable swift corrective action.

Offers multiplatform monitoring capabilities to identify resources that need protection across    ✓
multiple platforms, to help maintain data integrity and stay ahead of potential security policy
violations.

Automatically sends timely security alerts to enterprise audit, compliance and monitoring         ✓
solutions, as well as to network and enterprise consoles, to enable rapid response to secu-
rity events and to easily include mainframe data in company-wide audit and compliance
reports.

Continuously monitors critical system settings per SOX and JSOX audit requirements to             ✓
detect changes for which there are no event triggers.

Enables alerts to be configured to notify administrative and management personnel when             ✓
changes are detected—even those for which there are no event triggers.
IBM Software 11




Monitor, audit and alert

Look for a solution that:                                                                                  IBM                   Other vendor
Allows support users, consultants and other authorized users to create custom alert mes-                    ✓
sages by modifying existing alert messages or creating new ones based on installation-
defined requirements.

Centralizes and automates log management to reduce the time and effort required to                          ✓
collect, organize, archive, investigate and retrieve logs for analysis.

Provides insider threat analysis and privileged user monitoring to reduce the risk of security              ✓
events originating from inside the organization.

Provides a single, streamlined view of security events from thousands of network and secu-                  ✓
rity devices, hosts, applications and other sources to minimize the effort required to monitor
events across the organization.

Provides extensive audit capabilities including the ability to audit UNIX security definitions on            ✓
the mainframe, DB2 auditable security events, CICS security events, Linux® for System z
events, and auditable security events from IBM Tivoli® Key Lifecycle Manager, WebSphere
Application Server, and Tivoli OMEGAMON®. It also provides auditing of the communica-
tions server network configuration for TCP/IP and provides PDS(E) member-level auditing.




4. Audit and compliance reporting                                                major regulations are extremely helpful, as are out-of-the-box
The ability to produce reports that prove compliance is crucial                  best practice reports, which can narrow down the thousands of
for organizations dealing with multiple complex regulations,                     potentially relevant individual reports that are out there to a few
especially in increasingly heterogeneous environments. To effec-                 dozen. Templates and models like these can save significant
tively provide all the information required to demonstrate com-                  amounts of time in report preparation.
pliance with internal security policies and external regulations,
you need reporting that can deliver on several levels.                           Once reports are generated, it should be easy to get them
                                                                                 out to the people who need them, and easy for those people to
First, you need a mainframe security solution that can quickly                   put them to use. Most of those who need audit and compliance
and effectively sort through data from multiple sources through-                 reports are nontechnical stakeholders, including business owners,
out the organization to detect compliance-relevant information                   regulators, external auditors and internal audit staff. Look for the
about security events. The solution you choose must also have                    ability to translate highly technical compliance data into reports
the flexibility to report on regulation-specific concerns, so that                 that are written in plain language that can be easily understood
no matter what regulations or standards apply to your organiza-                  by these users. Make sure you have a variety of output formats
tion or industry, you have the capability to produce reports that                available to you to easily accommodate different user preferences
are specific to them.                                                             (such as HTML, PDF, .xls, etc.) You will also benefit from built-
                                                                                 in capabilities for distributing reports to those who need them
Because there are so many regulations reflecting varying degrees                  and for automating the report scheduling and distribution
of complexity, you also need a solution that focuses on simplify-                process.
ing the process of reporting. Reporting templates covering the
12 Centralizing security on the mainframe




Audit and compliance reporting

Look for a solution that:                                                                        IBM   Other vendor

Enables you to easily sort and browse a multitude of events and analyze them from different      ✓
vectors.

Translates data into detailed, easy-to-understand reports that can be used by regulators,        ✓
external and corporate auditors, and other nontechnical personnel.

Includes the user’s real name as known by the directory or security system to make the           ✓
report more readable.

Provides compliance management modules with regulation-specific reporting capabilities            ✓
(including default templates) covering major regulations and standards including ISO 27001,
SOX, PCI-DSS, HIPAA, GLBA, Basel II, FISMA, COBIT, NERC-CIP and others.

Includes out-of-the-box parameterized best-practice audit reports that reduce hundreds or        ✓
thousands of individual reports to about 50 parameterized reports.

Enables distribution of reports to business owners and stakeholders for review, approval,        ✓
comment and action.

Uses a patent-pending strong normalization model.                                                ✓

Includes a flexible custom report writer that is optimized to the normalization model, allowing   ✓
you to create your own compliance and audit reports without needing to understand or
write SQL.

Automates report distribution to business owners as part of the overall compliance and           ✓
business process.

Offers a common system for scheduling, distributing, viewing and customizing reports.            ✓

Provides compliance-specific policy templates that represent the controls within a regulation.    ✓

Provides compliance-specific reports that allow you to monitor compliance posture against         ✓
specific controls.

Provides compliance reports that are designed, created and based on standards (versus            ✓
renaming operational reports).

Provides a compliance dashboard that shows the current compliance posture in the vocab-          ✓
ulary of existing regulations or policies for easy understanding.

Provides trending information at the dashboard level to indicate the trend for compliance        ✓
posture and to help ensure that goals are being achieved.

Provides drill-down from the high-level compliance dashboard through to the underlying           ✓
detail events for further investigation.
IBM Software 13




    Audit and compliance reporting

    Look for a solution that:                                                                               IBM                  Other vendor
    Provides reporting at the raw log level using a simple query mechanism for forensic-type                 ✓
    investigations.

    Includes a full-featured reporting engine with scheduled reporting.                                      ✓

    Facilitates communication of threat levels and security activities through out-of-the-box                ✓
    standard and customizable report templates, driven from an automated report scheduler.

    Provides a wide variety of report output formats, including HTML, PDF, CSV and .xls export-              ✓
    ing of all graphs and charts.

    Offers privileged user monitoring, reporting and auditing on databases, applications, servers            ✓
    and mainframes.




Selecting the right vendor                                                         Are your vendor’s products tightly integrated for seamless
The provider you choose should be able to support the full                         functionality?
breadth of your security requirements. Ideally, you will also want                 The more integrated the solution, the less work you have to do
a provider who can support you throughout the process of                           to streamline functions. Make sure the vendor can respond
implementing your solution. Before you select a provider, make                     quickly to changes in operating systems and System z infrastruc-
sure to ask these questions:                                                       ture, taking immediate advantage of platform enhancements.

Is your vendor focused on true end-to-end enterprise                               Does your vendor’s technology support your business
security needs?                                                                    goals?
With a vendor who is focused too narrowly on a point solution                      Look for vendors whose solutions are designed to facilitate your
that addresses only a particular environment, you can run into                     business objectives. Do their solutions promote efficiencies,
the “islands of security” problem. While this document focuses                     reduce business service deployment time, reduce costs, enhance
on mainframe security, that is just one key part of the challenge.                 compliance and speed time to market?
Choose a vendor who can address the big picture, including:
                                                                                   Does your vendor provide rapid time to value?
                                                                                   A cost-effective solution includes a number of key features
●    Mainframe security
                                                                                   designed to provide easy configuration, integration and mainte-
●    Application security
                                                                                   nance, even in a complex enterprise environment.
●    Information and data security
●    Threat protection
●    Managed services
●    Service management
●    Multiple platforms and applications
14 Centralizing security on the mainframe




What type of global presence and support does your vendor            Address your mainframe security needs
have?
                                                                     with IBM
If your organization has international offices, you should look
                                                                     When you evaluate mainframe security solutions to meet your
for a vendor with a global presence and proven international
                                                                     goals, you will find that IBM offers not only a best-of-breed
business experience. Make sure the vendor can support your
                                                                     solution, but also exceptional breadth and integration across its
offices abroad with their own local resources.
                                                                     security solutions. As organizations look for ways to extend the
                                                                     security that is enabled by the mainframe to many different soft-
Is the solution supported by a mature organization with the
expertise and bandwidth that can be relied on when you               ware and hardware platforms, IBM is responding with security
need it?                                                             that spans the entire IT infrastructure. Today, IBM Tivoli
Your vendor should offer highly responsive and highly effective      and IBM Security solutions combine with System z hardware
customer support. Find a vendor that has a proven support            and software to provide comprehensive, centralized security
organization to help you maximize the value of your software         capabilities for organizations with distributed, multiplatform
investment.                                                          IT environments.

Are the vendor’s solutions consistently rated highly by the          The IBM Security zSecure suite consists of a variety of modular
analyst community?                                                   components that are designed to help you quickly and efficiently
Look for solutions that are recognized through independent           manage mainframe RACF databases. Specific security manage-
analysis and examination across multiple dimensions by leading       ment components of the suite include:
analysts.
                                                                     ●   IBM Security zSecure Admin to simplify RACF
How sure are you of your vendor’s stability and staying
                                                                         administration.
power in today’s economy?
                                                                     ●   IBM Security CICS Toolkit, which enables users to issue
A big issue in today’s economy is vendor stability and visibility.
                                                                         RACF commands from CICS application servers.
You should consider a vendor who has a long history in the
                                                                     ●   IBM Security zSecure Command Verifier, which enforces
industry, a solid, forward-looking strategy and the resources to
                                                                         RACF policies and helps reduce security risks stemming from
withstand adverse economic conditions.
                                                                         internal errors and non-compliant commands.
Can your vendor deliver products that are strategically
                                                                     ●   IBM Security zSecure Visual, which provides a point-and-click
designed and technically superior?                                       interface to enable less skilled administrators to perform many
When comparing various security solutions, look for technical            administrative functions without the need for extensive RACF
superiority—well-designed functionality, an intelligent architec-        knowledge.
tural design and broad support for industry standards.               ●   IBM Tivoli zSecure Manager for RACF z/VM, which extends
                                                                         administration capabilities to mainframes running as guests on
                                                                         IBM z/VM.
IBM Software 15




Audit and alert components of the zSecure suite include                extremely flexible reporting language to make it easy to create
IBM Security zSecure Audit and IBM Security zSecure Alert,             new reports, uses built-in support for translating reports and
which combine to detect and report mainframe security events           menus, and leverages external file support to enhance report
and exposures. IBM Security zSecure Audit is an audit solution         usability.
that provides live analysis of critical information on mainframes,
highlights security concerns and ranks audit priorities based on       IBM Tivoli identity and access solutions provide efficient, secure
the relative impact of the problems it detects. IBM Security           and compliant access to mainframe and other resources, helping
zSecure Alert offers real-time mainframe threat detection, with        organizations ensure that the right users have access to the right
alerts and automated commands to counter attacks and miscon-           information in a timely manner. Tivoli Identity Manager pro-
figurations. Integration between these two solutions enables end-       vides a secure, policy-based solution for managing user roles,
to-end monitoring and remediation to enable administrators to          identities and access rights. Tivoli Access Manager solutions
quickly diagnose mainframe security failures or exposures and          enable controls for centralized security management in increas-
take appropriate steps to remediate them.                              ingly distributed, multiplatform environments; they specifically
                                                                       provide centralized authentication, policy management and
IBM Tivoli Security Information and Event Management                   access control services for web resources, systems and hosted
combines with IBM Security zSecure Audit to deliver extensive          applications. Tivoli Federated Identity Manager provides the
audit and compliance reporting capabilities. Tivoli Security           federated single sign-on and user access management techniques
Information and Event Management provides audit and compli-            that are required for integration across organizational bound-
ance reports in plain language and includes a variety of reporting     aries. This solution provides an identity trust framework that is
capabilities specific to different regulations, so that organizations   ideal for protecting assets when users are connected to critical
can easily target their own specific compliance needs. The solu-        resources from a variety of access points, including over the
tion includes capabilities for custom report writing, automated        Internet.
report distribution and scheduling, and support for a wide vari-
ety of report output formats. IBM Security zSecure Audit offers        These offerings are all part of a larger IBM mainframe security
the option of emailing reports daily when it detects a specific         software portfolio that also includes solutions for encryption key
event or a possible security breach, based on live analysis of         management, database protection, application testing, network
critical information in the mainframe environment. It uses an          security and more. IBM Security solutions can help you to con-
                                                                       solidate security management on the mainframe and leverage its
                                                                       security strengths to establish it as your enterprise security hub.
For more information
To learn more about IBM mainframe security solutions, contact
your IBM representative or IBM Business Partner, or visit:
ibm.com/security

                                                                                 © Copyright IBM Corporation 2010

                                                                                 IBM Corporation Software Group
                                                                                 Route 100
                                                                                 Somers, NY 10589
                                                                                 U.S.A.

                                                                                 Produced in the United States of America
                                                                                 December 2010
                                                                                 All Rights Reserved

                                                                                 IBM, the IBM logo, ibm.com, System z and Tivoli are trademarks or
                                                                                 registered trademarks of International Business Machines Corporation in the
                                                                                 United States, other countries, or both. If these and other IBM trademarked
                                                                                 terms are marked on their first occurrence in this information with a
                                                                                 trademark symbol (® or ™), these symbols indicate U.S. registered or
                                                                                 common law trademarks owned by IBM at the time this information was
                                                                                 published. Such trademarks may also be registered or common law
                                                                                 trademarks in other countries. A current list of IBM trademarks is available
                                                                                 on the web at “Copyright and trademark information” at
                                                                                 ibm.com/legal/copytrade.shtml

                                                                                 Java and all Java-based trademarks and logos are trademarks of Sun
                                                                                 Microsystems, Inc. in the United States, other countries, or both.

                                                                                 Linux is a registered trademark of Linus Torvalds in the United States, other
                                                                                 countries, or both.

                                                                                 Microsoft and Windows are trademarks of Microsoft Corporation in the
                                                                                 United States, other countries, or both.

  The information provided in this document is distributed “as is”               UNIX is a registered trademark of The Open Group in the United States
  without any warranty, either express or implied. IBM expressly disclaims       and other countries.
  any warranties of merchantability, fitness for a particular purpose or
                                                                                 Other company, product and service names may be trademarks or service
  noninfringement. IBM products are warranted according to the terms and
                                                                                 marks of others.
  conditions of the agreements (e.g. IBM Customer Agreement, Statement
  of Limited Warranty, International Program License Agreement, etc.)            References in this publication to IBM products and services do not
  under which they are provided.                                                 imply that IBM intends to make them available in all countries in which
                                                                                 IBM operates.
  The customer is responsible for ensuring compliance with legal
  requirements. It is the customer’s sole responsibility to obtain advice of     No part of this document may be reproduced or transmitted in any form
  competent legal counsel as to the identification and interpretation of any      without written permission from IBM Corporation.
  relevant laws and regulatory requirements that may affect the customer’s
  business and any actions the customer may need to take to comply with          Product data has been reviewed for accuracy as of the date of initial
  such laws. IBM does not provide legal advice or represent or warrant that      publication. Product data is subject to change without notice. Any statements
  its services or products will ensure that the customer is in compliance with   regarding IBM’s future direction and intent are subject to change or
  any law or regulation.                                                         withdrawal without notice, and represent goals and objectives only.


                                                                                          Please Recycle




                                                                                                                                        TIO14007-USEN-00

Mais conteúdo relacionado

Mais procurados

Altiris IT Management Suite 7
Altiris IT Management Suite 7Altiris IT Management Suite 7
Altiris IT Management Suite 7Symantec
 
Symantec Control Compliance Suite 11, February 2012
Symantec Control Compliance Suite 11, February 2012Symantec Control Compliance Suite 11, February 2012
Symantec Control Compliance Suite 11, February 2012Symantec
 
SOC3D_Brochure_NEW_Digital
SOC3D_Brochure_NEW_DigitalSOC3D_Brochure_NEW_Digital
SOC3D_Brochure_NEW_DigitalOscar Williams
 
AccelOps & SOC-NOC Convergence
AccelOps & SOC-NOC ConvergenceAccelOps & SOC-NOC Convergence
AccelOps & SOC-NOC ConvergenceStephen Tsuchiyama
 
The ultimate guide to cloud computing security-Hire cloud expert
The ultimate guide to cloud computing security-Hire cloud expertThe ultimate guide to cloud computing security-Hire cloud expert
The ultimate guide to cloud computing security-Hire cloud expertChapter247 Infotech
 
System Center Endpoint Protection 2012 R2
System Center Endpoint Protection 2012 R2System Center Endpoint Protection 2012 R2
System Center Endpoint Protection 2012 R2Norman Mayes
 
NIC2012 - System Center Endpoint Protection 2012
NIC2012 - System Center Endpoint Protection 2012NIC2012 - System Center Endpoint Protection 2012
NIC2012 - System Center Endpoint Protection 2012Nicolai Henriksen
 
Audit Sample Report
Audit Sample ReportAudit Sample Report
Audit Sample ReportRandy James
 
Hipaa checklist - information security
Hipaa checklist - information securityHipaa checklist - information security
Hipaa checklist - information securityVijay Sekar
 
Chapter 2 auditing it governance controls
Chapter 2 auditing it governance controlsChapter 2 auditing it governance controls
Chapter 2 auditing it governance controlsjayussuryawan
 
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSesTECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSesSymantec
 
VMSDeploymentGuide_Extract1a
VMSDeploymentGuide_Extract1aVMSDeploymentGuide_Extract1a
VMSDeploymentGuide_Extract1aTom - Creed
 
CoreTrace Whitepaper: Whitelisting And Control Systems
CoreTrace Whitepaper: Whitelisting And Control SystemsCoreTrace Whitepaper: Whitelisting And Control Systems
CoreTrace Whitepaper: Whitelisting And Control SystemsCoreTrace Corporation
 
Chap5 2007 C I S A Review Course
Chap5 2007 C I S A Review CourseChap5 2007 C I S A Review Course
Chap5 2007 C I S A Review CourseDesmond Devendran
 
NIST Definition of Cloud Computing
NIST Definition of Cloud ComputingNIST Definition of Cloud Computing
NIST Definition of Cloud ComputingScientia Groups
 
CoreTrace Whitepaper: Application Whitelisting And Energy Systems
CoreTrace Whitepaper: Application Whitelisting And Energy SystemsCoreTrace Whitepaper: Application Whitelisting And Energy Systems
CoreTrace Whitepaper: Application Whitelisting And Energy SystemsCoreTrace Corporation
 
IT - Enterprise Service Operation Center
IT - Enterprise Service Operation CenterIT - Enterprise Service Operation Center
IT - Enterprise Service Operation CenterSameer Paradia
 

Mais procurados (20)

Altiris IT Management Suite 7
Altiris IT Management Suite 7Altiris IT Management Suite 7
Altiris IT Management Suite 7
 
Patch Management
Patch ManagementPatch Management
Patch Management
 
Symantec Control Compliance Suite 11, February 2012
Symantec Control Compliance Suite 11, February 2012Symantec Control Compliance Suite 11, February 2012
Symantec Control Compliance Suite 11, February 2012
 
SOC3D_Brochure_NEW_Digital
SOC3D_Brochure_NEW_DigitalSOC3D_Brochure_NEW_Digital
SOC3D_Brochure_NEW_Digital
 
AccelOps & SOC-NOC Convergence
AccelOps & SOC-NOC ConvergenceAccelOps & SOC-NOC Convergence
AccelOps & SOC-NOC Convergence
 
The ultimate guide to cloud computing security-Hire cloud expert
The ultimate guide to cloud computing security-Hire cloud expertThe ultimate guide to cloud computing security-Hire cloud expert
The ultimate guide to cloud computing security-Hire cloud expert
 
System Center Endpoint Protection 2012 R2
System Center Endpoint Protection 2012 R2System Center Endpoint Protection 2012 R2
System Center Endpoint Protection 2012 R2
 
NIC2012 - System Center Endpoint Protection 2012
NIC2012 - System Center Endpoint Protection 2012NIC2012 - System Center Endpoint Protection 2012
NIC2012 - System Center Endpoint Protection 2012
 
Audit Sample Report
Audit Sample ReportAudit Sample Report
Audit Sample Report
 
Hipaa checklist - information security
Hipaa checklist - information securityHipaa checklist - information security
Hipaa checklist - information security
 
Chapter 2 auditing it governance controls
Chapter 2 auditing it governance controlsChapter 2 auditing it governance controls
Chapter 2 auditing it governance controls
 
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSesTECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
 
VMSDeploymentGuide_Extract1a
VMSDeploymentGuide_Extract1aVMSDeploymentGuide_Extract1a
VMSDeploymentGuide_Extract1a
 
CoreTrace Whitepaper: Whitelisting And Control Systems
CoreTrace Whitepaper: Whitelisting And Control SystemsCoreTrace Whitepaper: Whitelisting And Control Systems
CoreTrace Whitepaper: Whitelisting And Control Systems
 
Chap5 2007 C I S A Review Course
Chap5 2007 C I S A Review CourseChap5 2007 C I S A Review Course
Chap5 2007 C I S A Review Course
 
NIST Definition of Cloud Computing
NIST Definition of Cloud ComputingNIST Definition of Cloud Computing
NIST Definition of Cloud Computing
 
SIEM - Your Complete IT Security Arsenal
SIEM - Your Complete IT Security ArsenalSIEM - Your Complete IT Security Arsenal
SIEM - Your Complete IT Security Arsenal
 
CoreTrace Whitepaper: Application Whitelisting And Energy Systems
CoreTrace Whitepaper: Application Whitelisting And Energy SystemsCoreTrace Whitepaper: Application Whitelisting And Energy Systems
CoreTrace Whitepaper: Application Whitelisting And Energy Systems
 
IT - Enterprise Service Operation Center
IT - Enterprise Service Operation CenterIT - Enterprise Service Operation Center
IT - Enterprise Service Operation Center
 
Gpc case study_eng_0221
Gpc case study_eng_0221Gpc case study_eng_0221
Gpc case study_eng_0221
 

Destaque

Ibm app security assessment_ds
Ibm app security assessment_dsIbm app security assessment_ds
Ibm app security assessment_dsArun Gopinath
 
Strategies for assessing cloud security
Strategies for assessing cloud securityStrategies for assessing cloud security
Strategies for assessing cloud securityArun Gopinath
 
Rewriting the rules of patch management
Rewriting the rules of patch managementRewriting the rules of patch management
Rewriting the rules of patch managementArun Gopinath
 
Ibm xiv storage your ideal cloud building block
Ibm xiv storage   your ideal cloud building blockIbm xiv storage   your ideal cloud building block
Ibm xiv storage your ideal cloud building blockArun Gopinath
 
Secure by design building id based security
Secure by design building id based securitySecure by design building id based security
Secure by design building id based securityArun Gopinath
 
Realizing business value with iam
Realizing business value with iamRealizing business value with iam
Realizing business value with iamArun Gopinath
 
Securing virtualization in real world environments
Securing virtualization in real world environmentsSecuring virtualization in real world environments
Securing virtualization in real world environmentsArun Gopinath
 
Cloud computing white paper who do you trust
Cloud computing white paper who do you trustCloud computing white paper who do you trust
Cloud computing white paper who do you trustArun Gopinath
 
Educ 2190 mathematics stage 5 – year 10 – statistics
Educ 2190   mathematics stage 5 – year 10 – statisticsEduc 2190   mathematics stage 5 – year 10 – statistics
Educ 2190 mathematics stage 5 – year 10 – statisticsMatthew Lovegrove
 
アレと Perl で AWS を - JAWS-UG Aomori #2
アレと Perl で AWS を - JAWS-UG Aomori #2アレと Perl で AWS を - JAWS-UG Aomori #2
アレと Perl で AWS を - JAWS-UG Aomori #2Eikichi Gotoh
 
English in the FLS, Bulgaria
English in the FLS, BulgariaEnglish in the FLS, Bulgaria
English in the FLS, BulgariaTanya Madjarova
 
MSU DL Workshop Aug 13 2013
MSU DL Workshop Aug 13 2013MSU DL Workshop Aug 13 2013
MSU DL Workshop Aug 13 2013Josh Johnson
 
Performance management (1)
Performance management (1)Performance management (1)
Performance management (1)Tixy Mariam Roy
 
The Day Ahead. 2-13-2013
The Day Ahead. 2-13-2013The Day Ahead. 2-13-2013
The Day Ahead. 2-13-2013Clint Hammond
 
Subversion to Git Migration
Subversion to Git MigrationSubversion to Git Migration
Subversion to Git MigrationTim Massey
 

Destaque (19)

Ibm app security assessment_ds
Ibm app security assessment_dsIbm app security assessment_ds
Ibm app security assessment_ds
 
Strategies for assessing cloud security
Strategies for assessing cloud securityStrategies for assessing cloud security
Strategies for assessing cloud security
 
Rewriting the rules of patch management
Rewriting the rules of patch managementRewriting the rules of patch management
Rewriting the rules of patch management
 
Ibm xiv storage your ideal cloud building block
Ibm xiv storage   your ideal cloud building blockIbm xiv storage   your ideal cloud building block
Ibm xiv storage your ideal cloud building block
 
Secure by design building id based security
Secure by design building id based securitySecure by design building id based security
Secure by design building id based security
 
Realizing business value with iam
Realizing business value with iamRealizing business value with iam
Realizing business value with iam
 
Secure by design
Secure by designSecure by design
Secure by design
 
Securing virtualization in real world environments
Securing virtualization in real world environmentsSecuring virtualization in real world environments
Securing virtualization in real world environments
 
Cloud computing white paper who do you trust
Cloud computing white paper who do you trustCloud computing white paper who do you trust
Cloud computing white paper who do you trust
 
Educ 2190 mathematics stage 5 – year 10 – statistics
Educ 2190   mathematics stage 5 – year 10 – statisticsEduc 2190   mathematics stage 5 – year 10 – statistics
Educ 2190 mathematics stage 5 – year 10 – statistics
 
アレと Perl で AWS を - JAWS-UG Aomori #2
アレと Perl で AWS を - JAWS-UG Aomori #2アレと Perl で AWS を - JAWS-UG Aomori #2
アレと Perl で AWS を - JAWS-UG Aomori #2
 
English in the FLS, Bulgaria
English in the FLS, BulgariaEnglish in the FLS, Bulgaria
English in the FLS, Bulgaria
 
03 02 wh_chris_walker
03 02 wh_chris_walker03 02 wh_chris_walker
03 02 wh_chris_walker
 
MSU DL Workshop Aug 13 2013
MSU DL Workshop Aug 13 2013MSU DL Workshop Aug 13 2013
MSU DL Workshop Aug 13 2013
 
Performance management (1)
Performance management (1)Performance management (1)
Performance management (1)
 
The Day Ahead. 2-13-2013
The Day Ahead. 2-13-2013The Day Ahead. 2-13-2013
The Day Ahead. 2-13-2013
 
Transformation program
Transformation programTransformation program
Transformation program
 
Subversion to Git Migration
Subversion to Git MigrationSubversion to Git Migration
Subversion to Git Migration
 
M robby f_mi2b_tugas 2
M robby f_mi2b_tugas 2M robby f_mi2b_tugas 2
M robby f_mi2b_tugas 2
 

Semelhante a Centralizing security on the mainframe

SecureGRC - Cloud based SaaS
SecureGRC - Cloud based SaaSSecureGRC - Cloud based SaaS
SecureGRC - Cloud based SaaSxmeteorite
 
A Pragmatic Approach to SIEM: Buy for Compliance, Use for Security
A Pragmatic Approach to SIEM: Buy for Compliance, Use for SecurityA Pragmatic Approach to SIEM: Buy for Compliance, Use for Security
A Pragmatic Approach to SIEM: Buy for Compliance, Use for SecurityTripwire
 
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdfthe_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdfsarah david
 
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptxthe_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptxsarah david
 
Charting Your Path to Enterprise Key Management
Charting Your Path to Enterprise Key ManagementCharting Your Path to Enterprise Key Management
Charting Your Path to Enterprise Key ManagementSafeNet
 
Security architecture, engineering and operations
Security architecture, engineering and operationsSecurity architecture, engineering and operations
Security architecture, engineering and operationsPiyush Jain
 
Project Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxProject Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxwkyra78
 
Authentication_Best_Practices_WP(EN)_web
Authentication_Best_Practices_WP(EN)_webAuthentication_Best_Practices_WP(EN)_web
Authentication_Best_Practices_WP(EN)_webSafeNet
 
3 Considerations for IT Teams at Small-Midsized Firms
3 Considerations for IT Teams at Small-Midsized Firms3 Considerations for IT Teams at Small-Midsized Firms
3 Considerations for IT Teams at Small-Midsized FirmsReadyTalk
 
Managed Services - Explained
Managed Services - ExplainedManaged Services - Explained
Managed Services - ExplainedGhassan Chahine
 
Ignyte assurance platform NIST RMF datasheet.
Ignyte assurance platform NIST RMF datasheet.Ignyte assurance platform NIST RMF datasheet.
Ignyte assurance platform NIST RMF datasheet.Ignyte Assurance Platform
 
Integrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessIntegrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessAyham Kochaji
 

Semelhante a Centralizing security on the mainframe (20)

Managing Compliance
Managing ComplianceManaging Compliance
Managing Compliance
 
Cloud Security_ Unit 4
Cloud Security_ Unit 4Cloud Security_ Unit 4
Cloud Security_ Unit 4
 
SecureGRC - Cloud based SaaS
SecureGRC - Cloud based SaaSSecureGRC - Cloud based SaaS
SecureGRC - Cloud based SaaS
 
A Pragmatic Approach to SIEM: Buy for Compliance, Use for Security
A Pragmatic Approach to SIEM: Buy for Compliance, Use for SecurityA Pragmatic Approach to SIEM: Buy for Compliance, Use for Security
A Pragmatic Approach to SIEM: Buy for Compliance, Use for Security
 
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdfthe_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
 
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptxthe_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
 
Charting Your Path to Enterprise Key Management
Charting Your Path to Enterprise Key ManagementCharting Your Path to Enterprise Key Management
Charting Your Path to Enterprise Key Management
 
Cc unit 4 updated version
Cc unit 4 updated versionCc unit 4 updated version
Cc unit 4 updated version
 
Security architecture, engineering and operations
Security architecture, engineering and operationsSecurity architecture, engineering and operations
Security architecture, engineering and operations
 
Project Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxProject Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docx
 
SIEM Buyer's Guide
SIEM Buyer's GuideSIEM Buyer's Guide
SIEM Buyer's Guide
 
Leveraging Log Management to provide business value
Leveraging Log Management to provide business valueLeveraging Log Management to provide business value
Leveraging Log Management to provide business value
 
Authentication_Best_Practices_WP(EN)_web
Authentication_Best_Practices_WP(EN)_webAuthentication_Best_Practices_WP(EN)_web
Authentication_Best_Practices_WP(EN)_web
 
3 Considerations for IT Teams at Small-Midsized Firms
3 Considerations for IT Teams at Small-Midsized Firms3 Considerations for IT Teams at Small-Midsized Firms
3 Considerations for IT Teams at Small-Midsized Firms
 
Many products-no-security (1)
Many products-no-security (1)Many products-no-security (1)
Many products-no-security (1)
 
Managed Services - Explained
Managed Services - ExplainedManaged Services - Explained
Managed Services - Explained
 
Ignyte assurance platform NIST RMF datasheet.
Ignyte assurance platform NIST RMF datasheet.Ignyte assurance platform NIST RMF datasheet.
Ignyte assurance platform NIST RMF datasheet.
 
CSEC630 individaul assign
CSEC630 individaul assignCSEC630 individaul assign
CSEC630 individaul assign
 
Integrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessIntegrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-Effectiveness
 
Is it an internal affair
Is it an internal affairIs it an internal affair
Is it an internal affair
 

Último

Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 

Último (20)

Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 

Centralizing security on the mainframe

  • 1. IBM Software Buyer’s guide Centralizing security on the mainframe Improve security and compliance by choosing the right solution
  • 2. 2 Centralizing security on the mainframe Today’s IT environments are often collections of distributed, enabled by the mainframe to many different hardware and soft- collaborative, multiplatform environments. That’s both the good ware platforms. The answer is to seek mainframe security solu- news, and the bad news. It’s good news because those qualities tions that are specifically designed to both enhance and simplify have made many organizations more agile, effective and compet- security, with: itive—by allowing them to match resources to needs without being limited by a single IT platform. But at the same time, ● Extensive integration of security operations across platforms. these qualities can make critical assets within an organization ● Widespread use of automation to reduce administrative much more difficult to identify and protect. demands on IT staff. ● Consolidated views of security and compliance activities Heterogeneous IT environments today represent the inevitable throughout the enterprise. consequence of growth—not just data and application growth, ● Broad, deep audit and reporting to demonstrate regulatory but business growth. In the wake of this unbridled growth, there compliance. are more assets and workloads to be secured than ever before. And as organizations have grown in the number of customers or Getting started with mainframe security constituents they serve, and the number of products and services This buyer’s guide outlines the features and capabilities of an they deliver to those users, they have implemented more and effective mainframe security strategy, addressing the following more IT resources of varying kinds over time to meet changing key areas: business needs. The result: a larger, more complex, dispersed IT environment that’s harder to secure because it comprises so 1. Security management many different technologies. 2. Identity and access management 3. Monitor, audit and alert This level of complexity gives rise to numerous security 4. Audit and compliance reporting problems. They include time-consuming, inefficient security administration stemming from the need to manage security For each category, this guide provides a checklist of features to across so many different resources, as well as difficulties in con- help you evaluate whether or not a particular vendor’s solutions sistently applying access control policies and processes across the address each of these functional areas effectively. You will also enterprise. Organizations must also comply with regulatory and find tips to help you select a vendor that has the solutions, sup- audit requirements that combine growing numbers of regula- port, financial stability and other qualities to address the full tions with extremely diverse operating environments, as well as range of your mainframe security requirements. demonstrate compliance by providing audit data from a multi- tude of sources. 1. Security management Managing security in multiplatform environments can be To address these problems, more and more organizations are a complex and costly proposition, considering the magnitude of discovering the advantages of centralizing security—and using the task. Centralizing security operations on the mainframe is the mainframe to do it. This approach makes sense, because one key to getting control over it; the other is making security resilience and security are hallmarks of mainframe computing, management more effective and efficient. This begins with especially when it comes to the industry-leading IBM System z® ensuring that the security management tools you use are platform. The question is how to extend the security that is
  • 3. IBM Software 3 focused on maintaining the integrity of security operations. The to spend more of their valuable time on strategic work that next step is speeding and simplifying those operations at every enhances the organization’s overall security posture, rather than possible level. on day-to-day security administration. It’s simply a smarter way to allocate and apply skilled security resources in the IT To maintain security integrity, you need a security management organization. solution that automatically takes steps to enforce policy compli- ance, establish security baselines, and identify and analyze threats One other issue that may arise as you transition to centralized, for remediation. Look for a solution that allows you to exercise mainframe-based security for your organization relates to staff fine-grained control over security commands to prevent security limitations. For example, you may not have staff with sufficient errors from occurring or security intrusions from causing dam- mainframe operations expertise to manage security effectively. age. And look for capabilities that allow the solution to readily Or you may have non-mainframe users who need to issue secu- close off avenues of attack such as unused security definitions rity commands to the mainframe from within their own applica- and privileged-user and trusted-user abuses by maintaining a tion environments. The security management solution you select security system that is current. should be designed to accommodate such limitations. Look for a solution that allows tasks to be performed at the department In the interest of efficiency, you want to be sure that your secu- level, where staff members need not have access to all security rity management solution is set up to handle most routine tasks commands but might benefit from simpler departmental automatically. This will not only reduce costs and complexity, administration, or might benefit from ready access from their but also improve user productivity—and allow administrators current online environment. Attention to these kinds of opera- tional details will help ensure successful centralization of security operations on the mainframe. Security management Look for a solution that: IBM Other vendor Automates and simplifies routine administrative tasks so that they can be performed with ✓ minimal training and little administrative effort. Identifies and analyzes IBM Resource Access Control Facility (RACF®) problems for remedi- ✓ ation to minimize the threat of a security breach or compliance exposure and to lower administrative costs. Displays data from the active (live) RACF database, including recent changes by other ✓ administrators, to allow administrators to immediately verify the effect of changes. Uses actual database usage information to analyze profiles and perform database cleanup, ✓ improving the integrity of system security (by eliminating unused or obsolete profiles and permits) and minimizing the manual effort required by compliance processes. Reports on actual usage of profiles and authorizations and relates that information to cur- ✓ rent profiles and authorizations defined in the current RACF database, enabling a better understanding of how profiles and authorizations are used in production.
  • 4. 4 Centralizing security on the mainframe Security management Look for a solution that: IBM Other vendor Simplifies the management of multiple RACF databases, allowing you to send and execute ✓ the same commands to multiple systems, keeping security synchronized. Creates a mirrored copy of the RACF database offline so that administrators can verify con- ✓ figuration changes before implementing them, reducing the risk of introducing errors into the production database. Combines audit and administrative capabilities to provide end-to-end monitoring and ✓ remediation of security and security life cycle management for governance and compliance purposes. Stores non-security/non-RACF information (such as custom fields like telephone numbers, ✓ accounting codes and email addresses) in the RACF database to reduce organizational costs, improve compliance reporting and consolidate user information. Supports policy definitions to provide mandatory and default values by automating the ✓ process of ensuring that appropriate values are used, so that preventative controls can be enabled to improve security. Prevents non-compliant administrative command execution by automatically verifying com- ✓ mand keywords against specified policies as soon as a command is issued, reducing the risk of a security breach due to either error or malicious intent. Stores changes to RACF database profiles to make it easy to detect profile changes without ✓ labor-intensive searches, log files investigation or guesswork. Can be independently installed on all systems on which you want to enforce policies, elimi- ✓ nating the need to design, code and maintain custom-coded routines to handle parsing of keywords along with installation exit code. Allows selective distribution of command access to grant users granular access to only the ✓ specific commands they need to do their jobs, reducing the risk of accidental or malicious breaches by privileged users. Allows decentralization of RACF administration so that routine tasks can be performed at ✓ the department level using an intuitive easy UI, rather than at the corporate level, optimizing use of administrator time by freeing skilled security administrators to focus on higher-value activities. Permits customization of commands so that administrators view only the commands they ✓ are allowed to perform, reducing the risk of incorrect commands, insider breaches, and abuse of privilege. Enables decentralized administration over your standard network, eliminating the cost and ✓ effort of rolling out extra TSO/ISPF terminals. Allows customization of screens to show only pre-selected options and fields to decentral- ✓ ized administrators, minimizing security exposures associated with providing too much information.
  • 5. IBM Software 5 Security management Look for a solution that: IBM Other vendor Provides easy access to the active (live) RACF database so that help-desk staff can view ✓ accurate, current information about users, groups and resource profiles. Makes it possible to add new users by simply cloning existing user templates and entering ✓ new names, reducing the risk of assigning incorrect authorizations. Offers robust, non-intrusive capabilities to help simplify the process of managing mainframe ✓ security by reducing complex management tasks to one-step actions that can be per- formed without extensive RACF knowledge. Enables RACF administration from a user-friendly interface with IBM CICS® application ✓ servers so that CICS users can issue security commands directly without having to leave the familiar CICS environment and without having to write custom CICS applications. Provides a web-enablement CICS-RACF API so that web applications can use RACF func- ✓ tions for security administration, authentication and access control. Facilitates access checks for more than 2,000 resources so that you can improve applica- ✓ tion performance by replacing internal application security with RACF security. Centralizes (in the RACF database) security for legacy and internally developed CICS appli- ✓ cations to enhance application security and auditability. Enables you to empower managers to view, sort and annotate audit reports, and combine ✓ multiple reports for automatic distribution—saving time and providing focused reports. Analyzes SMF log files (from live SMF data sets or from extracted SMF data on tape or disk) ✓ to create a comprehensive audit trail. Supports both IBM z/OS® and IBM z/VM® operating systems. ✓ 2. Identity and access management control policies across every application, data source, operating Successful access management is an essential aspect of main- system and organizational boundary. They should be standards- frame security. But keeping access to resources secure is a based and should easily integrate with other systems. challenge in heterogeneous environments, where resources are likely to be associated with many different web and non-web An effective identity and access management solution also needs platforms. Managing access in such an environment requires the to be designed to efficiently manage users and user information ability to control access from a centralized point and to address throughout the entire user life cycle—so that IT staff doesn’t access issues in an integrated way. Accordingly, the identity and end up spending an inordinate amount of time managing per- access management capabilities that are part of your mainframe missions and policies (not to mention user roles, identities and security efforts should allow you to manage and enforce access
  • 6. 6 Centralizing security on the mainframe access rights) on a painstaking case-by-case basis. A centralized, Look for an identity and access management solution that automated approach will enable you to manage tasks associated focuses on ease of use, too. For IT users, it should have an intu- with user roles, identities, credentials and access permissions itive, easy-to-customize user interface; a variety of configuration using consistent, standardized processes instead of slow, error- wizards and templates; and out-of-the-box integration with prone manual methods. authentication applications. For business users such as managers and auditors, it should describe access rights in business-friendly language that’s easily understood by nontechnical personnel. Identity and access management Look for a solution that: IBM Other vendor Provides integrated role-based access control (RBAC), rule/attribute-based access control ✓ (ABAC) and request-based provisioning options. Tightly integrates user provisioning with role management, separation of duties and recertifi- ✓ cation with open interfaces for integration with continuous business controls systems. Supports tools to build user provisioning workflows using both simple wizard-based naviga- ✓ tion and a drag-and-drop GUI for more advanced business processes—all from a common web interface. Reconciles accounts automatically and in an on-demand way to rapidly and reliably dis- ✓ cover invalid “orphaned” accounts and unnecessary entitlements, and to initiate either automatic or manual remediation processes. Offers an intuitive, customizable administration GUI with point-and-click capabilities that ✓ make it easy to create new user GUI views and to track status. Provides a complete and integrated federation and trust management solution that includes ✓ a general-purpose security token service for common standards-based identity propaga- tion within a web services/SOA environment. Provides standards-based development for extension of the security token service via ✓ Eclipse-based plug-ins. Includes robust directory and directory integration and synchronization products at no addi- ✓ tional charge. Provides standards-based (XACML) entitlements management (roles, rules, attributes) for ✓ data security and fine-grained access control. Provides SOA security policy management (message protection policies support). ✓
  • 7. IBM Software 7 Identity and access management Look for a solution that: IBM Other vendor Integrates widely with identity servers, applications, middleware, operating systems and plat- ✓ forms including enterprise service bus. Supports multiple standards for cross-site authentication, including Security Assurance ✓ Markup Language (SAML), Liberty Alliance, OpenID and Web Services Federation Language (WS-Federation) protocols. Supports Java™ EE and Microsoft® .NET application and web services integration using ✓ existing application identity (e.g. LTPA, Kerberos and SAML) protocols. Supports mainframe application and web services integration including using RACF ✓ PassTicket protocol. Integrates with IBM WebSphere® DataPower® for secured web-services support in the ✓ demilitarized zone. Provides business-to-consumer (B2C) self-service interfaces for user enrollments, user vali- ✓ dation, account updates, and password resets and synchronization. Utilizes a web authorization approach that offers high performance and scales to user ✓ implementations in the tens of millions as well as to hundreds of applications. Offers a flexible Java web-based architecture that can protect resources using either a ✓ hardened reverse proxy, or a plug-in module to an existing web server. (In certain cases, a dedicated proxy can offer a higher level of security.) Provides session management services that allow for the immediate termination of all active ✓ sessions for a malicious user. Offers a post office (anti-spam) feature that aggregates like emails and user work items. ✓ Supports B2C federation with emerging user-centric identities including OpenID and ✓ Information Card Profile using identity selectors such as Microsoft CardSpace or Higgins identity framework. Includes an enterprise single sign-on (ESSO) solution that is distinguished in the market- ✓ place by its advanced capabilities to work with many different kinds of applications, integra- tion with strong authentication, flexible approach to session management, and ability to log and audit end-user activities.
  • 8. 8 Centralizing security on the mainframe Identity and access management Look for a solution that: IBM Other vendor Provides an ESSO solution that integrates with web, desktop, teletype and mainframe appli- ✓ cations, as well as many client device platforms such as Microsoft Windows® CE and Windows XPe to accommodate the broadest possible range of applications. Offers a wide choice of authentication factors, including user IDs and passwords, USB ✓ smart tokens, building access badges, active RFID, biometrics and an open authentication devices interface for easy integration of third-party devices. Enables account usage auditing by tracking application logins/logouts. ✓ Integrates with provisioning to provide automated check-out/check-in of shared and privi- ✓ leged identities for privileged identity management. Allows administrators to apply a meaningful description to a fine-grained resource, catego- ✓ rize it for quick reference and search, assign an owner to it, define unique approval and recertification workflows, and provide detailed reports on these resources. Allows enterprise architects to model security policies and create security policy templates ✓ for consistent use across the organization. Allows application owners to create data entitlements using application roles and attributes ✓ without requiring knowledge of the IT operations environment. Has a workflow that seamlessly integrates with SAP and Oracle ERP, and fine-grained ✓ separation-of-duties checking with flexible exception-handling methods. Provides a centralized management GUI for control and making modifications, eliminating ✓ the need to manually update each individual adapter to reflect changes in authentication and authorization methodology. Incorporates business rules into access control decisions and evaluates these rules dynami- ✓ cally at run time. Sets an access policy that automatically detects and remediates both intentional and inad- ✓ vertent non-compliance events in real time. Scales to tens of millions of users for authentication and authorization; also scales to meet ✓ the needs of intranet, extranet and Internet user populations. Enables multiple policy enforcement points in a web-services infrastructure, for DataPower, ✓ WebSphere and other web services resources. Enables multiple policy enforcement points for application and data sources such as ✓ Microsoft SharePoint, WebSphere Portal, WebSphere Application Server, IBM FileNet®, IBM DB2®, and other application and data resources.
  • 9. IBM Software 9 3. Monitor, audit and alert security events. End-to-end monitoring and remediation are To keep resources secure, you need mainframe security that con- essential to effectively dealing with potential exposures in tinually monitors for access breaches and other security events, centralized-security scenarios. and then alerts the proper administrative staff of any anomalies that are detected. This is especially true in environments where The solutions you choose should place a high priority on moni- resources are likely to be associated with a variety of platforms toring and alerts related to areas that you have designated as par- and types of users. ticularly sensitive. If your organization is a public company, for example, you want to be able to monitor critical system settings Real-time monitoring is essential to effective audit-and-alert that are specifically required by SOX, for example. Or if you are capabilities. You need to be able to conduct live data analysis, for at high risk for insider threats to security, the solution you up-to-the-minute accuracy in detecting problems and alerting choose should include features such as privileged user monitor- administrators to them. And you need this capability not just ing to help control that risk. within the mainframe operating system, but in databases and other subsystems that are also affected when you are using the Finally, audit and alert capabilities should be easy to use and mainframe as a security hub. You also need audit-and-alert capa- manage—automatically detecting system changes to minimize bilities that are integrated to enterprise audit, compliance and risk, issuing timely alerts with no special action required on monitoring solutions, to enable appropriate responses to the part of administrators, and providing a single view of security events to make it easier to monitor events across the organization. Monitor, audit and alert Look for a solution that: IBM Other vendor Allows live data access and analysis for up-to-the-minute audit accuracy, including ranking ✓ and highlighting current security concerns and audit priorities. Provides live analysis beyond z/OS and RACF to detect problems in UNIX® subsystem ✓ security definitions and to display critical activity in DB2 systems on the mainframe. Checks for and enforces program signatures by identifying programs that are expected to ✓ have a valid signature and verifying whether the signature is present, to aid in compliance with PCI Data Security Standard. Delivers optional custom reports daily via email when specific events occur or when there is ✓ a possible security breach. Uses flexible and customized reporting and alert language to make it easy to create new ✓ reports (installation-specific, RACF and SMF) without the need for consulting assistance. Includes DBCS support for audit reports, with built-in support for translating reports and ✓ menus for NLS support. Includes NLS support for translating report titles, column headers, constants, and selection ✓ and scan values to support DBCS characters in search strings and formatted output.
  • 10. 10 Centralizing security on the mainframe Monitor, audit and alert Look for a solution that: IBM Other vendor Analyzes SMF log files to create a comprehensive audit trail in the event of incidents such as ✓ policy exceptions (for example, logging in after work hours). Leverages external files from existing databases and corporate applications (such as a per- ✓ sonnel database) and presents the data alongside technical data to make reports highly usable. Uses the RACF database to analyze profiles and get fast answers to questions such as ✓ “Who has access to this data set?” Allows you to map your own events into the W7 model (who, what, when, on what, where, where from, and where to) and filter out events on the mainframe side without editing the data set. Detects system changes (such as whether a member was added, deleted or changed) to ✓ minimize security risks. Helps define a baseline for RACF security parameters, detects profiles and parameters that ✓ differ from the baseline, and monitors and measures baseline changes to simplify imple- mentation of security auditing. Includes a powerful system integrity analysis feature to detect and analyze system integrity ✓ breaches and other irregularities and rank them according to degree of exposure to help determine appropriate corrective action. Provides integrated, end-to-end monitoring and remediation capabilities to quickly diagnose ✓ and address failures or exposures so that administrators can move quickly to remediate them. Links seamlessly to enterprise audit and compliance solutions to include mainframe security ✓ information in company-wide reports. Provides a threat knowledge base with parameters from active configurations to help isolate ✓ relevant attack threats and patterns, detect multiple types of attacks and configuration threats (including those external to the event log) and enable swift corrective action. Offers multiplatform monitoring capabilities to identify resources that need protection across ✓ multiple platforms, to help maintain data integrity and stay ahead of potential security policy violations. Automatically sends timely security alerts to enterprise audit, compliance and monitoring ✓ solutions, as well as to network and enterprise consoles, to enable rapid response to secu- rity events and to easily include mainframe data in company-wide audit and compliance reports. Continuously monitors critical system settings per SOX and JSOX audit requirements to ✓ detect changes for which there are no event triggers. Enables alerts to be configured to notify administrative and management personnel when ✓ changes are detected—even those for which there are no event triggers.
  • 11. IBM Software 11 Monitor, audit and alert Look for a solution that: IBM Other vendor Allows support users, consultants and other authorized users to create custom alert mes- ✓ sages by modifying existing alert messages or creating new ones based on installation- defined requirements. Centralizes and automates log management to reduce the time and effort required to ✓ collect, organize, archive, investigate and retrieve logs for analysis. Provides insider threat analysis and privileged user monitoring to reduce the risk of security ✓ events originating from inside the organization. Provides a single, streamlined view of security events from thousands of network and secu- ✓ rity devices, hosts, applications and other sources to minimize the effort required to monitor events across the organization. Provides extensive audit capabilities including the ability to audit UNIX security definitions on ✓ the mainframe, DB2 auditable security events, CICS security events, Linux® for System z events, and auditable security events from IBM Tivoli® Key Lifecycle Manager, WebSphere Application Server, and Tivoli OMEGAMON®. It also provides auditing of the communica- tions server network configuration for TCP/IP and provides PDS(E) member-level auditing. 4. Audit and compliance reporting major regulations are extremely helpful, as are out-of-the-box The ability to produce reports that prove compliance is crucial best practice reports, which can narrow down the thousands of for organizations dealing with multiple complex regulations, potentially relevant individual reports that are out there to a few especially in increasingly heterogeneous environments. To effec- dozen. Templates and models like these can save significant tively provide all the information required to demonstrate com- amounts of time in report preparation. pliance with internal security policies and external regulations, you need reporting that can deliver on several levels. Once reports are generated, it should be easy to get them out to the people who need them, and easy for those people to First, you need a mainframe security solution that can quickly put them to use. Most of those who need audit and compliance and effectively sort through data from multiple sources through- reports are nontechnical stakeholders, including business owners, out the organization to detect compliance-relevant information regulators, external auditors and internal audit staff. Look for the about security events. The solution you choose must also have ability to translate highly technical compliance data into reports the flexibility to report on regulation-specific concerns, so that that are written in plain language that can be easily understood no matter what regulations or standards apply to your organiza- by these users. Make sure you have a variety of output formats tion or industry, you have the capability to produce reports that available to you to easily accommodate different user preferences are specific to them. (such as HTML, PDF, .xls, etc.) You will also benefit from built- in capabilities for distributing reports to those who need them Because there are so many regulations reflecting varying degrees and for automating the report scheduling and distribution of complexity, you also need a solution that focuses on simplify- process. ing the process of reporting. Reporting templates covering the
  • 12. 12 Centralizing security on the mainframe Audit and compliance reporting Look for a solution that: IBM Other vendor Enables you to easily sort and browse a multitude of events and analyze them from different ✓ vectors. Translates data into detailed, easy-to-understand reports that can be used by regulators, ✓ external and corporate auditors, and other nontechnical personnel. Includes the user’s real name as known by the directory or security system to make the ✓ report more readable. Provides compliance management modules with regulation-specific reporting capabilities ✓ (including default templates) covering major regulations and standards including ISO 27001, SOX, PCI-DSS, HIPAA, GLBA, Basel II, FISMA, COBIT, NERC-CIP and others. Includes out-of-the-box parameterized best-practice audit reports that reduce hundreds or ✓ thousands of individual reports to about 50 parameterized reports. Enables distribution of reports to business owners and stakeholders for review, approval, ✓ comment and action. Uses a patent-pending strong normalization model. ✓ Includes a flexible custom report writer that is optimized to the normalization model, allowing ✓ you to create your own compliance and audit reports without needing to understand or write SQL. Automates report distribution to business owners as part of the overall compliance and ✓ business process. Offers a common system for scheduling, distributing, viewing and customizing reports. ✓ Provides compliance-specific policy templates that represent the controls within a regulation. ✓ Provides compliance-specific reports that allow you to monitor compliance posture against ✓ specific controls. Provides compliance reports that are designed, created and based on standards (versus ✓ renaming operational reports). Provides a compliance dashboard that shows the current compliance posture in the vocab- ✓ ulary of existing regulations or policies for easy understanding. Provides trending information at the dashboard level to indicate the trend for compliance ✓ posture and to help ensure that goals are being achieved. Provides drill-down from the high-level compliance dashboard through to the underlying ✓ detail events for further investigation.
  • 13. IBM Software 13 Audit and compliance reporting Look for a solution that: IBM Other vendor Provides reporting at the raw log level using a simple query mechanism for forensic-type ✓ investigations. Includes a full-featured reporting engine with scheduled reporting. ✓ Facilitates communication of threat levels and security activities through out-of-the-box ✓ standard and customizable report templates, driven from an automated report scheduler. Provides a wide variety of report output formats, including HTML, PDF, CSV and .xls export- ✓ ing of all graphs and charts. Offers privileged user monitoring, reporting and auditing on databases, applications, servers ✓ and mainframes. Selecting the right vendor Are your vendor’s products tightly integrated for seamless The provider you choose should be able to support the full functionality? breadth of your security requirements. Ideally, you will also want The more integrated the solution, the less work you have to do a provider who can support you throughout the process of to streamline functions. Make sure the vendor can respond implementing your solution. Before you select a provider, make quickly to changes in operating systems and System z infrastruc- sure to ask these questions: ture, taking immediate advantage of platform enhancements. Is your vendor focused on true end-to-end enterprise Does your vendor’s technology support your business security needs? goals? With a vendor who is focused too narrowly on a point solution Look for vendors whose solutions are designed to facilitate your that addresses only a particular environment, you can run into business objectives. Do their solutions promote efficiencies, the “islands of security” problem. While this document focuses reduce business service deployment time, reduce costs, enhance on mainframe security, that is just one key part of the challenge. compliance and speed time to market? Choose a vendor who can address the big picture, including: Does your vendor provide rapid time to value? A cost-effective solution includes a number of key features ● Mainframe security designed to provide easy configuration, integration and mainte- ● Application security nance, even in a complex enterprise environment. ● Information and data security ● Threat protection ● Managed services ● Service management ● Multiple platforms and applications
  • 14. 14 Centralizing security on the mainframe What type of global presence and support does your vendor Address your mainframe security needs have? with IBM If your organization has international offices, you should look When you evaluate mainframe security solutions to meet your for a vendor with a global presence and proven international goals, you will find that IBM offers not only a best-of-breed business experience. Make sure the vendor can support your solution, but also exceptional breadth and integration across its offices abroad with their own local resources. security solutions. As organizations look for ways to extend the security that is enabled by the mainframe to many different soft- Is the solution supported by a mature organization with the expertise and bandwidth that can be relied on when you ware and hardware platforms, IBM is responding with security need it? that spans the entire IT infrastructure. Today, IBM Tivoli Your vendor should offer highly responsive and highly effective and IBM Security solutions combine with System z hardware customer support. Find a vendor that has a proven support and software to provide comprehensive, centralized security organization to help you maximize the value of your software capabilities for organizations with distributed, multiplatform investment. IT environments. Are the vendor’s solutions consistently rated highly by the The IBM Security zSecure suite consists of a variety of modular analyst community? components that are designed to help you quickly and efficiently Look for solutions that are recognized through independent manage mainframe RACF databases. Specific security manage- analysis and examination across multiple dimensions by leading ment components of the suite include: analysts. ● IBM Security zSecure Admin to simplify RACF How sure are you of your vendor’s stability and staying administration. power in today’s economy? ● IBM Security CICS Toolkit, which enables users to issue A big issue in today’s economy is vendor stability and visibility. RACF commands from CICS application servers. You should consider a vendor who has a long history in the ● IBM Security zSecure Command Verifier, which enforces industry, a solid, forward-looking strategy and the resources to RACF policies and helps reduce security risks stemming from withstand adverse economic conditions. internal errors and non-compliant commands. Can your vendor deliver products that are strategically ● IBM Security zSecure Visual, which provides a point-and-click designed and technically superior? interface to enable less skilled administrators to perform many When comparing various security solutions, look for technical administrative functions without the need for extensive RACF superiority—well-designed functionality, an intelligent architec- knowledge. tural design and broad support for industry standards. ● IBM Tivoli zSecure Manager for RACF z/VM, which extends administration capabilities to mainframes running as guests on IBM z/VM.
  • 15. IBM Software 15 Audit and alert components of the zSecure suite include extremely flexible reporting language to make it easy to create IBM Security zSecure Audit and IBM Security zSecure Alert, new reports, uses built-in support for translating reports and which combine to detect and report mainframe security events menus, and leverages external file support to enhance report and exposures. IBM Security zSecure Audit is an audit solution usability. that provides live analysis of critical information on mainframes, highlights security concerns and ranks audit priorities based on IBM Tivoli identity and access solutions provide efficient, secure the relative impact of the problems it detects. IBM Security and compliant access to mainframe and other resources, helping zSecure Alert offers real-time mainframe threat detection, with organizations ensure that the right users have access to the right alerts and automated commands to counter attacks and miscon- information in a timely manner. Tivoli Identity Manager pro- figurations. Integration between these two solutions enables end- vides a secure, policy-based solution for managing user roles, to-end monitoring and remediation to enable administrators to identities and access rights. Tivoli Access Manager solutions quickly diagnose mainframe security failures or exposures and enable controls for centralized security management in increas- take appropriate steps to remediate them. ingly distributed, multiplatform environments; they specifically provide centralized authentication, policy management and IBM Tivoli Security Information and Event Management access control services for web resources, systems and hosted combines with IBM Security zSecure Audit to deliver extensive applications. Tivoli Federated Identity Manager provides the audit and compliance reporting capabilities. Tivoli Security federated single sign-on and user access management techniques Information and Event Management provides audit and compli- that are required for integration across organizational bound- ance reports in plain language and includes a variety of reporting aries. This solution provides an identity trust framework that is capabilities specific to different regulations, so that organizations ideal for protecting assets when users are connected to critical can easily target their own specific compliance needs. The solu- resources from a variety of access points, including over the tion includes capabilities for custom report writing, automated Internet. report distribution and scheduling, and support for a wide vari- ety of report output formats. IBM Security zSecure Audit offers These offerings are all part of a larger IBM mainframe security the option of emailing reports daily when it detects a specific software portfolio that also includes solutions for encryption key event or a possible security breach, based on live analysis of management, database protection, application testing, network critical information in the mainframe environment. It uses an security and more. IBM Security solutions can help you to con- solidate security management on the mainframe and leverage its security strengths to establish it as your enterprise security hub.
  • 16. For more information To learn more about IBM mainframe security solutions, contact your IBM representative or IBM Business Partner, or visit: ibm.com/security © Copyright IBM Corporation 2010 IBM Corporation Software Group Route 100 Somers, NY 10589 U.S.A. Produced in the United States of America December 2010 All Rights Reserved IBM, the IBM logo, ibm.com, System z and Tivoli are trademarks or registered trademarks of International Business Machines Corporation in the United States, other countries, or both. If these and other IBM trademarked terms are marked on their first occurrence in this information with a trademark symbol (® or ™), these symbols indicate U.S. registered or common law trademarks owned by IBM at the time this information was published. Such trademarks may also be registered or common law trademarks in other countries. A current list of IBM trademarks is available on the web at “Copyright and trademark information” at ibm.com/legal/copytrade.shtml Java and all Java-based trademarks and logos are trademarks of Sun Microsystems, Inc. in the United States, other countries, or both. Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both. Microsoft and Windows are trademarks of Microsoft Corporation in the United States, other countries, or both. The information provided in this document is distributed “as is” UNIX is a registered trademark of The Open Group in the United States without any warranty, either express or implied. IBM expressly disclaims and other countries. any warranties of merchantability, fitness for a particular purpose or Other company, product and service names may be trademarks or service noninfringement. IBM products are warranted according to the terms and marks of others. conditions of the agreements (e.g. IBM Customer Agreement, Statement of Limited Warranty, International Program License Agreement, etc.) References in this publication to IBM products and services do not under which they are provided. imply that IBM intends to make them available in all countries in which IBM operates. The customer is responsible for ensuring compliance with legal requirements. It is the customer’s sole responsibility to obtain advice of No part of this document may be reproduced or transmitted in any form competent legal counsel as to the identification and interpretation of any without written permission from IBM Corporation. relevant laws and regulatory requirements that may affect the customer’s business and any actions the customer may need to take to comply with Product data has been reviewed for accuracy as of the date of initial such laws. IBM does not provide legal advice or represent or warrant that publication. Product data is subject to change without notice. Any statements its services or products will ensure that the customer is in compliance with regarding IBM’s future direction and intent are subject to change or any law or regulation. withdrawal without notice, and represent goals and objectives only. Please Recycle TIO14007-USEN-00