Download or read book Reduce Risk and Improve Security on IBM Mainframes Volume 3 Mainframe Subsystem and Application Security written by Axel Buecker and published by IBM Redbooks. This book was released on 2015-11-02 with total page 200 pages. Available in PDF, EPUB and Kindle. Book excerpt: This IBM® Redbooks® publication documents the strength and value of the IBM security strategy with IBM zTM Systems hardware and software. In an age of increasing security consciousness and more and more dangerous advanced persistent threats, IBM z SystemsTM provides the capabilities to address the needs of today's business security challenges. This publication explores how z Systems hardware is designed to provide integrity, process isolation, and cryptographic capability to help address security requirements. We highlight the features of IBM z/OS® and other operating systems, which offer a variety of customizable security elements. We discuss z/OS and other operating systems and additional software that use the building blocks of z Systems hardware to provide solutions to business security needs. We also explore the perspective from the view of an enterprise security architect and how a modern mainframe has to fit into an overarching enterprise security architecture. This book is part of a three-volume series that focuses on guiding principles for optimized mainframe security configuration within a holistic enterprise security architecture. The series' intended audience includes enterprise security architects, planners, and managers who are interested in exploring how the security design and features of z Systems, the z/OS operating system, and associated software address current issues such as data encryption, authentication, authorization, network security, auditing, ease of security administration, and monitoring.
Download or read book IBM z OS Mainframe Security and Audit Management Using the IBM Security zSecure Suite written by Axel Buecker and published by IBM Redbooks. This book was released on 2011-08-18 with total page 494 pages. Available in PDF, EPUB and Kindle. Book excerpt: Every organization has a core set of mission-critical data that must be protected. Security lapses and failures are not simply disruptions—they can be catastrophic events, and the consequences can be felt across the entire organization. As a result, security administrators face serious challenges in protecting the company's sensitive data. IT staff are challenged to provide detailed audit and controls documentation at a time when they are already facing increasing demands on their time, due to events such as mergers, reorganizations, and other changes. Many organizations do not have enough experienced mainframe security administrators to meet these objectives, and expanding employee skillsets with low-level mainframe security technologies can be time-consuming. The IBM® Security zSecure suite consists of multiple components designed to help you administer your mainframe security server, monitor for threats, audit usage and configurations, and enforce policy compliance. Administration, provisioning, and management components can significantly reduce administration, contributing to improved productivity, faster response time, and reduced training time needed for new administrators. This IBM Redbooks® publication is a valuable resource for security officers, administrators, and architects who wish to better understand their mainframe security solutions.
Download or read book Mainframe Basics for Security Professionals written by Ori Pomerantz and published by Pearson Education. This book was released on 2007-12-28 with total page 194 pages. Available in PDF, EPUB and Kindle. Book excerpt: Leverage Your Security Expertise in IBM® System zTM Mainframe Environments For over 40 years, the IBM mainframe has been the backbone of the world’s largest enterprises. If you’re coming to the IBM System z mainframe platform from UNIX®, Linux®, or Windows®, you need practical guidance on leveraging its unique security capabilities. Now, IBM experts have written the first authoritative book on mainframe security specifically designed to build on your experience in other environments. Even if you’ve never logged onto a mainframe before, this book will teach you how to run today’s z/OS® operating system command line and ISPF toolset and use them to efficiently perform every significant security administration task. Don’t have a mainframe available for practice? The book contains step-by-step videos walking you through dozens of key techniques. Simply log in and register your book at www.ibmpressbooks.com/register to gain access to these videos. The authors illuminate the mainframe’s security model and call special attention to z/OS security techniques that differ from UNIX, Linux, and Windows. They thoroughly introduce IBM’s powerful Resource Access Control Facility (RACF) security subsystem and demonstrate how mainframe security integrates into your enterprise-wide IT security infrastructure. If you’re an experienced system administrator or security professional, there’s no faster way to extend your expertise into “big iron” environments. Coverage includes Mainframe basics: logging on, allocating and editing data sets, running JCL jobs, using UNIX System Services, and accessing documentation Creating, modifying, and deleting users and groups Protecting data sets, UNIX file system files, databases, transactions, and other resources Manipulating profiles and managing permissions Configuring the mainframe to log security events, filter them appropriately, and create usable reports Using auditing tools to capture static configuration data and dynamic events, identify weaknesses, and remedy them Creating limited-authority administrators: how, when, and why
Download or read book Reduce Risk and Improve Security on IBM Mainframes Volume 2 Mainframe Communication and Networking Security written by Axel Buecker and published by IBM Redbooks. This book was released on 2015-09-25 with total page 188 pages. Available in PDF, EPUB and Kindle. Book excerpt: This IBM® Redbooks® publication documents the strength and value of the IBM security strategy with IBM z Systems hardware and software (referred to in this book by the previous product name, IBM System z®). In an age of increasing security consciousness and more dangerous and advanced persistent threats, System z provides the capabilities to address today's business security challenges. This book explores how System z hardware is designed to provide integrity, process isolation, and cryptographic capability to help address security requirements. We highlight the features of IBM z/OS® and other operating systems that offer a variety of customizable security elements. We also describe z/OS and other operating systems and additional software that use the building blocks of System z hardware to meet business security needs. We explore these from the perspective of an enterprise security architect and how a modern mainframe must fit into an enterprise security architecture. This book is part of a three-volume series that focuses on guiding principles for optimized mainframe security configuration within a holistic enterprise security architecture. The intended audience includes enterprise security architects, planners, and managers who are interested in exploring how the security design and features of the System z platform, the z/OS operating system, and associated software address current issues, such as data encryption, authentication, authorization, network security, auditing, ease of security administration, and monitoring.
Download or read book Security in Development The IBM Secure Engineering Framework written by Warren Grunbok and published by IBM Redbooks. This book was released on 2018-12-17 with total page 32 pages. Available in PDF, EPUB and Kindle. Book excerpt: IBM® has long been recognized as a leading provider of hardware, software, and services that are of the highest quality, reliability, function, and integrity. IBM products and services are used around the world by people and organizations with mission-critical demands for high performance, high stress tolerance, high availability, and high security. As a testament to this long-standing attention at IBM, demonstration of this attention to security can be traced back to the Integrity Statement for IBM mainframe software, which was originally published in 1973: IBM's long-term commitment to System Integrity is unique in the industry, and forms the basis of MVS (now IBM z/OS) industry leadership in system security. IBM MVS (now IBM z/OS) is designed to help you protect your system, data, transactions, and applications from accidental or malicious modification. This is one of the many reasons IBM 360 (now IBM Z) remains the industry's premier data server for mission-critical workloads. This commitment continues to apply to IBM's mainframe systems and is reiterated at the Server RACF General User's Guide web page. The IT market transformed in 40-plus years, and so have product development and information security practices. The IBM commitment to continuously improving product security remains a constant differentiator for the company. In this IBM RedguideTM publication, we describe secure engineering practices for software products. We offer a description of an end-to-end approach to product development and delivery, with security considered. IBM is producing this IBM Redguide publication in the hope that interested parties (clients, other IT companies, academics, and others) can find these practices to be a useful example of the type of security practices that are increasingly a must-have for developing products and applications that run in the world's digital infrastructure. We also hope this publication can enrich our continued collaboration with others in the industry, standards bodies, government, and elsewhere, as we seek to learn and continuously refine our approach.
Download or read book Using the IBM Security Framework and IBM Security Blueprint to Realize Business Driven Security written by Axel Buecker and published by IBM Redbooks. This book was released on 2014-02-06 with total page 240 pages. Available in PDF, EPUB and Kindle. Book excerpt: Security is a major consideration in the way that business and information technology systems are designed, built, operated, and managed. The need to be able to integrate security into those systems and the discussions with business functions and operations exists more than ever. This IBM® Redbooks® publication explores concerns that characterize security requirements of, and threats to, business and information technology (IT) systems. This book identifies many business drivers that illustrate these concerns, including managing risk and cost, and compliance to business policies and external regulations. This book shows how these drivers can be translated into capabilities and security needs that can be represented in frameworks, such as the IBM Security Blueprint, to better enable enterprise security. To help organizations with their security challenges, IBM created a bridge to address the communication gap between the business and technical perspectives of security to enable simplification of thought and process. The IBM Security Framework can help you translate the business view, and the IBM Security Blueprint describes the technology landscape view. Together, they can help bring together the experiences that we gained from working with many clients to build a comprehensive view of security capabilities and needs. This book is intended to be a valuable resource for business leaders, security officers, and consultants who want to understand and implement enterprise security by considering a set of core security capabilities and services.
Download or read book Introduction to the New Mainframe Security written by Rica Weller and published by IBM Redbooks. This book was released on 2007-04-26 with total page 550 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book provides students of information systems with the background knowledge and skills necessary to begin using the basic security facilities of IBM System z. It enables a broad understanding of both the security principles and the hardware and software components needed to insure that the mainframe resources and environment are secure. It also explains how System z components interface with some non-System z components. A multi-user, multi-application, multi-task environment such as System z requires a different level of security than that typically encountered on a single-user platform. In addition, when a mainframe is connected in a network to other processors, a multi-layered approach to security is recommended. Students are assumed to have successfully completed introductory courses in computer system concepts. Although this course looks into all the operating systems on System z, the main focus is on IBM z/OS. Thus, it is strongly recommended that students have also completed an introductory course on z/OS. Others who will benefit from this course include experienced data processing professionals who have worked with non-mainframe-based platforms, as well as those who are familiar with some aspects of the mainframe environment or applications but want to learn more about the security and integrity facilities and advantages offered by the mainframe environment.
Download or read book Getting Started with z OS Data Set Encryption written by Bill White and published by IBM Redbooks. This book was released on 2021-12-10 with total page 274 pages. Available in PDF, EPUB and Kindle. Book excerpt: This IBM® Redpaper Redbooks® publication provides a broad explanation of data protection through encryption and IBM Z® pervasive encryption with a focus on IBM z/OS® data set encryption. It describes how the various hardware and software components interact in a z/OS data set encryption environment. In addition, this book concentrates on the planning and preparing of the environment and offers implementation, configuration, and operational examples that can be used in z/OS data set encryption environments. This publication is intended for IT architects, system programmer, and security administrators who plan for, deploy, and manage security on the Z platform. The reader is expected to have a basic understanding of IBM Z security concepts.
Download or read book Security on z VM written by Paola Bari and published by IBM Redbooks. This book was released on 2007-12-05 with total page 348 pages. Available in PDF, EPUB and Kindle. Book excerpt: Discussions about server sprawl, rising software costs, going green, or moving data centers to reduce the cost of business are held in many meetings or conference calls in many organizations throughout the world. And many organizations are starting to turn toward System zTM and z/VM® after such discussions. The virtual machine operating system has over 40 years of experience as a hosting platform for servers, from the days of VM/SP, VM/XA, VM/ESA® and especially now with z/VM. With the consolidation of servers and conservative estimates that approximately seventy percent of all critical corporate data reside on System z, we find ourselves needing a highly secure environment for the support of this infrastructure. This document was written to assist z/VM support and security personnel in providing the enterprise with a safe, secure and manageable environment. This IBM® Redbooks® publication provides an overview of security and integrity provided by z/VM and the processes for the implementation and configuration of z/VM Security Server, z/VM LDAP Server, IBM Tivoli® Directory Server for z/OS®, and Linux® on System z with PAM for LDAP authentication. Sample scenarios with RACF® database sharing between z/VM and z/OS, or through Tivoli Directory Integrator to synchronize LDAP databases, are also discussed in this book. This book provides information about configuration and usage of Linux on System z with the System z Cryptographic features documenting their hardware and software configuration. The Consul zSecure Pro Suite is also part of this document: this product helps to control and audit security not only on one system, but can be used as a single point of enterprise wide security control. This document covers the installation and configuration of this product and detailed information is presented on how z/Consul can be used to collect and analyze z/VM security data and how it can be helpful in the administration of your audit data.
Download or read book What On Earth is a Mainframe written by David Stephens and published by Lulu.com. This book was released on 2008-10-08 with total page 210 pages. Available in PDF, EPUB and Kindle. Book excerpt: Confused about zSeries Mainframes? Need to understand the z/OS operating system - and in a hurry? Then you've just found the book you need.Avoiding technical jargon, this book gives you the basic facts in clear, light-hearted, entertaining English. You'll quickly learn what Mainframes are, what they do, what runs on them, and terms and terminology you need to speak Mainframe-ese.But it's not all technical. There's also invaluable information on the people that work on Mainframes, Mainframe management issues, new Mainframe trends, and other facts that don't seem to be written down anywhere else.Programmers, managers, recruitment consultants, and industry commentators will all find this book their new best friend when trying to understand the Mainframe world.
Download or read book IBM z OS V2R2 Security written by Keith Winnard and published by IBM Redbooks. This book was released on 2015-12-17 with total page 52 pages. Available in PDF, EPUB and Kindle. Book excerpt: This IBM® Redbooks® publication helps you to become familiar with the technical changes that were introduced to the security areas with IBM z/OS® V2R2. The following chapters are included: - Chapter 1, "RACF updates" on page 1: In this chapter, we describe the read-only auditor attribute, password security enhancements, RACDCERT (granular certificate administration), UNIX search authority, and RACF Remote sharing facility (RRSF). - Chapter 2, "LDAP updates" on page 13: In this chapter, we describe the activity log enhancements, compatibility level upgrade without LDAP outage, dynamic group performance enhancements, and replication of password policy attributes from a read-only replica. - Chapter 3, "PKI updates" on page 21: In this chapter, we describe the Network Authentication Service (KERBEROS) PKINIT, PKI nxm authorization, PKI OCSP enhancement, and RACDCERT (granular certificate administration) - Chapter 4, "z/OS UNIX search and file execution authority" on page 27: z/OS UNIX search authority, z/OS UNIX file execution, Examples for exploiting the new functions This book is one of a series of IBM Redbooks that take a modular approach to providing information about the updates that are included with z/OS V2R2. This approach has the following goals: - Provide modular content - Group the technical changes into a topic - Provide a more streamlined way of finding relevant information that is based on the topic We hope you find this approach useful and we welcome your feedback.
Download or read book Linux on the Mainframe written by John Eilert and published by Prentice Hall Professional. This book was released on 2003 with total page 462 pages. Available in PDF, EPUB and Kindle. Book excerpt: This is the comprehensive guide to Linux on the mainframe straight from the IBM Linux experts. The book covers virtualization, security, systems management, and more.
Download or read book IBM z OS V2R1 Communications Server TCP IP Implementation Volume 4 Security and Policy Based Networking written by Rufus P. Credle Jr. and published by IBM Redbooks. This book was released on 2016-02-10 with total page 958 pages. Available in PDF, EPUB and Kindle. Book excerpt: For more than 40 years, IBM® mainframes have supported an extraordinary portion of the world's computing work, providing centralized corporate databases and mission-critical enterprise-wide applications. IBM System z®, the latest generation of the IBM distinguished family of mainframe systems, has come a long way from its IBM System/360 heritage. Likewise, its IBM z/OS® operating system is far superior to its predecessors in providing, among many other capabilities, world-class and state-of-the-art support for the TCP/IP Internet protocol suite. TCP/IP is a large and evolving collection of communication protocols managed by the Internet Engineering Task Force (IETF), an open, volunteer organization. Because of its openness, the TCP/IP protocol suite has become the foundation for the set of technologies that form the basis of the Internet. The convergence of IBM mainframe capabilities with Internet technology, connectivity, and standards (particularly TCP/IP) is dramatically changing the face of information technology and driving requirements for ever more secure, scalable, and highly available mainframe TCP/IP implementations. The IBM z/OS Communications Server TCP/IP Implementation series provides understandable, step-by-step guidance about how to enable the most commonly used and important functions of z/OS Communications Server TCP/IP. This IBM Redbooks® publication is for people who install and support z/OS Communications Server. It explains how to set up security for your z/OS networking environment. Network security requirements have become more stringent and complex. Because many transactions are from unknown users and untrusted networks, careful attention must be given to host and user authentication, data privacy, data origin authentication, and data integrity. Also, because security technologies are complex and can be confusing, we include helpful tutorial information in the appendixes of this book.
Download or read book It Infrastructure Architecture Infrastructure Building Blocks and Concepts Second Edition written by Sjaak Laan and published by Sjaak Laan. This book was released on 2012-12-16 with total page 438 pages. Available in PDF, EPUB and Kindle. Book excerpt: For many decades, IT infrastructure has provided the foundation for successful application deployment. Yet, general knowledge of infrastructures is still not widespread. Experience shows that software developers, system administrators, and project managers often have little knowledge of the big influence IT infrastructures have on the performance, availability and security of software applications. This book explains the concepts, history, and implementation of IT infrastructures. Although many of books can be found on individual infrastructure building blocks, this is the first book to describe all of them: datacenters, servers, networks, storage, virtualization, operating systems, and end user devices. Whether you need an introduction to infrastructure technologies, a refresher course, or a study guide for a computer science class, you will find that the presented building blocks and concepts provide a solid foundation for understanding the complexity of today's IT infrastructures.
Download or read book RACF Remote Sharing Facility over TCP IP written by Karan Singh and published by IBM Redbooks. This book was released on 2012-08-30 with total page 164 pages. Available in PDF, EPUB and Kindle. Book excerpt: The IBM RACF® remote sharing facility (RRSF) allows RACF to communicate with other IBM z/OS® systems that use RACF, allowing you to maintain remote RACF databases. RRSF support for the security administrator provides these benefits: Administration of RACF databases from anywhere in the RRSF network Creation of User ID associations for password and password phrase synchronization Automatic synchronization of databases Before to z/OS V1R13, RRSF only supported the APPC protocol. With z/OS release V1R13, TCP/IP can be used to extend the RACF Remote Sharing Facility (RRSF) functionality to a network of RRSF nodes capable of communicating over the TCP/IP protocol. Using TCP/IP connections for RRSF nodes provides advantages over APPC such as improved security, including stronger encryption levels. This IBM® Redbooks® publication addresses the issue of implementing a new RRSF network using the TCP/IP protocol. It covers planning, implementation, and operational issues for deploying RRSF using TCP/IP. In addition, It addresses migration of an RRSF network from APPC to TCP/IP, including in-depth examples of the migration process.
Download or read book Reduce Risk and Improve Security on IBM Mainframes Volume 1 Architecture and Platform Security written by Axel Buecker and published by IBM Redbooks. This book was released on 2016-03-22 with total page 332 pages. Available in PDF, EPUB and Kindle. Book excerpt: This IBM® Redbooks® publication documents the strength and value of the IBM security strategy with IBM System z® hardware and software. In an age of increasing security consciousness, IBM System z provides the capabilities to address the needs of today's business security challenges. This publication explores how System z hardware is designed to provide integrity, process isolation, and cryptographic capability to help address security requirements. This book highlights the features of IBM z/OS® and other operating systems, which offer various customizable security elements under the Security Server and Communication Server components. This book describes z/OS and other operating systems and additional software that leverage the building blocks of System z hardware to provide solutions to business security needs. This publication's intended audience is technical architects, planners, and managers who are interested in exploring how the security design and features of System z, the z/OS operating system, and associated software address current issues, such as data encryption, authentication, authorization, network security, auditing, ease of security administration, and monitoring.
Download or read book Introduction to the New Mainframe written by Mike Ebbers and published by IBM.Com/Redbooks. This book was released on 2006 with total page 0 pages. Available in PDF, EPUB and Kindle. Book excerpt: This IBM Redbook provides students of information systems technology with the background knowledge and skills necessary to begin using the basic facilities of a mainframe computer. It is the first in a planned series of textbooks designed to introduce students to mainframe concepts and help prepare them for a career in large systems computing. For optimal learning, students are assumed to have successfully completed an introductory course in computer system concepts, such as computer organization and architecture, operating systems, data management, or data communications. They should also have successfully completed courses in one or more programming languages, and be PC literate. This textbook can also be used as a prerequisite for courses in advanced topics or for internships and special studies. It is not intended to be a complete text covering all aspects of mainframe operation, nor is it a reference book that discusses every feature and option of the mainframe facilities. Others who will benefit from this course include experienced data processing professionals who have worked with non-mainframe platforms, or who are familiar with some aspects of the mainframe but want to become knowledgeable with other facilities and benefits of the mainframe environment. As we go through this course, we suggest that the instructor alternate between text, lecture, discussions, and hands-on exercises. Many of the exercises are cumulative, and are designed to show the student how to design and implement the topic presented. The instructor-led discussions and hands-on exercises are an integral part of the course material, and can include topics not covered in this textbook. This book is also offered with a textbook cover instead of a redbook cover in PDF and hardcopy formats. Download PDF of book with textbook cover (6.0MB) Order hardcopy of book with textbook cover Note: The contents of the book are identical in both the textbook and redbook versions except for the covers.