To select the most appropriate options and to effectively use CA ACF2 for z/VM controls, you must identify local conditions.
Determine existing naming conventions for:
The significance of naming conventions depends on which CA ACF2 for z/VM options you choose. Conversely, the options you select can depend on your naming conventions. CA ACF2 for z/VM provides methods of controlling resource access, based on all of the fields listed above. It also lets you write global rules that reference name patterns for each of these fields. Rules are much easier to write if you use consistent naming conventions for minidisks, CMS file IDs, and MVS and VSE data sets. After you write access rules, CA ACF2 for z/VM forces you to comply with your naming conventions.
Identify current security mechanisms and decide which ones to replace and which to use. Before CA ACF2 for z/VM is in ABORT mode, you may want to keep all current security mechanisms active because it does not deny data or resource access while in QUIET, LOG, or WARN mode. If you implement the MODE=RULE option, you can phase in ABORT mode protection on a rule set basis.
Identify whether each system user is uniquely defined to the system. Identify all users and any existing individual or group IDs. Establish plans to positively identify each system user with a unique logonid and unexpired password. Another significant consideration in planning is the selection of a User Identification string (UID) format, based on your individual ID patterns and organizational groupings.
Determine whether your site is currently using batch job names, account numbers, or similar fields for any controls. Decide whether you should replace these functions with CA ACF2 for z/VM features, discontinue them, or they should coexist. You should also ensure that these controls will not interfere with CA ACF2 for z/VM.
Identify other automated or manual security procedures that exist or are required at your site. Consider controls on:
Identify other subsystems and software packages used (or that you plan to use). Review them to determine whether there will be any impact on CA ACF2 for z/VM or the other systems. Particularly important are:
Because the three CA ACF2 for z/VM databases (Rule, Logonid, and Infostorage) are critical to the smooth operation and security of the system, you should plan for their backup and recovery early in the implementation process. We provide an automatic database backup facility. The BACKUP VMO record lets you take up to 16 daily backups of the databases. See the Administrator Guide for detailed information about this record.
|
Copyright © 2009 CA Technologies.
All rights reserved.
|
|