Previous Topic: Security Profiles

Next Topic: Global Resource Protection Security Profiles

Your Protection Profile Strategy

Your protection profile strategy for using the CA Tape Encryption SAF Interface is to first decide which resources you want to protect and whether these resources are protected at the local (individual BESn subsystem), the global (all BES subsystems) level or a combination of both. Next, you should decide if all resources are to be protected by default or only a select few resources should be protected. Finally, you should select which data sets should be encrypted based upon security selection criteria.

The architecture of CA ACF2 protects all resources by default therefore global resource definitions and PERMIT processing is not supported. If you want to use PERMIT processing, you can define LOCAL pseudo-generic CA ACF2 rule sets that will effectively allow all functions to be enabled for all users.

The SAF Interface running under RACF or CA Top Secret uses a hierarchal model in determining security processing options and resource protection. The first checks are to determine the scope of control that has been implemented (PROTECT or PERMIT). PROTECT and PERMIT control statements allow you to set the scope or default level of resource protection. The second check is to determine the resource protection level that has been implemented (LOCAL or GLOBAL). All resources can be protected at either the LOCAL or GLOBAL level. The third check is to determine if the individual USERID, ACID, or LID has been granted either implicit or explicit access to the resource. Each of these terms are further explained in this chapter.

For CA Top Secret and IBM Security Server RACF, the security protection feature of CA Tape Encryption gives you a great deal of leeway to set up your security profiles in the manner most suited for your needs. The following points describe some of the possible configuration strategies:

Note: If you want to permit or protect specific commands, keys, or utilities, you must define them to the security system and then define the permissions. If you do not do this and you are running CA Top Secret, RACF, or using CA ACF2 pseudo-global profiles, CA Tape Encryption will default to implicitly allowing access to these resources.