Your protection profile strategy for using the CA Tape Encryption SAF Interface is to first decide which resources you want to protect and whether these resources are protected at the local (individual BESn subsystem), the global (all BES subsystems) level or a combination of both. Next, you should decide if all resources are to be protected by default or only a select few resources should be protected. Finally, you should select which data sets should be encrypted based upon security selection criteria.
The architecture of CA ACF2 protects all resources by default therefore global resource definitions and PERMIT processing is not supported. If you want to use PERMIT processing, you can define LOCAL pseudo-generic CA ACF2 rule sets that will effectively allow all functions to be enabled for all users.
The SAF Interface running under RACF or CA Top Secret uses a hierarchal model in determining security processing options and resource protection. The first checks are to determine the scope of control that has been implemented (PROTECT or PERMIT). PROTECT and PERMIT control statements allow you to set the scope or default level of resource protection. The second check is to determine the resource protection level that has been implemented (LOCAL or GLOBAL). All resources can be protected at either the LOCAL or GLOBAL level. The third check is to determine if the individual USERID, ACID, or LID has been granted either implicit or explicit access to the resource. Each of these terms are further explained in this chapter.
For CA Top Secret and IBM Security Server RACF, the security protection feature of CA Tape Encryption gives you a great deal of leeway to set up your security profiles in the manner most suited for your needs. The following points describe some of the possible configuration strategies:
Observe the following:
In most environments, you will want to set security profiles to control commands and keys on specific BES subsystems. In this case, you might have a primary BES subsystem (BES1), a failover BES subsystem (BES2), and a test BES subsystem (BES3). You would define the same security profiles to BES1 and BES2, but you most likely want less stringent security profiles for testing purposes on BES3. You can define commands, keys, and utilities to BES1 and BES2 and explicitly grant permissions for them on each subsystem. Then you might define a completely different set of security permissions for commands, keys, and utilities on BES3.
Note: If you want to permit or protect specific commands, keys, or utilities, you must define them to the security system and then define the permissions. If you do not do this and you are running CA Top Secret, RACF, or using CA ACF2 pseudo-global profiles, CA Tape Encryption will default to implicitly allowing access to these resources.
| Copyright © 2011 CA. All rights reserved. | Tell Technical Publications how we can improve this information |