CA Top Secret provides several utilities to assist auditors in performing their functional responsibilities:
Use this utility to monitor security‑related events from an online terminal in a real‑time manner. TSSTRACK can go back to a specified date and time to focus on a selected facility or CPU, or to focus on violations only. Use this utility from both display and nondisplay terminals. Its standard version can be run under CICS and TSO. All CPUs can be monitored from a single terminal if you are using a shared Audit/Tracking File. All displayed information is obtained from the CA Top Secret Audit/Tracking.
A flexible report generator/extract utility is used to provide batch reports of any security‑related events that have been logged to the Audit/Tracking File or SMF. Multiple and varied reports can be produced which monitor all types of security events with selection criteria that include:
This batch utility allows auditors to monitor changes that are made to the security file and sensitive z/OS facilities and data areas. It can be used to list:
This utility lets you generate the ACIDs and owned resource relationships within the CA Top Secret security database in the form of an organization chart. The auditor can generate these charts at the zone, division, department, profile, or user level. This utility allows auditors to review the Security database to ascertain that it has been designed effective.
This utility enables the auditor to simulate access attempts to resources to test and verify resource permissions. As a result, it can aid an auditor in deciding whether the ACID has access to particular resources. The auditor can simulate any mode or conditions for ACIDs within their scope of authority. TSSSIM establishes and verifies access characteristics. In addition, TSSSIM indicates which specific CA Top Secret permission (the TSS PERMIT command function) gave or denied access authorization.
This batch utility produces a fixed‑format output file whose records closely parallel the output of a TSS LIST command function. A four‑ to six‑character record identifier is associated with each record type. The auditor can then generate custom reports using TSSCFILE.
This utility is useful for auditors in a z/OS non‑Always call environment to determine what data sets are not protected. To obtain this information, the auditor must use the following options:
PROTECT SIM
Note: To execute TSSPROT, the auditor must be at least an SCA.
This batch utility enables the auditor to monitor user activity in the OpenEdition environment. The Various reports can be produced that monitor access to OpenEdition related, SAF callable services. Report data is extracted from SMF TYPE 231 records.
For information about these utilities, see the Report and Tracking Guide.
|
Copyright © 2010 CA Technologies.
All rights reserved.
|
|