All jobs, data files, programs, and hardware devices are under the direct control of z/OS, therefore a complete audit is crucial. For example, it is possible to set up users that ignore passwords, subvert CA Top Secret, and modify production data. User can also destroy audit trails and access restricted files—through z/OS granted permissions. On the systems level, it is your responsibility to control:
Some of the information that is provided by CA Auditor includes:
Provides z/OS version, level number, SUs, IPL and SYSGEN information, CPU type and serial number, and so on. CA Auditor allows online retrieval of SMF data in English, explains SMF options parameters, files, and exits. System level functions can scan PROCLIBs, and provides JES and SMF IDs, JES PROCLIB identification, and JES2 options.
Includes device display by address, name, type, or allocation status. Online summary of disk and tape error rates, display of operator consoles including routing codes, allowable command groups, and alternate console structure is also available.
Includes PARMLIB and z/OS release independent display of APF, LINKLIST, LPA, and key system libraries. Determination of APF problems, such as duplicate modules, unauthorized copies of superzap, duplicated module detection, APF TSO programs and commands, and so on. It also provides automatic detection of PARMLIB changes and mapping of system catalogs.
Provides unique analysis functions to display z/OS subsystem information; search and scan for site defined I/O appendages; locate and identify major exits; display and analyze PLPA, MLPA, FLPA, and the Program Properties Table; and detect intercepts and abnormal conditions for IBM, site‑defined, and ESR SVC modules.
Provides JCL scans, intelligent online program compare, program freezer, program origin determination, program statistical information, and SMF‑based job and program scans.
Provides Library and VTOC integrity analysis, password system validation, catalog, and volume based complex search capability, library source and load module correlation, file freezer, and file compare.
A z/OS system audit should include an evaluation of all threats. Occasional checks of program code, data files, and audit trails are required. Audit trails of changed data elements are facilitated through the Applications Interface.
|
Copyright © 2010 CA Technologies.
All rights reserved.
|
|