This course describes audit concerns that IBMยฎ Security zSecure Audit reports.
The course explains auditing your RACFยฎ database and z/OS subsystems such as CICS, IMS, and DB2. You can measure your security and z/OS system settings against the security requirements of a selected policy level. Also, you learn about an Access Monitor data set containing historic RACF access decisions statistics.
This information is used to find profiles, permissions, or connections that are unused and can be removed from the RACF database. Furthermore, you learn reviewing the general SMF and RACF audit settings. This course explains how to use and interpret predefined SMF reports, and how to create customized SMF reports.
Finally, the Library and sequential data set status and change analysis functions are explained.
After this course participants should be able to:
Unit 1: Introduction to RACF auditing
Unit 2: Auditing user IDs and passwords
Unit 3: Auditing sensitive resources
Unit 4: Auditing subsystems
Unit 5: Auditing SMF
Unit 6: Using Access Monitor and RACF-Offline
Unit 7: Analyzing libraries and sequential data sets
Before taking this course, make sure that you have the following skills:
If applicable, you can achieve these skills by attending one or more of the following courses:
COURSE CONTENT: Unit 1: Overview of Applications Manager This unit covers the basic concepts of Applications Manager and one of its primary components, the Application Platform. ย Unit 2: Configuring…
This learning offering tells a comprehensive story of Cloud Pak for Data, and how you can extend the functions with services and integrations. You explore some of the services,…