Beyond the Software Life Cycle
|
|
|
- Samuel Hall
- 10 years ago
- Views:
Transcription
1 Beyond the Software Life Cycle CA-Endevor Facilitates Ad-hoc Job Processing Southern CA Endevor User Group June 2008 Rose A. Sakach Endevor Practice Leader - RSH Consulting, Inc. [email protected] RSH CONSULTING, INC. 1 Endevor Ad-Hoc Job Processing
2 Abstract Beyond the Software Life Cycle CA-Endevor Facilitates Ad-hoc Job Processing The current demand for maintaining a high level of production availability can often times require ad-hoc production file updates - a process that is typically associated with time and resource constraints, risk and potential security exposures. This session will describe a method of streamlining the production file update process by taking advantage of CA- Endevor's ability to store and track JCL changes, control dataset access via batch jobs, enforce code reviews and approvals, provide an audit trail and interface with the organization's scheduling software (i.e. CA-7; ASG's ZEKE). Procedural guidelines and sample Endevor processors will be provided. RSH CONSULTING, INC. 2 Endevor Ad-Hoc Job Processing
3 AGENDA Production File Updates Current Process Issues Endevor Can Help Procedural Guidelines Process Suggestions RACF Security Recommendations Monitoring RSH CONSULTING, INC. 3 Endevor Ad-Hoc Job Processing
4 Production File Updates Read access to a Production file Ad-Hoc reporting Dumping data to research and resolve a problem Copying data to produce valid test cases for testing / training Emergency backup Update access to a Production File Initial file load (new application installation) File conversion Emergency system outage (i.e. firecall) requires corrupt data repair remove/replace invalid records Emergency batch job restart / rerun (outside of scheduling software) RSH CONSULTING, INC. 4 Endevor Ad-Hoc Job Processing
5 Current Process Issues Good production file security policies limit access Users responsible for resolving the issue typically do not have standing access to the applicable files Most emergency file update processes: Are typically batch jobs executed outside of the scheduling software Do not enforce JCL validation and site specific process standards Are not standardized even though they occur repeatedly Often bypass formal authorization procedures Typically permit cart-blanche access resulting in increased risk Are not automatically tracked and thus not easily auditable Can result in intolerable outages and audit exposures which may cost the company lots of $$$$$ RSH CONSULTING, INC. 5 Endevor Ad-Hoc Job Processing
6 Endevor Can Help JCL repository Change tracking tool Mandates review and approvals for JCL changes / migrations Capable of interfacing with various software products Standardizes repeatable processes Can automatically enforce JCL and site security standards Provides Auditing capabilities Can you see where this is going? RSH CONSULTING, INC. 6 Endevor Ad-Hoc Job Processing
7 Endevor Can Help Production File Update Process (Today) User obtains authorization, then logs in to Production site and directly updates a sensitive file OR user creates a batch job to perform the file modifications May use generic firecall ids with lots of authority Unrestricted access No audit trail of who, what, when, how data was modified No enforceable review of changes Possible but unlikely audit trail of access request submitted to security High risk to sensitive data Open door to regulatory (i.e. SOX) and compliance issues Production File Update Process (Using Endevor) Authorized ENDEVOR user creates batch job, adds the item to Endevor, migrates to Production via a controlled process Authorization is predefined and controlled Complete, automatic audit trail Job must be reviewed/approved prior to migrating to production Sensitive data file authorization is required and enforced via automation RSH CONSULTING, INC. 7 Endevor Ad-Hoc Job Processing
8 Endevor Can Help Endevor Ad Hoc Job (Special Job) Process TEST DEV Stage 1 QA Stage 2 PRODUCTION EMER PROD Stage 1 Stage 2 SCHEDULING SOFTWARE (CA-7 / ZEKE) JCL Added Job Release Specifications Included USER WORK AREA JCL / Standards Validation JCL Changes Applied here Scheduling Interface Approval Required (Protected Inventory) RSH CONSULTING, INC. 8 Endevor Ad-Hoc Job Processing
9 Procedural Guidelines Production File Update Process Using Endevor Step 1 User RETRIEVES one of the predefined SPECJob type members Note: Appropriate access to data files specified within the job must be granted to the USERID assigned to the job User modifies the JCL to perform the required action User ADDS the SPECJob member to Endevor entry stage User reviews the LISTING library entry for any syntax or site standards coding errors that would cause the element to be marked *FAILED* Step 2 User MOVES the SPECJob element to the next stage in the life cycle in preparation of final review and job scheduling considerations RSH CONSULTING, INC. 9 Endevor Ad-Hoc Job Processing
10 Procedural Guidelines Production File Update Process Using Endevor Step 3 User CREATES a package to MOVE the SPECJob element to PRODUCTION Note: User can determine whether or not to utilize the Endevor execution window may be helpful if the job is to be released immediately by the scheduling software (be CAUTIOUS about this!) User CASTS package containing the SPECJob element Note: Depending upon the inventory location, element type and package type, this package will require approval from (should be a minimum of two): the data owner (or team lead), a scheduling administrator, a team member or alternate team lead. Firecall situations should utilize Emergency type package processing and must follow procedures and obtain approvals according to existing policies. Endevor Package SWEEP job process executes the package RSH CONSULTING, INC. 10 Endevor Ad-Hoc Job Processing
11 Procedural Guidelines Production File Update Process Using Endevor Step 4 During package processing, the Endevor MOVE processor writes (loads) appropriate records to the scheduling software database Note: Process specifications determine whether or not to place jobs on HOLD etc. Scheduler (i.e. CA-7 or ZEKE) processes the job scheduling request User verifies job execution post Endevor package execution (i.e. Package Status = Executed) RSH CONSULTING, INC. 11 Endevor Ad-Hoc Job Processing
12 Specifications to Consider: Procedural Guidelines Naming standards for reserved SPEC jobnames: AAA$SP01 99 Ability to VALIDATE JCL requirements (existing software tools?) Jobnames Account Codes USERIDs assigned to the job Dataset names (i.e. no USERID datasets allowed; Application HLQ restrictions) Abend or user-to-be-contacted instructions Ability to VALIDATE security requirements USERID naming standard is critical (AAA#SP01 = Read access to AAA) Predefined security permissions Predefined security procedures requesting additional access RSH CONSULTING, INC. 12 Endevor Ad-Hoc Job Processing
13 Specifications to Consider: Procedural Guidelines Flexibility in scheduling and data access SPJOB type = Release Immediately SPJOBH type = Place job on HOLD SPJDB2 type = Access DB2 data; Release immediately Element Comments = Job release instructions (Scheduler reviews these prior to performing approval) Endevor Sweep Process Existing Security Structure Avoid adding the SPJ ids to existing groups ( willy-nilly ) Consider auditing the SPJ ids (RACF = UAUDIT) Culture (Consider user s ability) RSH CONSULTING, INC. 13 Endevor Ad-Hoc Job Processing
14 Procedural Guidelines Implementation guidelines: Determine best approach based upon Endevor inventory structure Single SYSTEM w/ 100 s of Subsystems? Sweep job in place? Alternate USERID in place? (Guess who needs access to update the Scheduling database?) Define TYPES and allocate Endevor libraries Consider package id naming standard Work out Security Issues in advance Define the SPJ ids specifically for this process Grant appropriate access in advance (may require new profiles to be defined) Application Test file HLQ Application Prod file HLQ Interfacing Application Test HLQ? Interfacing Application Prod HLQ? Plan and Implement process for requesting additional access RSH CONSULTING, INC. 14 Endevor Ad-Hoc Job Processing
15 Implementation guidelines: Procedural Guidelines Exploit Validation Possibilities JCL checking software (i.e. ASG-JCLPREP or CA-JCLCHECK) Rexx Routines COBOL or Assembler Gather scheduling requirements Data record formats, field values etc. Security requirements to interface with CA-7 or ZEKE Setup automatic reporting process for Audit Endevor Reports (by type, by package id) Data Security Reports (by SPJ ids) Provide how-to documentation for users RSH CONSULTING, INC. 15 Endevor Ad-Hoc Job Processing
16 Entry Stage GENERATE Process Suggestions Insert your JCL validation software here Tip: Code two steps 1 for JCL validation, 1 for site standards Tip: Code a flag for each which will permit a bypass (as a failsafe) Tip: Store any JCL rules within Endevor to take advantage of change tracking Utilize CONWRITE to capture and store the JCL in a temporary file Store validation listings (CONLIST) within Endevor Ensure validation condition codes (issued from the validation software) appropriately mark element add as *FAILED* RSH CONSULTING, INC. 16 Endevor Ad-Hoc Job Processing
17 Entry Stage GENERATE (Syntax Check Sample Steps) Process Suggestions //************************************************************ //*STEP FUNCTION: EXTRACT THE SPECJob JCL FROM ENDEVOR SM LIBS //************************************************************ //CONWRITE EXEC PGM=CONWRITE,PARM='EXPINCL(&EXPINC)',MAXRC=0 //ELMOUT DD DSN=&&SPJCL(&C1ELEMENT), // UNIT=SYSDA, // SPACE=(TRK,(p,s,d),RLSE), // DISP=(NEW,PASS,DELETE), // DCB=(LRECL=80,RECFM=FB,BLKSIZE=0) (Continued on next slide) RSH CONSULTING, INC. 17 Endevor Ad-Hoc Job Processing
18 Entry Stage GENERATE (Continued from previous slide) Process Suggestions //****************************************************** //* STEP FUNCTION: Invoke JCL Check for SYNTAX check //***************************************************** //JCLPREP EXEC PGM=JCLPREP,COND=(0,LT,CONWRITE), // MAXRC=4, EXECIF=(&SYNCHECK,EQ,'Y') //SYSUDUMP DD SYSOUT=* //DDIN DD DSN=&&SPJCL,DISP=(OLD,PASS) //DDOUT DD DUMMY //DDXEFI DD DSN=&RULESLIB(&RSPJSYN),DISP=SHR //DDOPT DD DSN=&JOPTSLIB(&OSPJSYN),DISP=SHR //DDRUN DD * PDS INCLUDE &C1ELEMENT /* //DDWORK1 DD DSN=&&WORK01, // DISP=(OLD,PASS) //DDWORK2 DD DSN=&&WORK02, // DISP=(OLD,PASS) //DDRPT DD &&SYNLIST,DISP=(OLD,PASS) //DDXEFP DD DUMMY //DDXEFW DD DUMMY RSH CONSULTING, INC. 18 Endevor Ad-Hoc Job Processing
19 Production Stage MOVE Process Suggestions Prepare JCL for scheduling interface here Tip: Code a program to format JCL and ensure scheduling restrictions are validated Tip: The output of this program will serve as input to the scheduling batch utility Utilize CONWRITE to capture and store the JCL in a temporary file Code the scheduling batch utility interface here Tip: Ensure the ALTERNATE USERID has appropriate access to load and schedule the job Store validation and utility listings (CONLIST) within Endevor Ensure target stage is protected (i.e. PACKAGE is required) RSH CONSULTING, INC. 19 Endevor Ad-Hoc Job Processing
20 Production Stage MOVE (Sample Scheduling Interface) Process Suggestions //****************************************************** //*STEP FUNCTION: Obtain Element Source from BASE/DELTA //****************************************************** //CONWRITE EXEC PGM=CONWRITE,PARM=,MAXRC=0 //ELMOUT DD DSN=&&SOURCE, // DISP=(,PASS,DELETE),UNITE=&UNIT, // SPACE=(TRK,(p,s),RLSE), // DCB=(RECFM=FB,LRECL=80,BLKSIZE=3120) //* //****************************************************** //*STEP FUNCTION: Execute SPCjob Data format program //****************************************************** //SPECCBL EXEC PGM=SPECCHK, // PARM=(&C1ELEMENT,&C1USERID,&C1ELTYPE) //INFILE DD DSN=&&SOURCE,DISP=(OLD,DELETE) //OUTFILE DD DSN=&&SPECJCL, // DISP=(,PASS,DELETE),UNIT=&UNIT, // SPACE=(TRK,p,s),RLSE), // DCB=(RECFM=FB,LRECL=80,BLKSIZE=3120) //SYSUDUMP DD SYSOUT=* //SYSPRINT DD SYSOUT=* (continued on next slide) RSH CONSULTING, INC. 20 Endevor Ad-Hoc Job Processing
21 Production Stage MOVE (continued from previous slide) Process Suggestions //************************************************ //*STEP FUNCTION: Execute Scheduling Batch //* Interface Program //************************************************ //SCHED EXEC PGM=????????,PARM= parms, // MAXRC=4,COND=(0,NE,SPECCBL) //SYSIN DD DSN=&&SPECJCL,DISP=(OLD,DELETE) //SYSUDUMP DD SYSOUT=* //SYSABEND DD SYSOUT=* //sched-dd DD DSN=&SCHDFILE,DISP=SHR Notes: Scheduling software (CA-7; ZEKE; etc.) batch interface utility program The SPECJob to be loaded The Scheduling Database / master file RSH CONSULTING, INC. 21 Endevor Ad-Hoc Job Processing
22 RACF Security Recommendations Setting up batch USERIDs for the SPEC job card Sample JCL //AAA$SP00 JOB 99999, Copy Test Data,CLASS=A,REGION=6144K, // MSGLEVEL=(1,1),MSGCLASS=P,USER=AAA#SP01 //STEP001 EXEC PGM=IDCAMS //SYSPRINT DD SYSOUT=A //SYSUDUMP DD SYSOUT=V //INDD DD DSN=AAA0P.MASTER.D0TRAN.MS00PE1,DISP=SHR //* //OUTDD DD DSN=BBB00P.ACCNTR.D0BULK.MS00PE1,DISP=SHR //SYSIN DD DSN=PCE00P.AAA0AAA0.CNTL(FIXIT),DISP=SHR Notes: USERID requirements: UPDATE access to application BBB production files READ access to application AAA production files RSH CONSULTING, INC. 22 Endevor Ad-Hoc Job Processing
23 RACF Security Recommendations Batch USERID Naming Standard Sample Format = aaa#spnn where: aaa = The Application identifier #SP = Constant value to indicate SPECJob nn = Numeric value nn Samples: 00 = UPDATE or ALTER access to aaa application PROD files; READ access to aaa application TEST files 01 = same as 00 + UPDATE access to interface application BBB 02 = same as 00 + UPDATE access to interface application CCC 99 = same as 00 + UPDATE access to PAY RSH CONSULTING, INC. 23 Endevor Ad-Hoc Job Processing
24 RACF Security Recommendations Defining Batch USERIDs AU AAA#SP00 OWNER(AAA) NOPASSWORD NAME( ENDV SPJ ) DFLTGRP(AAA) AU AAA#SP01 OWNER(AAA) NOPASSWORD NAME( ENDV SPJ-BBB ) DFLTGRP(AAA) AU AAA#SP99 OWNER(AAA) NOPASSWORD NAME( ENDV SPJ-PAY ) DFLTGRP(AAA) ALU AAA#SP00 UAUDIT ALU AAA#SP01 UAUDIT ALU AAA#SP99 UAUDIT... Notes: Determine typical access requirements review sampling of prior firecall activities via incidence reporting Determine if one or many ids are required potential need, risk etc. Ensure ALL batch ids are predefined and have the PROTECTED attribute Specify UAUDIT on all batch ids for reporting RSH CONSULTING, INC. 24 Endevor Ad-Hoc Job Processing
25 RACF Security Recommendations Granting Permission to Data Files Things to keep in mind: Naming standards associated with production vs. test files (HLQ may not indicate) Be aware of existing RACF profiles protecting production and test data files (access to several profiles may be required depending upon security standards, file sensitivity etc.) When granting access to interfacing application data files, utilize the most specific profile possible (this may prompt a new profile definition but will ensure permission is explicit and access is limited) Ensure access level is appropriate (i.e. file creates/deletes require ALTER access) RSH CONSULTING, INC. 25 Endevor Ad-Hoc Job Processing
26 RACF Security Recommendations Granting Permission to the Data Files PE AAA00P.** PE AAA00T.** ACCESS(UPDATE) ID(AAA#SP00) ACCESS(READ) ID(AAA#SP00) PE AAA00P.** ACCESS(UPDATE) ID(AAA#SP01) PE AAA00T.** ACCESS(READ) ID(AAA#SP01) PE BBB00P.ACCNTR.D0BULK.MS00PE1 ACCESS(UPDATE) ID(AAA#SP01) OR BBB00P.ACCNTR.D*.** PE AAA00P.** PE AAA00T.** PE PAY0P.ACCNTR.B0ATBL.* ACCESS(UPDATE) ID(AAA#SP99) ACCESS(READ) ID(AAA#SP99) ACCESS(UPDATE) ID(AAA#SP99)... Notes: 00 user is granted access to Production and Test files for the specified application 01 user is granted the same access as the 00 user in addition to access to the BBB application (historical records have shown instances when AAA application requires update access to BBB production files) 99 user is granted update access to the PAY application production files in addition to having the same access as user 00 RSH CONSULTING, INC. 26 Endevor Ad-Hoc Job Processing
27 RACF Security Recommendations Granting Access to the Scheduler Requires use of SURROGAT Profiles Grants job submitter permission to submit a job with a specified USERID and no password Once submitted, the job runs under the authority of the USERID Defining SURROGAT Profiles RDEF SURROGAT AAA#SP00.SUBMIT UACC(NONE) OWNER(AAA) RDEF SURROGAT AAA#SP01.SUBMIT UACC(NONE) OWNER(AAA) RDEF SURROGAT AAA#SP02.SUBMIT UACC(NONE) OWNER(AAA) RDEF SURROGAT AAA#SP99.SUBMIT UACC(NONE) OWNER(AAA) RDEF SURROGAT BBB#SP00.SUBMIT UACC(NONE) OWNER(BBB) RDEF SURROGAT CCC#SP00.SUBMIT UACC(NONE) OWNER(CCC)... Notes: Define USERID.SUBMIT SURROGAT profile for each SPJ id Universal Access (UACC) should always be NONE! RSH CONSULTING, INC. 27 Endevor Ad-Hoc Job Processing
28 RACF Security Recommendations Granting Access to the Scheduler Permitting access to SURROGAT profiles PE AAA#SP00.SUBMIT CLASS(SURROGAT) ID(scheduler-id) ACCESS(READ) PE AAA#SP01.SUBMIT CLASS(SURROGAT) ID(scheduler-id) ACCESS(READ) PE AAA#SP02.SUBMIT CLASS(SURROGAT) ID(scheduler-id) ACCESS(READ) PE AAA#SP99.SUBMIT CLASS(SURROGAT) ID(scheduler-id) ACCESS(READ) PE BBB#SP00.SUBMIT CLASS(SURROGAT) ID(scheduler-id) ACCESS(READ PE CCC#SP00.SUBMIT CLASS(SURROGAT) ID(scheduler-id) ACCESS(READ)... Notes: The USERID associated with the scheduler MUST be granted READ access to every SPJ SURROGAT profile Access need never be higher than READ ALTER access should be avoided RSH CONSULTING, INC. 28 Endevor Ad-Hoc Job Processing
29 Monitoring Ensure appropriate reports are produced regularly and automatically to facilitate auditing RACF reporting can provide: Details on what the SPECjob did by showing: USERID requesting access All files accessed Access level requested (i.e. Read, Update, Control, Alter) Access level granted Jobname Details on the use of EMERGENCY packages (depending upon the BC1TNEQU configuration within Endevor s ESI) by showing: Package creator (i.e. user requesting access to package profiles) ESI Profiles, protected resources accessed and the level of access Package Approvers RSH CONSULTING, INC. 29 Endevor Ad-Hoc Job Processing
30 Monitoring Endevor reporting can provide: Details on each action performed against SPJ type elements within a specified Endevor inventory (CONRPT42) including USERID, date, VV.LL Package summary and package approver information (CONRPT71) by Package Id including quorum specifications and the ids associated with the person(s) who performed the approval(s) RSH CONSULTING, INC. 30 Endevor Ad-Hoc Job Processing
31 Summary Ad-hoc production file updates are necessary and typically not performed using a standardized, preauthorized process In particular, emergency (Firecall) situations are prone to creating exposures and greatly increasing risk Simply by the nature of its design, Endevor can facilitate an automated process which eliminates exposures and significantly reduces risk Configuration involves: Exploiting JCL validation software tools Coding processors that interface with JCL validation software and scheduling software Designing and configuring security such that special ids have the necessary access Providing reports that ensure appropriate monitoring is performed RSH CONSULTING, INC. 31 Endevor Ad-Hoc Job Processing
32 Questions RSH CONSULTING, INC. 32 Endevor Ad-Hoc Job Processing
CA-Endevor. Quality Assurance for Job Control Language. EUNE October 2007. Rose A. Sakach
CA-Endevor Quality Assurance for Job Control Language EUNE October 2007 Rose A. Sakach Endevor Practice Leader - RSH Consulting, Inc. [email protected] - 617-969-9050 - www.rshconsulting.com RSH
The Advantages Of External Security For DB2 And The Migration Towards RACF. Kurt Struyf, infocura
The Advantages Of External Security For DB2 And The Migration Towards RACF Kurt Struyf, infocura 0 Agenda The need for better data security What does DB2 offer? Why externalizing security? Why RACF? How
PRACTICAL TIPS FOR Z/OS VULNERABILITY SCANNING & PROACTIVE SECURITY MANAGEMENT
1 PRACTICAL TIPS FOR Z/OS VULNERABILITY SCANNING & PROACTIVE SECURITY MANAGEMENT Key Resources, Inc. [email protected] (312) KRI-0007 www.kr-in.com 2 Ray Overby SKK - ACF2 Developer (1981-1988) Key
z/os VULNERABILITY SCANNING AND MANAGEMENT Key Resources, Inc. [email protected] (312) KRI-0007 www.kr-inc.com
1 z/os VULNERABILITY SCANNING AND MANAGEMENT Key Resources, Inc. [email protected] (312) KRI-0007 www.kr-inc.com 2 Ray Overby SKK - ACF2 Developer (1981-1988) Key Resources, Inc. incorporated in 1988
CCF/CCF-II/MDH Transmission Guides
CCF/CCF-II/ Transmission Guides 2.04 Interface Control Manager (Messaging Output): Function User's Guide The Depository Trust Company ( DTC ). All rights reserved. This work is proprietary and is intended
München 2011. BMC Internet Service Retrieval. Axel Griepenstroh SC
MainView Roundtable München 2011 BMC Internet Service Retrieval Axel Griepenstroh SC Agenda Was ist BMC ISR Download BMC ISR Starten von BMC ISR - Setup - Submit Request - Receive Request Copyright 5/24/2011
How to Secure Mainframe FTP
How to Secure Mainframe FTP Stu Henderson (301) 229-7187 [email protected] Scott Myers (408) 973-8374 [email protected] 1 AGENDA I. Introduction II. III. IV. How Mainframe FTP is Different Mainframe
CA JCLCheck Workload Automation
PRODUCT SHEET CA JCLCheck Workload Automation CA JCLCheck Workload Automation CA JCLCheck Workload Automation (CA JCLCheck WA) validates z/os JCL before it is submitted for execution. CA JCLCheck WA helps
CA Workload Automation EE r11.3 Report Server. Fred Brisard
CA Workload Automation EE r11.3 Report Server Fred Brisard Terms of This Presentation This presentation was based on current information and resource allocations as of October 2009 and is subject to change
Compiler Forecast: Cloudy with. Cloud Computing for your z/os compilers
Compiler Forecast: Cloudy with a Chance of Savings Cloud Computing for your z/os compilers Speaker Bio Charles Mills is the Chief Development Officer of Cloud Compiling, LLC Mills was the founder of FiresignComputer
PREPARED BY: AUDIT PROGRAM Author: Lance M. Turcato. APPROVED BY: Logical Security Operating Systems - Generic. Audit Date:
A SYSTEMS UNDERSTANDING A 1.0 Organization Objective: To ensure that the audit team has a clear understanding of the delineation of responsibilities for system administration and maintenance. A 1.1 Determine
CA Chorus for Security and Compliance Management
CA Chorus for Security and Compliance Management Site Preparation Guide Version 03.0.00, Fifth Edition This Documentation, which includes embedded help systems and electronically distributed materials,
CA Endevor Software Change Manager
CA Endevor Software Change Manager Parallel Development Option Guide Version 16.0.00 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred
CA Application Quality and Testing Tools
CA Application Quality and Testing Tools Symbolic Guide Version 9.0.00 This documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the
Application Backup and Restore using Fast Replication Services. Ron Ratcliffe [email protected] March 13, 2012 Session Number 10973
Application Backup and Restore using Fast Replication Services Ron Ratcliffe [email protected] March 13, 2012 Session Number 10973 Session Agenda What is IBM Tivoli Advanced Backup and Recovery
CA Endevor Software Change Manager Version 15.0
PRODUCT SHEET CA Endevor Software Change Manager CA Endevor Software Change Manager Version 15.0 CA Endevor Software Change Manager (CA Endevor SCM) helps organizations to control all software management
Information Technology General Controls Review (ITGC) Audit Program Prepared by:
Information Technology General Controls Review (ITGC) Audit Program Date Prepared: 2012 Internal Audit Work Plan Objective: IT General Controls (ITGC) address the overall operation and activities of the
Agenda. z/os Ethical Hacking Vulnerability Scanning & Pen Testing. Mark Wilson RSM Partners. Session Number: 12275. l Disclaimer.
z/os Ethical Hacking Vulnerability Scanning & Pen Testing Mark Wilson RSM Partners Session Number: 12275 Agenda l Disclaimer l Introduction l Objectives l Mainframe Hacking Fact or Fiction? l Penetration
Utilities: SyncSort UFIT. UF Information Technology. EI&O Document ID: D0073 Last Updated: 06/27/2002
UFIT Utilities: SyncSort EI&O Document ID: D0073 Last Updated: 06/27/2002 This document briefly describes how to use SyncSort in z/os (OS/390) to sort an OS data set. It describes the SYNCSORT cataloged
Introduction to the new mainframe Chapter 7: Batch processing and the Job Entry Subsystem (JES)
Chapter 7: Batch processing and the Job Entry Subsystem (JES) Chapter 7 objectives Be able to: Give an overview of batch processing and how work is initiated and managed in the system. Explain how the
CA Workload Automation Restart Option for z/os Schedulers r11
PRODUCT SHEET CA Workload Automation Restart Option for z/os Schedulers r11 CA Workload Automation Restart Option for z/os Schedulers r11 CA Workload Automation Restart Option for z/os Schedulers (CA WA
CA Datacom Task Storage Options. User Key ECSA and Data Space
CA Datacom Task Storage Options User Key ECSA and Data Space September 19, 2007 1. Overview... 3 2. z/os 1.9 default change that blocks user key CSA... 3 2.1. z/os option AllowUserKeyCSA...3 2.2. CA Datacom
CA Integrated Agent Services
CA Integrated Agent Services Implementation Guide Version 12.0.00 Second Edition This Documentation, which includes embedded help systems and electronically distributed materials (hereinafter referred
Scheduling in SAS 9.3
Scheduling in SAS 9.3 SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc 2011. Scheduling in SAS 9.3. Cary, NC: SAS Institute Inc. Scheduling in SAS 9.3
Second Edition (May 1984)
5C28-1342-1 File No. 5370-40 Program Product Resource Access Control Facility (RACF) Auditor's Guide Program Number 5740-XXH Version 1, Release 6 ---- - ----- - - - --- -- ------ -. - Second Edition (May
Beta 92 Extended Job Manager. Central Job Management for Distributed Systems
Beta 92 Extended Job Manager Central Job Management for Distributed Systems Slide 2 Challenges Facing a Job Manager... Beta 92 Extended Job Manager Software whose modularity provides specific extensions
CA Librarian r4.3. Overview. Business value
PRODUCT SHEET CA Librarian CA Librarian r4.3 CA Librarian for z/os, for z/vse and for z/vm (CA Librarian) is a highly sophisticated and flexible storage medium of source programs and other sets of data
How To Migrate To Control-M
Migration Methodology to CONTROL-M Introduction Over 1,800 satisfied customers have migrated from their existing scheduling solution to CONTROL-M Business Integrated Scheduling, and over five million job
JD Edwards World. Database Audit Manager Release A9.3 E21957-02
JD Edwards World Database Audit Manager Release A9.3 E21957-02 April 2013 JD Edwards World Database Audit Manager, Release A9.3 E21957-02 Copyright 2013, Oracle and/or its affiliates. All rights reserved.
RACF PERFORMANCE TUNING
SHARE - August 2010 Robert S. Hansel Lead RACF Specialist - RSH Consulting, Inc. [email protected] - 617-969-9050 - www.rshconsulting.com 1 RSH PRESENTER Robert S. Hansel is Lead RACF Specialist
Scheduling in SAS 9.4 Second Edition
Scheduling in SAS 9.4 Second Edition SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2015. Scheduling in SAS 9.4, Second Edition. Cary, NC: SAS Institute
Using IDCAMS to Manage VSAM Data Sets
Using IDCAMS to Manage VSAM Data Sets Session 12998 Presented by Michael E. Friske IDCAMS Manual The IDCAMS commands can be found in the DFSMS Access Method Services (AMS) for Catalogs manual. This manual
21 Things You Didn t Used to Know About RACF
21 Things You Didn t Used to Know About RACF (A Technical Update for IT Auditors) Stuart Henderson The Henderson Group (301) 229-7187 1 Here Are 21 Things Auditors Should Know About RACF One Person s Opinion,
Samples of Management Consulting Assignments. Performed by DCAG are. Provided in the following pages.
Samples of Management Consulting Assignments Performed by DCAG are Provided in the following pages. Thomas Bronack 15180 20 th Avenue Whitestone, NY 11357 Phone: (718) 591-5553 Cell: (917) 673-6992 Email:
2.2 INFORMATION SERVICES Documentation of computer services, computer system management, and computer network management.
3 Audit Trail Files Data generated during the creation of a master file or database, used to validate a master file or database during a processing cycle. GS 14020 Retain for 3 backup cycles Computer Run
Control-D CA-DISPATCH Conversion Guide
Control-D CA-DISPATCH Conversion Guide Supporting Version 7.0.00 of Control-D September 2010 www.bmc.com Contacting BMC Software You can access the BMC Software website at http://www.bmc.com. From this
r12 Overview Business value
PRODUCT SHEET CA 1 Tape Management CA 1 Tape Management r12 CA 1 Tape Management r12 (CA 1) provides for the management, control, and protection of z/os tape data sets and volumes. CA 1 integrates with
3.11 System Administration
3.11 The functional area is intended to contribute to the overall flexibility, efficiency, and security required for operating and maintaining the system. Depending on the architecture of the system, system
Digital Certificate Goody Bags on z/os
Digital Certificate Goody Bags on z/os Ross Cooper, CISSP IBM Corporation RACF/PKI Development Poughkeepsie, NY Email: [email protected] August 6 th, 2012 Session 11623 Agenda What is a Digital Certificate?
SupportPac CB12. General Insurance Application (GENAPP) for IBM CICS Transaction Server
SupportPac CB12 General Insurance Application (GENAPP) for IBM CICS Transaction Server SupportPac CB12 General Insurance Application (GENAPP) for IBM CICS Transaction Server ii General Insurance Application
Revolutionized DB2 Test Data Management
Revolutionized DB2 Test Data Management TestBase's Patented Slice Feature Provides a Fresh Solution to an Old Set of DB2 Application Testing Problems The challenge in creating realistic representative
Service Asset & Configuration Management PinkVERIFY
-11-G-001 General Criteria Does the tool use ITIL 2011 Edition process terms and align to ITIL 2011 Edition workflows and process integrations? -11-G-002 Does the tool have security controls in place to
CA View r11.7. Business value. Product overview. Delivery approach
DATA SHEET CA View r11.7 CA View is an automated archival and retrieval system that provides immediate and flexible online viewing of mainframe and distributed output. Its repository is capable of housing
CA CMDB Connector for z/os version 2.0
PRODUCT SHEET CA CMDB Connector for z/os version 2.0 CA CMDB Connector for z/os version 2.0 CA CMDB Connector for z/os is the final piece in the puzzle to create an enterprise CMDB, providing you the ability
Automated Underwriting: Threat or Opportunity? Jason Bowman, Head of Accelerated Underwriting, NA Dan Drabik, Senior Magnum Consultant
Automated Underwriting: Threat or Opportunity? Jason Bowman, Head of Accelerated Underwriting, NA Dan Drabik, Senior Magnum Consultant Introduction The pace of change Ever feel overwhelmed by the pace
How To Control Vcloud Air From A Microsoft Vcloud 1.1.1 (Vcloud)
SOC 1 Control Objectives/Activities Matrix goes to great lengths to ensure the security and availability of vcloud Air services. In this effort, we have undergone a variety of industry standard audits,
Microsoft SQL Server Security Best Practices
Microsoft SQL Server Security Best Practices This white paper contains administrative and operational best practices that should be performed from a security perspective when using Microsoft SQL Server.
Gothenburg 2015. Mainframe and Continuous Integration. Jan Marek Jan.Marek@ca. com. CA Technologies. Session S610
Jan Marek Jan.Marek@ca. com CA Technologies Session S610 Mainframe and Continuous Integration Agenda Introduce continuous integration concept What problem we were facing Overview of the solution Examples
Health Insurance Portability and Accountability Act Enterprise Compliance Auditing & Reporting ECAR for HIPAA Technical Product Overview Whitepaper
Regulatory Compliance Solutions for Microsoft Windows IT Security Controls Supporting DHS HIPAA Final Security Rules Health Insurance Portability and Accountability Act Enterprise Compliance Auditing &
RACF & Payment Card Industry (PCI) Data Security Standards RUGONE May 2012
RACF & Payment Card Industry (PCI) Data Security Standards Robert S. Hansel Lead RACF Consultant [email protected] 617 969 9050 Robert S. Hansel Robert S. Hansel is Lead RACF Specialist and founder
Empower TM 2 Software
Empower TM 2 Software 21 CFR PART 11 COMPLIANCE ASSESSMENT Revision A, December, 2005 1 of 14 Waters Corporation Note: Information presented in this document assumes that the appropriate Empower 2 System
Utility Mainframe System Administration Training Curriculum
Utility Mainframe System Administration Training Curriculum MVS SYSTEM ADMINISTRATION MVS SYSTEM ADMINISTRATION- LEVEL 1 TO 1.5 Name of the Module Common for All Administration LSO TSO/ISPF JCL & UTILITIES
Mail 2 ZOS FTPSweeper
Mail 2 ZOS FTPSweeper z/os or OS/390 Release 1.0 February 12, 2006 Copyright and Ownership: Mail2ZOS and FTPSweeper are proprietary products to be used only according to the terms and conditions of sale,
How To Improve Your Database Performance
SOLUTION BRIEF Database Management Utilities Suite for DB2 for z/os How Can I Establish a Solid Foundation for Successful DB2 Database Management? SOLUTION BRIEF CA DATABASE MANAGEMENT FOR DB2 FOR z/os
IT Service Continuity Management PinkVERIFY
-11-G-001 General Criteria Does the tool use ITIL 2011 Edition process terms and align to ITIL 2011 Edition workflows and process integrations? -11-G-002 Does the tool have security controls in place to
Best Practices Report
Overview As an IT leader within your organization, you face new challenges every day from managing user requirements and operational needs to the burden of IT Compliance. Developing a strong IT general
S609. RDz and Source Control Management Systems
S609. RDz and Source Control Management Systems Michael Erichsen [email protected] www.xact.dk Agenda Source Control Management (SCM) What it does Some product examples Integrating RDz with SCM
How to resolve Root Certificate Expiry Issue for Enterprise Manager - Database Control (10.2.0.4)
PURPOSE 14 th June, 2011 This paper demonstrates how to resolve the Oracle Enterprise Manager Database Control configuration errors in Oracle Database versions 10.2.0.4 or 10.2.0.5, arising due to the
Mark Wilson [email protected] Session Details: The Introduction
Everything you wanted to know about mainframe security, pen testing and vulnerability scanning.. But were too afraid to ask! Mark Wilson [email protected] Session Details: The Introduction Agenda Introduction
FairWarning Mapping to PCI DSS 3.0, Requirement 10
FairWarning Mapping to PCI DSS 3.0, Requirement 10 Requirement 10: Track and monitor all access to network resources and cardholder data Logging mechanisms and the ability to track user activities are
New GoAnywhere File Transfer Set Up Tasks
New GoAnywhere File Transfer Set Up Tasks 1 Task Name Comments Assigned To Duration NEW GO ANYWHERE FILE TRANSFER SETUP TASKS 2 STANDARDS 3 4 PCSSC will be encrypting all files whether they contain PII
CA Endevor Software Change Manager Release 15.1
PRODUCT SHEET CA Endevor Software Change Manager CA Endevor Software Change Manager Release 15.1 agility made possible CA Endevor Software Change Manager (CA Endevor SCM) helps organizations control all
CSN38:Tracking Privileged User Access within an ArcSight Logger and SIEM Environment Philip Lieberman, President and CEO
CSN38:Tracking Privileged User Access within an ArcSight Logger and SIEM Environment Philip Lieberman, President and CEO 2009 by Lieberman Software Corporation. Rev 20090921a Identity Management Definitions
Migration Guide. Informatica PowerExchange (Version 8.1.1)
Migration Guide Informatica PowerExchange (Version 8.1.1) Informatica PowerExchange Migration Guide Version 8.1.1 March 2007 Copyright (c) 2006 Informatica Corporation. All rights reserved. Printed in
CA OPS /MVS Event Management and Automation
CA OPS /MVS Event Management and Automation Security Guide Release 12.1 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the
Sharing Secrets Using Encryption Facility
Sharing Secrets Using Encryption Facility Eysha S. Powers IBM Corporation Insert Custom Session QR if Desired Tuesday, August 11, 2015: 6:00pm 7:00pm Session Number 17624 Cryptography is used in a variety
Java on z/os. Agenda. Java runtime environments on z/os. Java SDK 5 and 6. Java System Resource Integration. Java Backend Integration
Martina Schmidt [email protected] Agenda Java runtime environments on z/os Java SDK 5 and 6 Java System Resource Integration Java Backend Integration Java development for z/os 4 1 Java runtime
Clinical Data Management (Process and practical guide) Nguyen Thi My Huong, MD. PhD WHO/RHR/SIS
Clinical Data Management (Process and practical guide) Nguyen Thi My Huong, MD. PhD WHO/RHR/SIS Training Course in Sexual and Reproductive Health Research Geneva 2013 OUTLINE Overview of Clinical Data
IBM DB2 Data Archive Expert for z/os:
Front cover IBM DB2 Data Archive Expert for z/os: Put Your Data in Its Place Reduce disk occupancy by removing unused data Streamline operations and improve performance Filter and associate data with DB2
Information Technology General Controls (ITGCs) 101
Information Technology General Controls (ITGCs) 101 Presented by Sugako Amasaki (Principal Auditor) University of California, San Francisco December 3, 2015 Internal Audit Webinar Series Webinar Agenda
Integrating Web Services and Natural Objects Using EntireX
Integrating Web Services and Natural Objects Using EntireX Technical Paper: Calling a Web Service from Natural 4/15/2013 Software AG Global Support Services 1) Start Broker (e.g. ETB1331) 2) Check that
Dell InTrust 11.0. Preparing for Auditing Microsoft SQL Server
2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.
What IT Auditors Need to Know About Secure Shell. SSH Communications Security
What IT Auditors Need to Know About Secure Shell SSH Communications Security Agenda Secure Shell Basics Security Risks Compliance Requirements Methods, Tools, Resources What is Secure Shell? A cryptographic
CA OPS /MVS Event Management and Automation
CA OPS /MVS Event Management and Automation Security Guide Release 12.0 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the
Secure Database Backups with SecureZIP
Secure Database Backups with SecureZIP A pproved procedures for insuring database recovery in the event of a disaster call for backing up the database and storing a copy of the backup offsite. Given the
PCI Compliance in Oracle E-Business Suite
PCI Compliance in Oracle E-Business Suite May 14, 2015 Mike Miller Chief Security Officer Integrigy Corporation David Kilgallon Oracle Integration Manager CardConnect Moderated by Phil Reimann, Director
How To Create An Audit Trail In Sas
Audit Trails for SAS Data Sets Minh Duong Texas Institute for Measurement, Evaluation, and Statistics University of Houston, Houston, TX ABSTRACT SAS data sets are now more accessible than ever. They are
File Manager base component
Providing flexible, easy-to-use application development tools designed to enhance file processing IBM File Manager for z/os, V13.1 Figure 1: File Manager environment Highlights Supports development and
Migrating to vcloud Automation Center 6.1
Migrating to vcloud Automation Center 6.1 vcloud Automation Center 6.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a
CA Deliver r11.7. Business value. Product overview. Delivery approach. agility made possible
PRODUCT SHEET CA Deliver agility made possible CA Deliver r11.7 CA Deliver is an online report management system that provides you with tools to manage and reduce the cost of report distribution. Able
Version 5.0. MIMIX ha1 and MIMIX ha Lite for IBM i5/os. Using MIMIX. Published: May 2008 level 5.0.13.00. Copyrights, Trademarks, and Notices
Version 5.0 MIMIX ha1 and MIMIX ha Lite for IBM i5/os Using MIMIX Published: May 2008 level 5.0.13.00 Copyrights, Trademarks, and Notices Product conventions... 10 Menus and commands... 10 Accessing online
CICS Transactions Measurement with no Pain
CICS Transactions Measurement with no Pain Prepared by Luiz Eduardo Gazola 4bears - Optimize Software, Brazil December 6 10, 2010 Orlando, Florida USA This paper presents a new approach for measuring CICS
1 Building an Identity Management Business Case. 2 Agenda. 3 Business Challenges
1 Building an Identity Management Business Case Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Justifying investment in identity management automation. 2 Agenda Business challenges
z/os Performance Monitoring Tools Shoot-Out: ASG, BMC, CA, Rocket
z/os Performance Monitoring Tools Shoot-Out: ASG, BMC, CA, Rocket Gary Henderson ASG (Allen Systems Group) 1 March 2011, 9:30 AM-10:30 AM Session Number 8695 Installation and Maintenance Installation and
Data Consistency Management Overview January 2014. Customer
Data Consistency Management Overview January 2014 Customer Agenda Motivation SAP Solution Manager as Tool for Data Consistency Management Transactional Correctness (TC) Guided Self Service Data Consistency
CA 7 Workload Automation Disaster Recovery. Marysue Redd
CA 7 Workload Automation Disaster Recovery Marysue Redd Terms of This Presentation This presentation was based on current information and resource allocations as of October 2009 and is subject to change
IMS Disaster Recovery
IMS Disaster Recovery Part 1 Understanding the Issues February 5, 2008 Author Bill Keene has almost four decades of IMS experience and is recognized world wide as an expert in IMS recovery and availability.
HIPAA Security Alert
Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information
DevOps: Multiplatform Application Deployment
DevOps: Multiplatform Application Deployment Insert Custom Session QR if Desired Rosalind Radcliffe Distinguished Engineer Chief Architect for DevOps and CLM IBM Academy of Technology [email protected]
Utilization of Hostsystem s Cross Sysplex Manager in the Swisscom IT Services. GSE z/os Expertenforum Brienz, May 2005 Thomas Ruh
Utilization of Hostsystem s Cross Sysplex Manager in the Swisscom IT Services GSE z/os Expertenforum Brienz, May 2005 Thomas Ruh Agenda Projects of consolidation Shared Dasd environment complex of problems
CA Workload Automation Restart Option for z/os Schedulers: NJE Restarts. Jared Moran
CA Workload Automation Restart Option for z/os Schedulers: NJE Restarts Jared Moran Terms of This Presentation This presentation was based on current information and resource allocations as of October
Audit Logging. Overall Goals
Audit Logging Security Training by Arctec Group (www.arctecgroup.net) 1 Overall Goals Building Visibility In Audit Logging Domain Model 2 1 Authentication, Authorization, and Auditing 3 4 2 5 6 3 Auditing
Microsoft Visual Studio Integration Guide
Microsoft Visual Studio Integration Guide MKS provides a number of integrations for Integrated Development Environments (IDEs). IDE integrations allow you to access MKS Integrity s workflow and configuration
Bookstore credit card application
Bookstore credit card application We recently created an application to simulate a credit card transaction. This application tests the z/os Cryptographic Services as well as DB2 and IMS Data Encryption.
