Role-based Access Control in a RACF environment
|
|
|
- Ethel Willis
- 10 years ago
- Views:
Transcription
1 Role-based Access Control in a RACF environment An investigation of some possibilities for enhancements Lennie Dymoke-Bradshaw June 2011 With contributions from Alan Harrison and GSE UK Security Working Group
2 Role based Access In the past RACF has dealt with users as individuals. It has been assumed that each user might require individually tailored access levels and permissions. This has served well in the past, but requirements have changed. Todays environment must deal with A Rapidly changing workforce A need for responsibilities to be managed independently of people A far tighter need for audit controls A more consistent alignment of security requirements with personnel structures More regular and tighter compliance reporting Requirements for a more readily understandable view of permissions A role-based access control system can provide much of this, but RACF is not best placed to take advantage. We recognise there may be situations in which a single user inhabits a Job role. However there are still advantages to maintaining Job roles (responsibilities) independently of users (people).
3 How does access control work with RACF currently? RACF current uses a user-based model for managing access to resources. Each resource profile has an access list, and there are entries in each access list granting or denying access. These entries can be for the USER. Each USER must also be a member of at least one GROUP. The GROUP may also be used in an access list (but the USER entry takes precedence if present). If a USER is a member of more than one GROUP, and multiple GROUPs are in an access list, then the entry with the highest access takes precedence. This processing can be altered by negating the system-wide option List of Groups, but this is rarely seen nowadays. Each USER profile also has other privileges, authorities and attributes such as AUDITOR, RESTRICTED, PROTECTED, CLAUTH. Each USER profile has attributes related to USER Segments. These apply information and controls for other operating system and subsystem components. Examples are TSO, CICS, OMVS. Some resource profiles have a second access list called the Conditional Access list. If access is not granted by the standard access list then it may be granted by this second list which includes various conditions.
4 What challenges are faced by RACF installations in attempting to implement Role-Based Access? Most enterprises using z/os (or z/vm) maintain large RACF databases with a large number of users. These organisation typically have a large turnover of staff, so that the creation, deletion and modification of user definitions is a major part of the security administration. In many cases, attempts have been made to organise using a Role-Based approach, but this frequently involves many controls outside of RACF, and special processes or panels written to achieve this. These are some of the issues facing such organisations. 1. The Creation of a new user profile is frequently performed by using an existing user as a model. However, there are no controls to ensure that all users with a Job role have the same access or attributes. 2. While this process of creating a userid using another userid as a model can be performed using priced RACF add-on packages, or home-grown routines, there is no functionality within the base product. 3. Some installations create specialised USER profiles to act as these Job roles, but these can be a security exposure as they are not associated with any particular person, but can still be used to gain access to resources. 4. There is no function available to compare one User profile with another, to confirm adherence to the Role Based approach 5. When temporary access is required, it is frequently granted, and then not withdrawn, but only from a single user, thus breaking the Role-Based relationships.
5 What challenges are faced by RACF installations in attempting to implement Role-Based Access? Continued. 6. When access changes are needed to a Job role this may be achieved by granting access to a group. In this case the Role-Based access is maintained. However, if is performed by connecting a user to a new group, then all users within the Job role need to have the same CONNECT command issued. Note that if access was granted to a resource by placing a group in an access list, then this may alter access for more than one Job role. 7. When a Job role has to be split, such as when a small number of people are given some administrative responsibility there is no simple way for this to be achieved. 8. There is no current method of grouping all the users within a Job role, other than using a naming convention or some other locally devised construct. 9. If members of the Job role have attributes not associated with Access, such as Auditor, Special, Restricted or have CLAUTH authorities, then these have to be separately managed. 10. If User profiles are to have attributes and capabilities set via RACF segments other than the base segment (e.g. for TSO, CICS or OMVS) then further processes have to be put in place to manage this. 11. If access to a resource is granted at the User level then this frequently breaks the Role Based approach. 12. If an installation defined Role Based access method is devised, then separate controls have to be in place to determine which users have authority to modify the authorities of the Role.
6 What benefits could accrue if Role Based controls were built into RACF? a. The set of Job roles can largely be derived from a personnel chart. b. The attributes of each Job role can be decided more easily by examination of the Job role s responsibilities. c. The Job roles can be maintained and managed using less commands. d. The assignment of users to Job roles can become a more easily managed task. e. The comparison of authorities between Users and Job roles can be more easily achieved. f. The examination of the capabilities of a particular User can be derived from the associated Job role definition. g. The moving of a User from one Job role to another is more easily achieved. h. The decommissioning of Users can be more easily achieved. i. The creation and deletion of Job roles can be more easily achieved. j. The adjustment of access for a Job role can be achieved in a more consistent manner. k. The assignment of special privileges or restrictions can be more consistently managed. l. The management of RACF Segments associated with Users can be achieved more easily and more consistently. This will result in, 1) more accurate reporting of roles and responsibilities. 2) Simplified auditing of roles and users 3) More confidence in the ability to report discrepancies
7 Terminology Role or Job role This defines the responsibilities of a number of people usually within a personnel chart or organisation chart. A collection of permissions Permissions (object-action pairs) Access list entries granted by PERMIT command User and Group attributes SPECIAL, PROTECTED, RESTRICTED, NOTERMUACC, etc CLAUTH values INTERVAL values Auditing flags
8 Proposal 1: TEMPLATE user The first approach we discuss uses a new attribute for the USER profile which for now we shall refer to as a TEMPLATE attribute. 1. A USER profile having the TEMPLATE attribute cannot be used in any authorisation decision. It cannot be used to logon, start a started task, run a batch job, or be used in a RACROUTE REQUEST=VERIFY macro, which results in the running of work. 2. A new process here called UserCopy will be provided to create a USER profile from a USER profile with the TEMPLATE attribute. 3. A new process here called UserCompare will be provided to compare one USER profile with another and produce either, A list of differences, or A set of commands to reconcile the differences
9 Proposal 1: TEMPLATE user with UserCopy process Request for new user called BILL for Role Clerk User: Clerk (Template) UserCopy User: Bill During the UserCopy process all attributes and permissions from Clerk are copied to Bill. Group connections and authorities are copied Segments are copied There has to be a customisable masking mechanism to specify those items which are required to be unique to users Name UID Home directories other fields (e.g. in CSDATA segments)
10 Proposal 1: TEMPLATE user with UserCompare process User: Bill User: Clerk (Template) UserCompare List of differences between Bill and Clerk (and optionally commands to reconcile differences) During the UserCompare process all attributes and permissions from Clerk are compared to Bill. Group connections and authorities are compared Segments are compared There has to be a masking mechanism to specify those items which are required to be unique to users Name UID Home directories other fields (e.g. in CSDATA segments)
11 Proposal 1: TEMPLATE user This approach provides a mechanism for most installations to introduce a Role-Based system, and provides basic tools for the maintenance of the Users within each role. If a USER profile has changes made to it which fall outside the Job role definition (as defined by the TEMPLATE user profile), then we have mechanisms to bring matters back into line. However, this would provide a system which cannot be mandated. It still needs regular checking to ensure that USER profiles do not diverge from TEMPLATE user profiles. There is no automatic adjustment of permissions, and the permissions are still held at the USER level, when really they should be held at the Job role level. For this reason we have an alternate proposal for a mechanism which can be used to manage permissions and attributes in a more consistent manner.
12 Proposal 2: New RACF Construct: Jobrole The second approach we discuss uses a new construct. The nature of this construct we do not mandate in any sense. It could be managed using a new RACF class. It could be similar to the TEMPLATE user discussed in Proposal 1. Or it could be something entirely different. However, we simply refer to it as a Jobrole. The Jobrole is sufficiently similar to a USER that it can be used to specify all user attributes, group connections and permissions. The Jobrole will have the ability to have multiple USER profiles associated with it. A user can be associated with one and only one Jobrole. When determining the access capabilities or permissions of the user The attributes of the user are ignored The attributes of the Jobrole will be used There still is a need for a customisable masking mechanism to specify those items which are required to be unique to users Name UID Home directories other fields (e.g. in CSDATA segments)
13 Proposal 2: New RACF Construct: Jobrole User Initialisation: Current User Initialisation: Proposed User: Bill User: Bill (linked to Jobrole Clerk) Jobrole: Clerk RACROUTE REQ=VERIFY RACROUTE REQ=VERIFY ACEE ACEE
14 Proposal 2: New RACF Construct: Jobrole With this new mechanism the building of the ACEE is achieved by finding the Jobrole associated with the user, and building from it and the user profile. All access permissions and attributes are taken from the Job role. All attributes which are unique to the user are taken from the user profile, E.g. Name, UID, Home, etc. Any requirements for access permissions will be made to the Job role. User ACEEs will automatically get the new or changed permissions or attributes. There will no longer be any need to ensure that all users within a Job role have the same access, as they will have this automatically. The need for group connections to be specified at the user level will no longer be needed. Management of Job roles will replace the management of user profiles. Group profiles can still be used to manage access to resources across multiple Job roles. One major remaining issue is addressed by Proposal 3.
15 Proposal 3: Restrict userids in access lists The presence of User entries in the access lists of resource profiles becomes a challenge in managing Job roles. If there are userids in access lists then this breaks the Job role rules as one member of a Job role will get access to a resource while another will not. There are several ways to tackle this, and we present some alternatives, recognising that customers may have different requirements in this area. 1. Firstly, there should be an option to be able to specify the Job role in the access list. The justification for this is simple. If the Job role is replacing the userid as the centre for attribute and access specification, then it makes sense to allow the Job role to be used in place of the userid. 2. Have a system-wide option to disallow the checking of userids in access lists. This could be o o o specified as, Mandated for everyone Only for ACEEs built using Job roles Not active 3. Provide a system-wide option to prevent userids being specified in the PERMIT command. Again this could be specified as, o o o Mandated for everyone Only for ACEEs built using Job roles Not active
z/os VULNERABILITY SCANNING AND MANAGEMENT Key Resources, Inc. [email protected] (312) KRI-0007 www.kr-inc.com
1 z/os VULNERABILITY SCANNING AND MANAGEMENT Key Resources, Inc. [email protected] (312) KRI-0007 www.kr-inc.com 2 Ray Overby SKK - ACF2 Developer (1981-1988) Key Resources, Inc. incorporated in 1988
RACF PERFORMANCE TUNING
SHARE - August 2010 Robert S. Hansel Lead RACF Specialist - RSH Consulting, Inc. [email protected] - 617-969-9050 - www.rshconsulting.com 1 RSH PRESENTER Robert S. Hansel is Lead RACF Specialist
PREPARED BY: AUDIT PROGRAM Author: Lance M. Turcato. APPROVED BY: Logical Security Operating Systems - Generic. Audit Date:
A SYSTEMS UNDERSTANDING A 1.0 Organization Objective: To ensure that the audit team has a clear understanding of the delineation of responsibilities for system administration and maintenance. A 1.1 Determine
Second Edition (May 1984)
5C28-1342-1 File No. 5370-40 Program Product Resource Access Control Facility (RACF) Auditor's Guide Program Number 5740-XXH Version 1, Release 6 ---- - ----- - - - --- -- ------ -. - Second Edition (May
RACF & Payment Card Industry (PCI) Data Security Standards RUGONE May 2012
RACF & Payment Card Industry (PCI) Data Security Standards Robert S. Hansel Lead RACF Consultant [email protected] 617 969 9050 Robert S. Hansel Robert S. Hansel is Lead RACF Specialist and founder
New Security Options in DB2 for z/os Release 9 and 10
New Security Options in DB2 for z/os Release 9 and 10 IBM has added several security improvements for DB2 (IBM s mainframe strategic database software) in these releases. Both Data Security Officers and
Performance Dashboard Tutorial
Performance Dashboard Tutorial Introduction This documents describes how to set-up the Excel templates provided by L3 Analytics. The configuration is straight forward: fill in all fields from the spreadsheet
Mark Wilson [email protected] Session Details: The Introduction
Everything you wanted to know about mainframe security, pen testing and vulnerability scanning.. But were too afraid to ask! Mark Wilson [email protected] Session Details: The Introduction Agenda Introduction
EMR Outcomes Self-Assessment Contents
Contents Introduction... How does it work?... Select Purpose... Patient Care Processes... Registration and Attachment... Scheduler... Referral/Consult... 4 Assessment and Treatment... 5 Assessment-Ordering
Agenda. z/os Ethical Hacking Vulnerability Scanning & Pen Testing. Mark Wilson RSM Partners. Session Number: 12275. l Disclaimer.
z/os Ethical Hacking Vulnerability Scanning & Pen Testing Mark Wilson RSM Partners Session Number: 12275 Agenda l Disclaimer l Introduction l Objectives l Mainframe Hacking Fact or Fiction? l Penetration
Audit of NSERC Award Management Information System
Internal Audit Audit Report Audit of NSERC Award Management Information System TABLE OF CONTENTS 1. EXECUTIVE SUMMARY... 2 2. INTRODUCTION... 3 3. AUDIT FINDINGS- BUSINESS PROCESS CONTROLS... 5 4. AUDIT
CICS Transactions Measurement with no Pain
CICS Transactions Measurement with no Pain Prepared by Luiz Eduardo Gazola 4bears - Optimize Software, Brazil December 6 10, 2010 Orlando, Florida USA This paper presents a new approach for measuring CICS
EDITIONS COMPARISON ICEFLO Editions & Pricing. Date November 2015 Version. v1d2
EDITIONS COMPARISON ICEFLO s & Pricing Date November 2015 Version v1d2 Introduction ICEFLO provides your deployment community with one central place to manage all deployment-related activities. That means
Information Governance Strategy & Policy
Information Governance Strategy & Policy March 2014 CONTENT Page 1 Introduction 1 2 Strategic Aims 1 3 Policy 2 4 Responsibilities 3 5 Information Governance Reporting Structure 4 6 Managing Information
CA Top Secret r15 for z/os
PRODUCT SHEET: CA TOP SECRET FOR z/os we can CA Top Secret r15 for z/os CA Top Secret for z/os (CA Top Secret ) provides innovative, comprehensive security for your business transaction environments, including
SESSION 8 COMPUTER ASSISTED AUDIT TECHNIQUE
SESSION 8 COMPUTER ASSISTED AUDIT TECHNIQUE Learning objective: explain the use of computer assisted audit techniques in the context of an audit discuss and provide relevant examples of the use of test
Windows Logging Configuration: Audit Policy Configuration
Windows Logging Configuration: Audit Policy Configuration Windows Auditing Windows audit policy requires computer level and in some cases object level configuration. At the computer level, Windows has
WORKPLACE HEALTH AND SAFETY AUDITING GUIDELINES
WHS UNIT WORKPLACE HEALTH AND SAFETY AUDITING GUIDELINES Contents 1 Purpose... 1 2 Scope... 1 3 Definitions... 1 4 Responsibilities... 1 4.1 WHS Unit... 1 4.2 Auditor(s)... 1 4.3 Managers of Faculties
Using Assurance Models in IT Audit Engagements
Using Assurance Models in IT Audit Engagements Adrian Baldwin, Yolanta Beres, Simon Shiu Trusted Systems Laboratory HP Laboratories Bristol HPL-2006-148R1 January 29, 2008* audit, assurance, compliance,
Maturity Model. March 2006. Version 1.0. P2MM Version 1.0 The OGC logo is a Registered Trade Mark of the Office of Government Commerce
Maturity Model March 2006 Version 1.0 P2MM Version 1.0 The OGC logo is a Registered Trade Mark of the Office of Government Commerce This is a Value Added product which is outside the scope of the HMSO
Change Management: Automating the Audit Process
Change Management: Automating the Audit Process Auditing Change Management for Regulatory Compliance Abstract Change management can be one of the largest and most difficult tasks for a business to implement,
DOCUMATION S PURCHASE TO PAY (P2P) SUITE
Documation is a leading provider of document-centric workflow and content management software, delivering services and solutions to businesses and organisations in the UK, Europe and around the world.
Using PowerBroker Identity Services to Comply with the PCI DSS Security Standard
White Paper Using PowerBroker Identity Services to Comply with the PCI DSS Security Standard Abstract This document describes how PowerBroker Identity Services Enterprise and Microsoft Active Directory
Citrix XenApp 6.5 Administration
Presentation Style: Duration: Tutor-led Classroom 5 Days Course Start Time: 09:30hrs Course End Time: 16:30hrs Citrix XenApp 6.5 Basic Administration training course provides the foundation necessary for
AMP Capital Investors Limited ABN 59 001 777 591 AFSL 232497. AMP Capital Derivatives Risk Statement
AMP Capital Investors Limited ABN 59 001 777 591 AFSL 232497 AMP Capital Derivatives Risk Statement April 2015 Table of Contents 1. Responsible party... 3 2. Objective of the DRS... 3 3. Definition of
Security zsecure Admin and Audit for RACF Version 1.13.1. Getting Started GI13-2309-00
Security zsecure Admin and Audit for RACF Version 1.13.1 Getting Started GI13-2309-00 Security zsecure Admin and Audit for RACF Version 1.13.1 Getting Started GI13-2309-00 Note Note Before using this
Enforcive /Cross-Platform Audit
Enforcive /Cross-Platform Audit Enterprise-Wide Log Manager and Database Activity Monitor Real-time Monitoring Alert Center Before & After Change Image Custom Reports Enforcive's Cross-Platform Audit (CPA)
CA View r11.7. Business value. Product overview. Delivery approach
DATA SHEET CA View r11.7 CA View is an automated archival and retrieval system that provides immediate and flexible online viewing of mainframe and distributed output. Its repository is capable of housing
Information Systems Access Policy
Information Systems Access Policy I. PURPOSE The purpose of this policy is to maintain an adequate level of security to protect data and information systems from unauthorized access. This
CA Mainframe Security Management solutions helps you reduce costs, facilitate new business opportunities, address regulatory compliance requirements,
SOLUTION BRIEF CA Mainframe Security Management Solutions September 2010 how can mainframe security management solutions from CA Technologies help me simplify and unify security? we can CA Mainframe Security
Glasgow Life Performance Management. Final Report
Glasgow Life Performance Management Final Report INTERNAL AUDIT October 2013 Glasgow City Council Internal Audit 1 GLASGOW LIFE Performance Management Table of Contents Section No Section Title 1 Introduction
GCP INSPECTORS WORKING GROUP <DRAFT> REFLECTION PAPER ON EXPECTATIONS FOR ELECTRONIC SOURCE DOCUMENTS USED IN CLINICAL TRIALS
European Medicines Agency London, 17 October 2007 Doc. Ref. EMEA/505620/2007 GCP INSPECTORS WORKING GROUP REFLECTION PAPER ON EXPECTATIONS FOR ELECTRONIC SOURCE DOCUMENTS USED IN CLINICAL TRIALS
The principles of PRINCE2
The principles of PRINCE2 The project management framework known as PRINCE2 is based upon a set of principles. These principles are the bedrock and foundations upon which everything else in the framework
Quick Reference Guide
Quick Reference Guide TERMINOLOGY 2 ICONS 3 SCREENS 4 SETTINGS 4 EMPLOYEE TIMELINE 4 CLIENT / PLACE TIMELINE 4 AVAILABILITY 4 SCHEDULING CENTRE 4 FEW CLICK SCHEDULING 4 MANAGE LEAVE 5 CLIENTS / PLACES
Introduction to Computer Security
Introduction to Computer Security Windows Security Pavel Laskov Wilhelm Schickard Institute for Computer Science Microsoft Windows Family Tree Key security milestones: NT 3.51 (1993): network drivers and
CA TPX Session Management r5.3
PRODUCT SHEET CA TPX Session Management CA TPX Session Management r5.3 CA TPX Session Management (CA TPX) helps you manage user menus for accessing VTAM applications on the mainframe while offering end
Software Validation in Clinical Trial Reporting: Experiences from the Biostatistical & Data Sciences Department
Software Validation in Clinical Trial Reporting: Experiences from the Biostatistical & Data Sciences Department Andrea Baker Senior Programmer GlaxoSmithKline SeUGI 19 Florence May 29-June 1 2001 Introduction
000-574. IBM Tivoli WebSphere App Studio V3.2. Version: Demo. Page <<1/9>>
000-574 IBM Tivoli WebSphere App Studio V3.2 Version: Demo Page 1.Which change is made by the WebSphere Studio Application Monitoring V3.2 distributed Data Collector installer (both GUI and silent)?
21 Things You Didn t Used to Know About RACF
21 Things You Didn t Used to Know About RACF (A Technical Update for IT Auditors) Stuart Henderson The Henderson Group (301) 229-7187 1 Here Are 21 Things Auditors Should Know About RACF One Person s Opinion,
CSE543 - Introduction to Computer and Network Security. Module: Reference Monitor
CSE543 - Introduction to Computer and Network Security Module: Reference Monitor Professor Trent Jaeger 1 Living with Vulnerabilities So, software is potentially vulnerable In a variety of ways So, how
ALMA Helpdesk Administrator Guide. Version 1.0. March 2 nd, 2011
ALMA Helpdesk Administrator Guide Version 1.0 March 2 nd, 2011 1 P age Table of Contents Introduction... 3 Staff User Interface:... 3 Admin User Interface:... 3 Software Model... 4 Routine maintenance...
Shared service centres
Report by the Comptroller and Auditor General Cabinet Office Shared service centres HC 16 SESSION 2016-17 20 MAY 2016 4 Key facts Shared service centres Key facts 90m estimated savings made to date by
Achieving PCI COMPLIANCE with the 2020 Audit & Control Suite. www.lepide.com/2020-suite/
Achieving PCI COMPLIANCE with the 2020 Audit & Control Suite 7. Restrict access to cardholder data by business need to know PCI Article (PCI DSS 3) Report Mapping How we help 7.1 Limit access to system
Informatics Policy. Information Governance. Network Account and Password Management Policy
Informatics Policy Information Governance Policy Ref: 3589 Document Title Author/Contact Document Reference 3589 Document Control Network Account Management and Password Policy Pauline Nordoff-Tate, Information
Adabas Archiving. Mike Conena, Database Administrator Commonwealth of Massachusetts
Adabas Archiving Mike Conena, Database Administrator Commonwealth of Massachusetts What is it? A tool to archive Data from Adabas Files What are the benefits? Minimizes only necessary data on primary databases
stepping stones to accrual accounting The transition from cash to accrual accounting for public financial management for public financial management
stepping stones to accrual accounting The transition from cash to accrual accounting for public financial management for public financial management for public financial management CIPFA, the Chartered
Position Classification Standard for Management and Program Clerical and Assistance Series, GS-0344
Position Classification Standard for Management and Program Clerical and Assistance Series, GS-0344 Table of Contents SERIES DEFINITION... 2 EXCLUSIONS... 2 OCCUPATIONAL INFORMATION... 3 TITLES... 6 EVALUATING
The Comprehensive Guide to PCI Security Standards Compliance
The Comprehensive Guide to PCI Security Standards Compliance Achieving PCI DSS compliance is a process. There are many systems and countless moving parts that all need to come together to keep user payment
CODE OF PRACTICE ON THE MANAGEMENT OF POLICE INFORMATION
CODE OF PRACTICE ON THE MANAGEMENT OF POLICE INFORMATION Made by the Secretary of State for the Home Department under sections 39 and 39A of the Police Act 1996 and sections 28, 28A, 73 and 73A of the
DETAILED BOOT CAMP AGENDA
DETAILED BOOT CAMP AGENDA Intro to Dynamics CRM 2016: Sales, Marketing, and Service OVERVIEW CRM CONCEPTS AND BASICS CRM Purpose Introduction to Sales Introduction to Marketing Introduction to Service
1 of 8 - Forget Free Willy, how about free RACF!
WWW.RACF.NET.AU presents: Forget Free Willy, how about free RACF! a white-paper created by For more information, contact us at [email protected] or call 0412 488 484 Copyright 2007 A review of the various
IBM Tivoli Compliance Insight Manager
Facilitate security audits and monitor privileged users through a robust security compliance dashboard IBM Highlights Efficiently collect, store, investigate and retrieve logs through automated log management
General IT Controls Audit Program
Contributed February 5, 2002 by Paul P Shotter General IT Controls Audit Program Purpose / Scope Perform a General Controls review of Information Technology (IT). The reviews
Toronto Maintenance Management System Application Review. the exercise to harmonize business practices is completed;
STAFF REPORT March 30, 2004 To: From: Subject: Audit Committee Auditor General Toronto Maintenance Management System Application Review Purpose: The purpose of this audit was to assess how well the Toronto
CorreLog Alignment to PCI Security Standards Compliance
CorreLog Alignment to PCI Security Standards Compliance Achieving PCI DSS compliance is a process. There are many systems and countless moving parts that all need to come together to keep user payment
WHITE PAPER. From Building Information Management to Facilities Management
October 2011 WHITE PAPER. Management to Facilities Management A look at the benefits to be found by fostering the links between Building Information Modelling (used by the construction industry) and Computer
DeviceLock Management via Group Policy
User Manual DeviceLock Management via Group Policy SmartLine Inc 1 Contents Using this Manual...3 1. General Information...4 1.1 Overview...4 1.2 Applying Group Policy...5 1.3 Standard GPO Inheritance
CA OPS /MVS Event Management and Automation
CA OPS /MVS Event Management and Automation Security Guide Release 12.1 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the
Group Mail Lists. Group Mailing Lists. Populating a Global Mail Lists 4. The Problem 6. The Solution 8. Scheduling Regular Updates 17
Group Mail Lists Group Mail Lists 1 Group Mailing Lists 1.1 1.2 1.3 1.4 Populating a Global Mail Lists 4 The Problem 6 The Solution 8 Scheduling Regular Updates 17 Group Mailing Lists Group Mail Lists
Editions Comparison ICEFLO Editions & Pricing
ICEFLO s & Pricing ICEFLO provides your implementation community with one central place to manage all implementation-related activities. That means they ll spend less time shuffling spreadsheets and more
ACDM GUIDELINES TO FACILITATE PRODUCTION OF A DATA HANDLING PROTOCOL
ACDM GUIDELINES TO FACILITATE PRODUCTION OF A DATA HANDLING PROTOCOL BACKGROUND The need was identified by the Electronic Data Transfer Special Interest Group (SIG) for each company or organisation to
Payroll Direct Deposit
2011-A03 Program Evaluation and Audit Payroll Direct Deposit Process Review and Cost-Benefit 17 December 2010 INTRODUCTION Background The Council operates under a biweekly pay period system. The Metropolitan
CA MICS Resource Management r12.7
PRODUCT SHEET agility made possible CA MICS Resource Management r12.7 CA MICS Resource Management (CA MICS) is a comprehensive IT resource utilization management system designed to fulfill the information
CA VM:Operator r3. Product Overview. Business Value. Delivery Approach
PRODUCT SHEET: CA VM:OPERATOR CA VM:Operator r3 CA VM:Operator is an automated console message management system for z/vm and mainframe Linux environments. It allows you to minimize human intervention
Internal Control Guide & Resources
Internal Control Guide & Resources Section 5- Internal Control Activities & Best Practices Managers must establish internal control activities that support the five internal control components discussed
Coveo Platform 7.0. Microsoft Dynamics CRM Connector Guide
Coveo Platform 7.0 Microsoft Dynamics CRM Connector Guide Notice The content in this document represents the current view of Coveo as of the date of publication. Because Coveo continually responds to changing
Cloud Security checklist Are you really ready for Cloud
checklist Are you really ready for Cloud Introduction Once you have assessed the benefits of migrating a business system or its function to the Cloud (See our White Book of Cloud Adoption), the next step
Project Governance A N T I C I P A T I N G A N A U D I T
Project Governance A N T I C I P A T I N G A N A U D I T Public sector Project Management characteristics Multi-million rand projects Often National interest projects Subject to intense scrutiny Uncertainty
CA OPS /MVS Event Management and Automation
CA OPS /MVS Event Management and Automation Security Guide Release 12.0 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the
SAS 9.4 Logging. Configuration and Programming Reference Second Edition. SAS Documentation
SAS 9.4 Logging Configuration and Programming Reference Second Edition SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2014. SAS 9.4 Logging: Configuration
DeviceLock Management via Group Policy
User Manual DeviceLock Management via Group Policy SmartLine Inc 1 Contents Using this Manual...3 1. General Information...4 1.1 Overview...4 1.2 Applying Group Policy...5 2. DeviceLock Service Deployment...6
AD Management Survey: Reveals Security as Key Challenge
Contents How This Paper Is Organized... 1 Survey Respondent Demographics... 2 AD Management Survey: Reveals Security as Key Challenge White Paper August 2009 Survey Results and Observations... 3 Active
TRANSPORT CANADA MARINE SAFETY PLEASURE CRAFT OPERATOR COMPETENCY PROGRAM QUALITY MANAGEMENT SYSTEM FOR ACCREDITATION
TRANSPORT CANADA MARINE SAFETY PLEASURE CRAFT OPERATOR COMPETENCY PROGRAM FOR ACCREDITATION OF COURSE PROVIDERS PROJECT TRANSITION AND IMPLEMENTATION PLEASURE CRAFT OPERATOR COMPETENCY PROGRAM QUALITY
Document Control. White Paper By Galaxy Consulting. At Your Service Today Tomorrow We Appreciate The Privilege Of Serving You! Abstract.
Document Control April White Paper By Galaxy Consulting A At Your Service Today Tomorrow We Appreciate The Privilege Of Serving You! Abstract December 2015 The primary purpose of document control is to
Steve Cotterell examines this highly configurable, enterprise-level PPM solution, concentrating mainly on its most recently added features.
SmartCore Steve Cotterell examines this highly configurable, enterprise-level PPM solution, concentrating mainly on its most recently added features. On their company Web site, Ninth Wave describes SmartCore
CA FAQS Production Control System for z/vse r5.0
PRODUCT BRIEF: CA FAQS PRODUCTION CONTROL SYSTEM FOR Z/VSE CA FAQS Production Control System for z/vse r5.0 CA FAQS PRODUCTION CONTROL SYSTEM FOR Z/VSE IS A BUSINESS PROCESS EVENT-DRIVEN SCHEDULER THAT
Parallels Plesk Control Panel. Plesk 8.3 for Windows Advanced Administration Guide. Revision 1.0
Parallels Plesk Control Panel Plesk 8.3 for Windows Advanced Administration Guide Revision 1.0 Contents Preface 5 Documentation Conventions... 5 Typographical Conventions... 5 Feedback... 6 About This
Windows Security. CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger. www.cse.psu.edu/~tjaeger/cse497b-s07/
Windows Security CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse497b-s07/ Windows Security 0 to full speed No protection system in early versions
Hospital pharmacy technician role / service definition grid
Hospital pharmacy technician role / service definition grid To be a competent hospital pharmacy technician, you must be able to complete the required task to the defined standard and to do this on every
Change Management Procedures Re: The Peoplesoft Application at Mona
Change Management Procedures Re: The Peoplesoft Application at Mona (The original Peoplesoft document was modified to relate more closely to UWI Mona) See also.. MITS Project Management Methodology & MITS
CSP & PCI DSS Compliance on HP NonStop systems
CSP & PCI DSS Compliance on HP NonStop systems July 23, 2014 For more information about Computer Security Products Inc., contact us at: 200 Matheson Blvd. West Suite 200 Mississauga, Ontario, Canada L5R
Business Insight Report Authoring Getting Started Guide
Business Insight Report Authoring Getting Started Guide Version: 6.6 Written by: Product Documentation, R&D Date: February 2011 ImageNow and CaptureNow are registered trademarks of Perceptive Software,
Information Security Policies. Version 6.1
Information Security Policies Version 6.1 Information Security Policies Contents: 1. Information Security page 3 2. Business Continuity page 5 3. Compliance page 6 4. Outsourcing and Third Party Access
Best Practices, Procedures and Methods for Access Control Management. Michael Haythorn
Best Practices, Procedures and Methods for Access Control Management Michael Haythorn July 13, 2013 Table of Contents Abstract... 2 What is Access?... 3 Access Control... 3 Identification... 3 Authentication...
MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE
WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But it s
Document Control Procedure
ABN 5810 5001 465 ADMIN 3.3 Document Control Procedure Version 4 K.B. Taylor CEO RISSB 27 August 2012 ADMIN 3.3 Document Control Procedure Version 4 August 2012 DOCUMENT CONTROL Identification Document
JOB DESCRIPTION. T&T Security and Resilience Manager. Technology and Telecommunications. Bedford, Chelmsford or Norwich
JOB DESCRIPTION PART A: JOB DETAILS JOB TITLE: AFC BAND: T&T Security and Resilience Manager 8a HOURS: 37.5 DIRECTORATE: DEPARTMENT: REPORTING TO: BASE: IM&T Technology and Telecommunications Head of T&T
1 (a) Audit strategy document Section of document Purpose Example from B-Star
Answers Fundamentals Level Skills Module, Paper F8 (IRL) Audit and Assurance (Irish) June 2009 Answers 1 (a) Audit strategy document Section of document Purpose Example from B-Star Understanding the entity
