Select Page

SF-SecuClean
RACF database cleanup for z/OS

SF-SecuClean, your ultimate RACF cleanup and initial role model creator. Clean up your RACF database without any risk, and set up an initial role model efficiently!

Clean up the RACF database and obtain an initial role model.

An elementary fact regarding security becomes very apparent whenever you react to the results of a z/OS penetration test or audit, as well as during the initial setup of a role model: it is particularly difficult to eliminate excessive or redundant authorizations in RACF, i.e. to streamline access lists, lower the universal access authority (UACC) or even delete profiles. Cleaning up the RACF database and the subsequent “tightening” of your existing security configuration is simply one of the most “feared” consequences of any audit report or role-modeling project.

What are the practical problems involved when cleaning up the RACF database? To retroactively improve a system’s security, i.e. to question existing authorizations by removing, reorganizing or reducing these, always involves the real risk of negatively influencing productive processes and provoking subtle failures. Actually, a golden rule in IT is to “never change a running system!” Nobody knows which users access which resources and would eventually sign a corresponding statement as definitive. Management is therefore constantly challenged to provide their security team with the necessary motivation for such a cleanup project while taking into account its primarily abstract values of security and compliance. At first glance, it seems as if everyone involved “has nothing to gain.” But this is no longer true – there is good news!

The right technology and support make it easy to clean up RACF – and also worthwhile from a practical point of view. Deleted profiles, streamlined access lists, compact groups – all these avoid overhead in RACF’s processing and thus save CPU time concerning each resource access check – several millions of which occur daily.

Setting up an initial role model creates challenges quite similar to those of an RACF cleanup. The first step is to define the current status quo of the required authorizations for all users. You must determine which resources each user must access regarding his or her “role(s)” in the company’s business. A complete and comprehensive assessment in this field is a prerequisite for the second step, which includes the development of a role model based on effectively required, i.e. non-excessive authorizations.

Both challenges – cleaning up RACF and setting up an initial role model – provoke a common technological desire to perform a long-term observation of all resource access requests. SF-SecuClean provides you with this efficient long-term monitoring for RACF environments. Its high performance and cost-effective technology allows you to easily 1) clean up and streamline the security configurations defined by the RACF database (e.g. streamlining access lists, lowering UACCs, removing global access authorizations, deleting profiles, etc.), and 2) perform the necessary assessment of the currently required access authorities to set up an initial role model.

SF-SecuClean’s technology extends the standard RACF environment with the required resource access monitoring without influencing RACF’s actual decisions. All resource access requests are registered in a database (DB2) that is available for online evaluation and reporting at any time. A precise knowledge base is created over time regarding which users (must) access which resources on which access levels for their daily work. The longer the observation period, the greater the informative value of this monitoring becomes. In the end, i.e. after a sufficient length of time, clarity arises regarding each user’s actually required authorizations, which then allows you to reconfigure and optimize the RACF database with minimum risk. Of course, SF-SecuClean’s unique monitoring capabilities also support daily work in your RACF administration, security monitoring, system programming and IT audit departments. Information regarding (real) occurring access requests can be obtained online at any time by following a simple procedure.

SF-SecuClean is, therefore, the ideal solution for all mainframe users across all business sectors or company sizes. It is also the “perfect match” for all pragmatic z/OS users who dismiss any “monitoring and compliance overkill” and just desire a state-of-the-art cleanup and high-performance configuration of their RACF security without investing a lot in CPU time and other costs. Check it out!

Automate your IT Security and Compliance to the max today!

Compliance

Over the past several years, compliance has become more and more an important issue, but also a tedious task. Our SF solutions assist you in automating the resulting workload to the max by also covering the entire mainframe platform - thanks to a 360-degree approach.

Protection

With SF-Sherlock, you can also protect your mainframe platform against attacks and combat high-level risks. Thanks to our max approach this also includes malicious code and exploits. Yes, both of these are real risks on the mainframe platform!

SF Solutions

All SF solutions are invented and developed in-house. Therefore, you can count on both our unique expertise and our high level of motivation in providing you with solutions and services with maximum performance, effectiveness, and productivity.

Are you expecting a governmental audit of your mainframe platform soon, as
by the BaFin, ECB, or one of
the “Big Four”?

Let us help you prepare your mainframe security and compliance.

+800 - 37 333 853 or simply dial: +800 - DRFEDTKE

Call our world-wide toll-free number now!

(+ represents the prefix for international calls; in most countries it is 00, and you have to dial 00800-37333853; in the U.S. it corresponds to 011)

News & IT Security Forum

“Forensic Swiss Knife for z/OS” – become DORA- and FINMA-ready

DORA and FINMA sustainably increase the demands on IT security and resilience. One aspect of the proactive regulations concerns the more negative situations and aspects of an incident and how to deal with them, known as incident management. Such an incident necessitates a short-term, in-depth forensic analysis. The results of this analysis must be profound. Why? Since the decision on the restore point may be based on them. And don’t forget the stress level in such a situation. In the case of the mainframe, the logs and events kept online in the SIEM are often not 100% and potentially insufficient for the required deep-level analysis. Why? Because the total volume of data would often be too large for a truly complete SIEM delivery. What consequences does this have for DORA-related incident management? Your IT must always be able to provide the forensics team with the complete inventory of forensic data at short notice for selective periods of time, in an environment that is familiar to them and therefore performs well in terms of analysis. This is usually the SIEM, such as Splunk, ArcSight or QRadar, and not the TSO ISPF environment.

To support your mainframe environment with regard to this DORA aspect, SF-Sherlock’s PTF Level 095 also includes a “Forensic Swiss Knife for z/OS.” This allows you to prepare for this situation in accordance with DORA and FINMA. It works ON REQUEST to provide the SIEM with 100% of the necessary forensic data for a selected date and time range. It’s desgined to work even if top specialists are unavailable. The only step you need to take is to create the corresponding documentation in the operating manual. Such incident-related SIEM 100% filling should also always be part of the emergency drills required by DORA and FINMA.

Join our newsletter list

Worldwide toll-free phone number

+800 - 37 333 853
or simply dial:
+800 - DRFEDTKE

Alternatively:
+41 (0)41 710 7444

(+ represents the prefix for international calls; in most countries it is 00, and you have to dial 00800-37333853; in the U.S. it corresponds to 011, and you have to dial 011-800-37333853)

Find Us

Headquarters

Seestrasse 3a, 6300 Zug, Switzerland

Visitors & Training

Dammstrasse 19, 6301 Zug, Switzerland

Social Media

Xing → Linkedin →

Write Us

Marketing
marketing@enterprise-it-security.com
copy the address

Technical support and hotline
hotline@enterprise-it-security.com
copy the address

Legal and compliance
legal@enterprise-it-security.com
copy the address