Who knows more about protecting Z than Z people?
Who knows more about protecting Z than Z people? Join your Z Security Community now!
Feature spotlights
Policy monitoring enforcement protects data
Prevent noncompliant administrative commands from privileged users that can change or delete all profiles within their scope. Automatically verify command keywords against your specified policies as soon as a IBM® Resource Access Control Facility (RACF®) command is issued to help prevent user errors, regardless of whether the command is initiated from Time Sharing Option (TSO), Interactive System Productivity Facility (ISPF), a batch job or the operator console.
Retrieves command information quickly
zSecure™ Command Audit Trail stores changes to profiles in the RACF database, so you can easily discover when a change to a profile was made and which administrator issued a particular command. Retrieves information on changes in seconds, saving hours of labor.
Defines and determines different types of verification
Specify policies using RACF profiles to determine the type of verification to be performed and to define actions when a noncompliant command is detected, including prevention of command execution. Generate immediate, near real-time alerts if certain RACF commands are issued, helping to prevent system outages caused when administrators issue incorrect RACF commands. Send messages when commands are changed. Grant users access to specific commands who would not normally have authorization.
Works independently of other solutions in the zSecure suite
Installs as part of the RACF Common Command Exit, a standard RACF application programming interface (API). Eliminates the need to design, code and maintain assembler routines that create time demands. Serves as an important add-on to other third-party RACF tools that lack this vital functionality.
Integrates with common IBM platforms
zSecure™ Command Verifier, part of zSecure Compliance and Administration is accessible with IBM Security QRadar® SIEM, IBM Security Guardium®, RACF and IBM MFA solutions.
Scalable for big data systems
V2.2.1 allows storage above the 2 GB boundary ("the bar") to enable processing of more data. Note that the ability to use more virtual memory can have implications for paging and real storage needs. This also frees up storage below the bar for other programs. With models z196 or higher, 64-bit addressing is activated automatically, though reverting back to 31-bit addressing is optional. You can select the program to run using the SE.0 (SETUP RUN) option.
Technical details
Technical specifications
Note that your entitlement to support, if any, is dependent upon your license and/or maintenance agreements for zSecure Command Verifier.
- CA ACF2 and CA Top Secret
- IBM MQ
- IBM Integrated Cryptographic Service Facility (ICSF)
- Windows server
- Payment Card Industry-Data Security Standard (PCI-DSS)
- Defense Information Systems Agency Security Technical Implementation Guides (DISA STIGs)
Software requirements
Requirements: A supported IBM z Systems server that is capable of supporting z/OS V2.1, or later.
- IBM z/OS V1R12
- IBM z/OS V1R13
- IBM z/OS V2R1
Hardware requirements
A supported IBM z Systems server that is capable of supporting z/OS V2.1, or later.
- Processor: Z800 (minimum); IBM System z9 or z10 Enterprise Class (EC) (recommended)
- Disk space: 300 MB (minimum); 450 MB (recommended)
- Memory: 1 GB (minimum); 2 GB (recommended)