Capturing security discovery data (SDD)
6.2 and later Applies to 6.2 and later.
Security discovery records security access requests within CICS®, contained in what's called the security discovery data (SDD). SDD is specific to CICS and records in SDD include access requests that were performed as a result of the existing security settings. They can also be access requests that would have been performed if the security settings were changed to allow it. With SDD, you can identify what security definitions would be required if the current CICS resource security were extended to include another resource classes.
For a list of data that is captured by security discovery, see Data captured by CICS security discovery.
For an overview of the whole security discovery process, see How it works: CICS security discovery. This task is Step 2 in that flow.
Before you begin
You must have configured your CICS regions for security discovery. For instructions, see Setting up CICS security discovery.
The security discovery state persists over a warm or an emergency restart. On a cold or an initial start of CICS, security discovery is inactive.
In case of a cold or an initial start, you need to manually reissue the SET SECDISCOVERY commands or add them to a program that runs as part of PLT to turn it on. See Activating CICS security discovery during CICS startup.
About this task
CICS always records transaction attach requests when security discovery is active. Such requests are protected by the XTRAN system initialization parameter. You need to decide what additional access requests are recorded based on business requirements to protect the associated resources.
Security discovery data (SDD) is never reset while CICS is running. When the data is written to the DFHSECD log stream, it is the complete set of data since security discovery was first activated in the region.
Procedure
Results
You have successfully captured the SDD. You can then use the .sdd file as input for the security discovery analysis in CICS Explorer.
CICS security discovery statistics were also written to DFHSECD. The statistics were formatted by DFH$SDDP and the output was written to the STATS destination. The statistics can be used to estimate the cost of activating additional resource security within CICS.
Example
The following snippet shows an example of SUMMARY output:
Writing trace output to DFHTRACE.
Selecting APPLID=CICSAPP*
Selecting STARTTIME=20230310112500
Selecting ENDTIME=20230320115500
*****************
* Record counts *
*****************
SDD records read.......................: 12
SDD records selected...................: 10
SDD records rejected...................: 0
Userids processed......................: 5
Transactions processed.................: 2
*********************
* Security Settings *
*********************
SECPRFX = PROD
XCMD = CICSCMD
XDB2 = CICSDB2
XDCT = CICSDCT
XFCT = CICSFCT
XHFS = YES
XJCT = CICSJCT
XPCT = CICSPCT
XPPT = CICSPPT
XPSB = CICSPSB
XRES = CICSRES
XTRAN = CICSTRN
XTST = CICSTST
XUSER = SURROGAT
The first section confirms the parameters that are in effect.
- SDD records read
- Shows the total number of records read from the DFHSECD log stream.
- SDD records selected
- Shows the number of records that met the selection criteria based on the input parameters.
- SDD records rejected
- Shows the number of records rejected due to having different security settings.
- Userids processed
- Shows the number of unique user IDs found within the processed records.
- Transactions processed
- Shows the number of unique transaction IDs found within the processed records.
The Security Settings section lists the SECPRFX and the RACF® class names for each system initialization parameter. These values come from the first record processed. All subsequent records must match these settings.