z/OS Security Server RACF Security Administrator's Guide
Previous topic | Next topic | Contents | Contact z/OS | Library | PDF


Ensuring management commitment

z/OS Security Server RACF Security Administrator's Guide
SA23-2289-00

Management's decision to install RACF® is not, by itself, enough to ensure adequate security at your location. Indeed, if management were to ignore security concerns after simply selecting any software protection package, the eventual result would most likely be the failure of the security undertaking.

To be successful, a security implementation requires a management that is involved with questions of security policy and procedures, the resources to be allocated to the security function, and the accountability of users of the computer system. Without such management support, the security procedures will fall into disuse and become more of an administrative chore than a viable protection scheme. (In fact, such a situation could breed a false sense of security that could lead to serious exposures.)

You should work with management to prepare a clear, inclusive statement of security policy. This statement should reflect:
  • Corporate security policy
  • Physical protection considerations
  • Installation data processing security requirements
  • User department security requirements
  • Auditing requirements
  • A statement of policy concerning outside users of the system
  • The security attitudes that will be expected from all users of the system

The resultant security policy helps to ensure that a security implementation team can prepare a RACF implementation plan that is both realistic and consistent with the installation's security policy.

Go to the previous page Go to the next page




Copyright IBM Corporation 1990, 2014