Privileged-user-policy monitoring and enforcement protects data
Prevent noncompliant administrative commands from privileged users that can change or delete all profiles within their scope. Automatically verify command keywords against your specified policies as soon as a command is issued to help prevent user errors, regardless of whether the command is initiated from a batch job, or the operator console.
Retrieves command information quickly
zSecure Command Verifier stores changes to profiles in the RACF database, so you can easily discover when a change to a profile was made and which administrator issued a command. Retrieves information on changes in seconds, saving hours of labor.
Defines and determines different types of IT risk assessments
Specify policies using RACF profiles to determine the type of verification to be performed and to define actions when a noncompliant command is detected, including prevention of command execution. Generate immediate, near real-time alerts if certain commands are issued, helping to prevent system outages caused when administrators issue incorrect commands. Send messages when commands are changed. Grant user access to specific commands.
Note that your entitlement to support, if any, is dependent upon your license and/or maintenance agreements for zSecure Command Verifier.
CA ACF2 and CA Top Secret
IBM Integrated Cryptographic Service Facility (ICSF)
Payment Card Industry-Data Security Standard (PCI-DSS)
Defense Information Systems Agency Security Technical Implementation Guides (DISA STIGs)
Requirements: A supported IBM z Systems server that is capable of supporting z/OS V2.1, or later.
IBM z/OS V1R12
IBM z/OS V1R13
IBM z/OS V2R1
A supported IBM z Systems server that is capable of supporting z/OS V2.1, or later.
Processor: Z800 (minimum); IBM System z9 or z10 Enterprise Class (EC) (recommended)
Disk space: 300 MB (minimum); 450 MB (recommended)