IBM Information Management System (IMS)

IBM Information Management System (IMS)

IBM Information Management System (IMS)

The secure, integrated application platform & database management system designed for high-performance online transaction & data processing that offers a reliable & flexible platform to host & extend the functionalities of business critical applications.

 View Only

New 2025 course: Implementing IMS Security

By Michelle Carey posted yesterday

  

Keeping the valuables safe

Did you know that IBM® Information Management System (IMS™) isn’t just a legacy system sitting quietly in a data center? It’s the unsung hero behind the scenes, powering large enterprises in industries such as banking, insurance, airlines, and retail—none of which can afford a security breach.

Those companies need maximum security to keep assets, code, and processes safe.

The good news is that you can take advantage of many IMS facilities to protect those assets.

If you’re a database system programmer, database administrator, or responsible for securing IMS assets and resources, this course is your blueprint for implementing IMS security.

You’ll walk through identifying the resources that can be protected, such as user IDs, transactions, commands, data sets, and databases. Then, you’ll learn what facilities you can use to protect those items, such as what is covered with the default security, security facilities, exits, encryption, and RACF.

Device and padlock

Learning objectives

After completing this course, you should know how to:

  • Identify the IMS resources that must be protected
  • Identify the types of security facilities available for each resource
  • Develop a plan to implement security on your IMS systems
  • Identify the tasks required in IMS and RACF to implement security
  • Implement security for each resource using an appropriate security facility
  • Code the security definitions in IMS and RACF to protect transactions, commands, data, dependent regions, Program Specification Blocks (PSB), terminals and other resources

Prerequisites

Before taking this course, you should have working knowledge and experience with IMS administration and Resource Access Control Facility (RACF).

Course outline 

Unit 1: Introduction to IMS Security 

Unit 2: IMS Security Facilities 

Unit 3: IMS Security Options 

Unit 4: IMS Exits 

Quiz 1

Unit 5: Commands Used for Changing Security 

Unit 6: Log Records

Unit 7: SAF and RACF 

Unit 8: User ID and Sign-on Verification 

Unit 9: Securing the Control Region 

Quiz 2

Unit 10: Common Service Layer Security

Unit 11: IMS Connect and OTMA 

Unit 12: Transaction Security 

Unit 13: Command Security 

Unit 14: Security for Time Controlled Operations

Quiz 3

Unit 15: IMS Resource Access Security (RAS) 

Unit 16: IMS Database Security 

Unit 17: IMS Data Set Security 

Unit 18: Securing a DBCTL Environment 

Unit 19: IMS and Db2 Security

Quiz 4

Final exam

So even if you’ve implemented many IMS security protections across your enterprise, be sure that you didn’t miss anything that can still be better protected by completing this course and getting that digital badge.

If you successfully complete the course, you'll get a digital badge!

You'll need an IBM account to enroll in the course and a Credly account to accept the badge.

Start the Implementing IMS Security course on IBM Training today!

Check out IMS Central for more IMS courses and videos.

A qr code on a white background

Description automatically generated

0 comments
2 views

Permalink