Keeping the valuables safe
Did you know that IBM® Information Management System (IMS™) isn’t just a legacy system sitting quietly in a data center? It’s the unsung hero behind the scenes, powering large enterprises in industries such as banking, insurance, airlines, and retail—none of which can afford a security breach.
Those companies need maximum security to keep assets, code, and processes safe.
The good news is that you can take advantage of many IMS facilities to protect those assets.
If you’re a database system programmer, database administrator, or responsible for securing IMS assets and resources, this course is your blueprint for implementing IMS security.
You’ll walk through identifying the resources that can be protected, such as user IDs, transactions, commands, data sets, and databases. Then, you’ll learn what facilities you can use to protect those items, such as what is covered with the default security, security facilities, exits, encryption, and RACF.

Learning objectives
After completing this course, you should know how to:
- Identify the IMS resources that must be protected
- Identify the types of security facilities available for each resource
- Develop a plan to implement security on your IMS systems
- Identify the tasks required in IMS and RACF to implement security
- Implement security for each resource using an appropriate security facility
- Code the security definitions in IMS and RACF to protect transactions, commands, data, dependent regions, Program Specification Blocks (PSB), terminals and other resources
Prerequisites
Before taking this course, you should have working knowledge and experience with IMS administration and Resource Access Control Facility (RACF).
Course outline
Unit 1: Introduction to IMS Security
Unit 2: IMS Security Facilities
Unit 3: IMS Security Options
Unit 4: IMS Exits
Quiz 1
Unit 5: Commands Used for Changing Security
Unit 6: Log Records
Unit 7: SAF and RACF
Unit 8: User ID and Sign-on Verification
Unit 9: Securing the Control Region
Quiz 2
Unit 10: Common Service Layer Security
Unit 11: IMS Connect and OTMA
Unit 12: Transaction Security
Unit 13: Command Security
Unit 14: Security for Time Controlled Operations
Quiz 3
Unit 15: IMS Resource Access Security (RAS)
Unit 16: IMS Database Security
Unit 17: IMS Data Set Security
Unit 18: Securing a DBCTL Environment
Unit 19: IMS and Db2 Security
Quiz 4
Final exam
So even if you’ve implemented many IMS security protections across your enterprise, be sure that you didn’t miss anything that can still be better protected by completing this course and getting that digital badge.
If you successfully complete the course, you'll get a digital badge!
You'll need an IBM account to enroll in the course and a Credly account to accept the badge.
Start the Implementing IMS Security course on IBM Training today!
Check out IMS Central for more IMS courses and videos.
