IBM Security Z Security

zSecurity.jpg

This online user group is intended for Z Security product users to communicate with IBM experts, share advice and best practices with peers and stay up to date regarding product enhancements, regional user group meetings, webinars, how-to blogs and other helpful materials.

We invite you to participate and ask you to contact Community Managers Jennifer Tullman-Botzer and Wendy Batten with any questions.

Z Security Resources

Latest Discussions

  • To summarize Jeroen's explanation: CKGOWNR indicates that CKGRACF may give you ability to modify the indicated profile, thus allowing you to grant yourself access. This is conditional on * CKGRACF being installed in an APF library and accessible to ...

  • Hi David, When I look in the section on RA.3.4 in the Admin and Audit User Reference Manual for zSecure 2.4.0, I find: The Via column shows the user ID or group in the access list entry that gave the access indicated. The value can also be any ...

  • Trying to review how I have "alter" access to a profile in class DASDVOL when I am not in the access list either via ID or group or resource owner. In ZSecure Admin, RA.3.4 (Permit/Scope), with my user ID and Specify type of authorization 3 3. Scope ...

Latest Blogs

  • Some recent PTFs improve the ease of administration for zSecure Alert. New functions are provided in (JCL) batch jobs to maintain alert configurations on one maintenance LPAR, test alert configurations using archived SMF records, and push out selected ...

  • Making zSecure and STIGs work for you The US Defense Information Systems Agency (DISA) needed a reference for the security configuration of information systems in the US Department of Defense (DoD). DISA supports the intrusion avoidance program of ...

    2 people recommend this.
  • In case you missed it, March 8 th was International Women’s Day , a day to answer how we will forge a gender equal world. A day to celebrate women’s achievements, raise awareness against bias and take action for equality. For me, it was also an opportunity ...

    1 person recommends this.
  • By Marilyn Thornton I’m going to be right up front with you, dear readers. This is a recruiting blog. It’s likely that if you are reading this in the IBM Security Community space, you already have a role in an IT security discipline, but there are young ...

    1 person recommends this.
  • PP. 73-82 in the I&D Guide for ZSecure mentions Access Monitor commands. It gives no indication of how these commands are executed. They do not work as parameters of the MODIFY C2PACMON command. There is a reference to "Operator commands" but these ...

Latest Files

Community Members