|
Information Security Training
from the Henderson Group |
This page is: |
Quick Links: HOME PAGE CONTACT US INFOSEC TRAINING
NEWSLETTERS AND USER GROUPS ARTICLES
ABOUT US OTHER INFO SOURCES |
You will learn in clear, simple terms how RACF provides information
security for MVS, OS/390, and z/OS, including security for CICS, USS (UNIX
under MVS), TCP/IP, and the Websphere Internet Server. The class provides a
structured approach to auditing any RACF implementation quickly, easily, and
effectively.
You will learn:
For more information on seminar dates, locations, and hotels, and how to
register, please click here:
Please note that you can save money by holding these classes in-house. Call
Stu at (301) 229-7187 for details.
Note also the classes we offer for Information Security Training, as
listed on the left under QUICK LINKS.
|
"Mr. Henderson is an outstanding teacher."
---Ray Mosher, FDC
"The class is great, but be prepared to take in a lot of information." |
Table of Contents and Class Outline: HG74: How to Audit RACF Page I Concepts and Keywords 3 A. Introduction 3 A Working Example 7 Audit Rules 8 B. How Information Security Works -- Two Aspects 21 C. How RACF Security Works -- the Details 23 D. The Two-by-five Audit Approach: 42 E. The Big 5 Questions 43 F. Data Sources and Tools 64 G. Control Objectives 67 H. The Audit Program 68 II. Action Plan 70 Scoping, Planning and Basic Data Gathering 71 The Five-Step Audit Program 76 A. Access to the System 76 B. Access to Data 92 C. Access to Resources 108 D. Authority to Change Rules 123 E. Separation of Authority 137 Wrap-up, Working Papers, and Follow-Up 148 III Forms and Reference 151 A. Basic Security Model 152 B. Forms to Summarize RACF Implementation 157 C. Audit Plan 173 D. Model Documents 183 E. RACF Fundamentals 195 F. SMF Data and the RACFRW 200 G. RACF Database Unload Utility Guide 214 H. RACF Audit Checklist 219 I. SETR LIST Guide 228 J. DSMON Guide 247 INDEX 273