Overview
The BMC AMI Defender for z/OS product is an agent program that you install and run on one or more z/OS LPARs.
BMC AMI Defender performs the following activities:
Continuously monitors mainframe events from system management facilities (SMF) and collects SMF records.
SMF is a z/OS component that collects system activity data. SMF is typically used for accounting, security, and performance monitoring.
- Operates by installing the following z/OS exits on each LPAR on where you run BMC AMI Defender:
- IEFU83
- IEFU84
- IEFU85
- Reformats the SMF records that you specify as standard syslog messages.
- Sends the reformatted messages using UDP/IP, TCP/IP, or encrypted TCP/IP (IPv4 or IPv6) to a specified syslog console or server (such as the BMC Defender Server).
Support for other products
BMC AMI Defender supports the following products:
- Resource Access Control Facility (RACF).
- CA ACF2.
- CA Top Secret.
CZASEND
BMC AMI Defender includes a program for z/OS called CZASEND. You can use CZASEND, typically in a batch (JCL) job, to send text as custom syslog messages to a specified syslog console or server.
The CZASEND parameter file, CZAPSEND, contains parameters such as the IP address of the syslog console. Modify the parameter file to specify configuration options such as the target server IP address. For more information, see Parameter-file-statements.
BMC AMI Defender sends messages that are compliant with the syslog standard, RFC 3164. There are several security information and event management (SIEM)-vendor proprietary or semi-standard enhancements that are layered on top of the syslog standard. BMC AMI Defender supports all of the common format extensions. For more information, see Proprietary-syslog-format-extensions.
Supplementary programs
You can operate the following supplementary programs as part of BMC AMI Defender:
- CZAJOBLG, a program that streams the JES-spooled output of one or more running z/OS jobs, started tasks, or both, to any SIEM in real-time. The streaming of JES SYSOUT is commonly referred to as Job Log support. CZAJOBLG is installed automatically as part of the installation of BMC AMI Defender. For information about using the CZAJOBLG program, see Using-the-CZAJOBLG-program.
- CZALDFIL, a program that is calling BMC AMI Defender to transmit a file to a configured SIEM, reformatted as indicated by BMC AMI Defender field definitions. For information about using the CZALDFIL program, see Using-the-CZALDFIL-program.
- CZALSPAC, a program that is using BMC AMI Defender to transmit to a SIEM a series of space utilization messages for one or more DASD volumes. For information about using the CZALSPAC program, see Using-the-CZALSPAC-program.
- CZASEND, a batch program for sending a single message to an SIEM. For information about using the CZASEND program, see Using-the-CZASEND-program.
The supplementary programs are not required for normal installation, configuration, usage and maintenance of the mainframe agent program (BMC AMI Defender).
The supplementary programs do not apply to the BMC AMI Defender for Db2 program.
BMC AMI Defender for Db2
BMC AMI Defender for Db2 is a configuration alternative to BMC AMI Defender for z/OS. You can use BMC AMI Defender for Db2 to help you comply with the following regulatory standards:
- Payment Card Industry Data Security Standard (PCI DSS).
- Sarbanes-Oxley Act 2002 (SOX).
- Health Information Portability and Accountability Act 1996 (HIPAA).
- Gramm-Leach-Bliley Act 1999.
- IRS Publication 1075.
- Federal Homeland Security Modernization Act 2014 (FISMA).
BMC AMI Defender for Db2 performs the following activities:
- Automatically captures IBM Db2 events.
- Audits file and database access.
- Monitors database activity.
- Monitors file integrity.
BMC AMI Defender for Db2 supports IBM DB2 Versions 9.1, 10, 11, and 12.
You can configure the BMC AMI Defender package as a McAfee Database Activity Monitor (DAM) or as a SIEM agent that captures z/OS system and subsystem session, transaction, security and statement activity.
The following table lists the SMF records applicable to various compliance activities. For more information about the SMF records referenced in the table, see Parameter-file-statements.
Activity | SMF records (IFCID) |
---|---|
Privileged user monitoring | 361. |
Invalid logical access attempts | 80, 140. |
Creation and deletion of system level objects | 97. |
Data access | 80 EVENT(.0), 143, 144, and 145. For the appropriate RACF data set profiles, specify AUDIT(ALL). |
File integrity | 42 and 80 EVENT(.0). SMF 42 can notify you of changes to system libraries. For the appropriate RACF data set profiles, specify AUDIT(ALL(UPDATE)). |
Backup and recovery | 24 and 25. |
Architecture of the BMC AMI Defender for z/OS environment
The following figure illustrates the relationship between various parts of the BMC AMI Defender environment:
Related topics