Reports for TSS
For details about the Tools menu, see Administering.
Data sets
Click Data sets and select one of the following reports to display information about sensitive data sets:
- Non-Fully Qualified Generic > APF
- Non-Fully Qualified Generic > Other
- Sensitive Data Sets > With *ALL* > None
- Sensitive Data Sets > Uncatalogued
- Sensitive Data Sets > All
Non-Fully Qualified Generic > APF
The APF Data Sets without Fully Qualified Generic profile report lists sensitive data sets that are specified as Authorized Program Facility (APF) libraries and are protected by a generic security profile (for example, SYS1.**) or have no security profile defined (*Unprotected*). Executable code within these data sets can perform sensitive system functions and has access to sensitive data.
Assign unprotected data sets a security profile to make sure that only authorized users have access. Review generic profiles to make sure they grant appropriate access to the data sets.
System | Dsn | Resource | Volser | Type |
---|---|---|---|---|
TSOP | SYS1.SVCLIB | SYS1. | RSM34B | APF |
TSOP | AZF.SAZFLOAD | AZF. | RSM3W1 | APF |
TSOP | CBC.SCLBDLL | CBC. | SYSLSA | APF |
TSOP | CBC.SCLBDLL2 | CBC. | SYSLSA | APF |
Column | Description |
---|---|
SYSTEM | Name of the LPAR on which the report is generated |
DSN | Name of the data set |
RESOURCE | Name of the physical or virtual component in the system |
VOLSER | Volume serial number |
TYPE |
|
Non-Fully Qualified Generic > Other
The Other Data Sets with Non-Fully Qualified Generic profiles report lists system data sets that are protected by a generic security profile (for example, SYS1.**) or have no security profile defined (*Unprotected*). These data sets might contain sensitive system parameters that could affect system integrity. They might also include executable modules that provide sensitive system services, reporting or monitoring.
Assign unprotected data sets a security profile to make sure that only authorized users have access. Review generic profiles to make sure that they grant appropriate access to the data sets.
System | Dsn | Resource | Volser | Type |
---|---|---|---|---|
TSOP | SYS1.SVCLIB | SYS1. | RSM34B | APF |
TSOP | AZF.SAZFLOAD | AZF. | RSM3W1 | APF |
TSOP | CBC.SCLBDLL | CBC. | SYSLSA | APF |
TSOP | CBC.SCLBDLL2 | CBC. | SYSLSA | APF |
Column | Description |
---|---|
SYSTEM | Name of the LPAR on which the report is generated |
DSN | Name of the data set |
RESOURCE | Name of the physical or virtual component in the system |
VOLSER | Volume serial number |
TYPE | Type of authorization table, such as UCAT or LINK |
Sensitive Data Sets > With *ALL* > None
The All sensitive resources with *ALL* ACCESS > None report lists all TSS sensitive resources with *ALL* access greater than none:
System | Dsn | Resource | Owner | Access | Type |
---|---|---|---|---|---|
TSOP | CATALOG.HOUSEKP.SHARED | CATALOG. | MASTER | READ | UCAT |
TSOP | CATALOG.GENERAL.UCAT | CATALOG. | MASTER | READ | UCAT |
TSOP | CATALOG.SMF.SHARED | CATALOG. | MASTER | READ | UCAT |
TSOP | CATALOG.ISVS.SHARED | CATALOG. | MASTER | READ | UCAT |
TSOP | CATALOG.ISVS.UCAT | CATALOG. | MASTER | READ | UCAT |
Column | Description |
---|---|
SYSTEM | Name of the LPAR on which the report is generated |
DSN | Data set name |
RESOURCE | Name of the physical or virtual component in the system |
OWNER | Name of the owner of the resource |
ACCESS | Access level permitted by TSS for accessing the resource |
TYPE | Name of the type of resource set being reported on |
Sensitive Data Sets > Uncatalogued
The Uncatalogued Sensitive Data Sets report lists sensitive data sets that are not cataloged. Use this information to make sure that all sensitive data sets are properly cataloged, allowing for centralized monitoring and access management. We recommend that you catalog these data sets or remove from the system.
System | Dataset Name | Protecting Resource | Cataloged? | Dataset Type |
---|---|---|---|---|
TSOP | ISVR.CA.SYSVIEW.V15R00.CNM4BLOD | ISVR.CA.SYSVIEW.** | N | APF |
TSOP | ISVR.COMPWARE.CPWR.MPAA170.SPAAAUTH | ISVR.COMPWARE.** | N | APF |
TSOP | ISVR.COMPWARE.CPWR.MKAZ170.SKAZAUTH | ISVR.COMPWARE.** | N | APF |
TSOP | ISVR.COMPWARE.CPWR.MKFX171.SKFXAUTH | ISVR.COMPWARE.** | N | APF |
Column | Description |
---|---|
SYSTEM | Name of the LPAR on which the report is generated |
DATASET NAME | Name of the data set |
PROTECTING RESOURCE | TSS resource that is protecting the data set |
CATALOGED? | Confirmation that the data set is not cataloged |
DATASET TYPE | Type of sensitive data set being reported on, such as APF or Link |
Sensitive Data Sets > All
The All Sensitive Data Sets report lists all sensitive data sets and their file types. Use this information to review your sensitive data landscape so that you can implement proper access controls and security measures. To enhance security, evaluate and strengthen your security based on the report's findings.
System | DSN | Volser | Created | Referenced | Cataloged | SMS | APF | *ALL* | Type |
---|---|---|---|---|---|---|---|---|---|
|
|
|
|
|
|
|
|
|
|
Column | Description |
---|---|
System | Name of the LPAR on which the report is generated |
DSN | Data set name |
Volser | Volume serial number |
Created | Date created or allocated |
Referenced | Last referenced date |
Cataloged | Catalog status |
SMS | Storage management subsystem information |
APF | Authorized program facility status |
*ALL* | Indicates if all the data in the data set is sensitive |
Type | Type of data set |
Sensitive Commands
Click Sensitive Commands and select one of the following reports to display information about sensitive commands:
z/OS.SETPROG
The z/OS.SETPROG Commands report lists all z/OS.SETPROG commands issued in the system, who issued the command, and related information. Use this information to review the impact of the SETPROG commands on critical system configuration, security, stability, and performance. A decline in these factors can occur because of unauthorized changes to the APF list, incorrect LPA modifications, enabling or disabling of protection of REFR programs, incorrect tracking settings of directed load modules, and so on.
As a security administrator, you can rely on this report to monitor authorized changes and prevent unauthorized modifications.
System | Date | Time | Userid | User Name | From | Event | Command | Details |
---|---|---|---|---|---|---|---|---|
TSOP | 2019-02-12 | 13:37:46 | REXXBAT | Unknown | CONSOLE | CONS | SETPROG APF,ADD,DSN=ISVR.RSS.QA.ZDT.RSSLOAD,VOL=NC3998 | System Command |
TSOP | 2019-02-12 | 13:37:45 | REXXBAT | Unknown | CONSOLE | CONS | SETPROG APF,ADD,DSN=ISVR.RSS.QA.ZDT.RSSLOAD,VOL=NC3997 | System Command |
TSOP | 2019-02-12 | 13:37:44 | REXXBAT | Unknown | CONSOLE | CONS | SETPROG APF,ADD,DSN=ISVR.RSS.QA.ZDT.RSSLOAD,VOL=NC3996 | System Command |
TSOP | 2019-02-12 | 13:37:43 | REXXBAT | Unknown | CONSOLE | CONS | SETPROG APF,ADD,DSN=ISVR.RSS.QA.ZDT.RSSLOAD,VOL=NC3995 | System Command |
Column | Description |
---|---|
SYSTEM | Name of the LPAR on which the report is generated |
DATE | Date the command was executed |
TIME | Time the command was executed |
USERID | User ID that issued the command |
NAME | Name of the user, if available |
FROM | Where the command was entered |
EVENT | Internal event type or SMF event and event qualifier Event refers to the SMF event/code qualifier documented in the IBM SMF manuals, or 'CONS' for a |
COMMAND | Command that was entered |
DETAILS | Internal event types |
All z/OS Commands
The All z/OS Commands report lists all z/OS commands issued in the system, who issued the command, and related information. Use this information to perform a security audit and report anomalies. This helps you monitor commands, detect unauthorized or suspicious activities, assess compliance with security policies, and identify potential vulnerabilities.
As a security administrator, you can investigate any unexpected or high-impact commands, and take corrective actions as needed to assert system integrity and security.
System | Date | Time | Userid | User Name | Port Of Entry | Event | Description | Command |
---|---|---|---|---|---|---|---|---|
TSOP | 2019-02-14 | 12:15:59 | AUSER | Fred Smith | A05TCP45 | 1800 | SETROPTS command | SETROPTS RACLIST(XFACILIT) REFRESH |
TSOP | 2019-02-14 | 12:14:15 | BUSER | Dave Jones | A05TCP57 | 1800 | SETROPTS command | SETROPTS GENERIC(DATASET) REFRESH |
TSOP | 2019-02-14 | 12:11:29 | CUSER | Bert Williams | A05TCP34 | 1800 | SETROPTS command | SETROPTS RACLIST(STARTED) REFRESH |
TSOP | 2019-02-14 | 12:09:23 | DUSER | Tina Brown | A05TCP19 | 1800 | SETROPTS command | SETROPTS RACLIST(OPERCMDS) REFRESH |
Column | Description |
---|---|
SYSTEM | Name of the LPAR on which the report is generated |
DATE | Date the command was executed |
TIME | Time the command was executed |
USERID | User ID that issued the command |
USER NAME | Name of the user, if available |
PORT OF ENTRY | Where the command was entered |
EVENT | Internal event type or SMF event and event qualifier Event refers to the SMF event/code qualifier documented in the IBM SMF manuals, or 'CONS' for a |
DESCRIPTION | Command that was entered |
COMMAND | Internal event types |
Resources
Click Resources and select one of the following reports to display information about TSS general resources:
- Missing Profiles > OPERCMD
- Missing Profiles > STGADMIN
- Missing Profiles > UNIXPRIV
- Missing Profiles > Command Verifier
- Missing Profiles > Certificate
- Certificates > All Profiles
- Certificates > Expiring
- Certificates > Expired
- Certificates > All
- Misconfigured Settings > CICS SIT
- Misconfigured Settings > IMS
- Misconfigured Settings > DB2
- Misconfigured Settings > MQ
- Software Security Settings > CICS SIT
- Software Security Settings > IMS
- Software Security Settings > Db2
- Software Security Settings > MQ
- Profiles with Inappropriate Audit
- All Profiles
Missing Profiles > OPERCMD
The Missing OPERCMD Profiles report identifies profiles associated with the OPERCMD resource class that are missing or not properly defined. Use this information to identify and review inadequately configured OPERCMD profiles, define and configure the required profiles, and assign appropriate access and permissions to only users authorized for each action.
As a security administrator, you can address security concerns arising out of unauthorized access to critical system commands.
System | Class | Profile | Purpose | Recommended |
---|---|---|---|---|
TSOP | OPERCMDS | MVS.SET.PROG.** | Modify APF Libraries | Access must be limited to authorized personnel only. Preferably only accessible via PAM ids. Should have UACC(NONE) and AUDIT(SUC(READ) FAIL(READ)) |
Column | Description |
---|---|
SYSTEM | Name of the LPAR on which the report is generated |
CLASS | TSS class |
PROFILE | OPERCMDS profile |
PURPOSE | Purpose of the TSS profile |
RECOMMENDED | BMC recommendations |
Missing Profiles > STGADMIN
The Missing STGADMIN Profiles report lists storage administration profiles in the FACILITY and XFACILIT classes related to the STGADMIN resource class that are absent or incorrectly set up. Use this information to verify that STGADMIN profiles are properly defined and that storage administration tasks are restricted to authorized personnel only. Defining and configuring these profiles reduces the need for superuser authority and minimizes security risks.
As a security administrator, you can ensure that storage management functions, such as compression, ACL overrides, and changing permissions, are protected and secure.
System | Class | Profile | Purpose | Recommended |
---|---|---|---|---|
TSOP | FACILITY | STGADMIN.ADR.CONVERTV | Convert VTOC to SMS | Require READ access to use. Restrict access to this |
TSOP | FACILITY | STGADMIN.ADR.COPY.BYPASSACS | Copy data sets bypassing ACS routines | Require READ access to use. Restrict access to this |
TSOP | FACILITY | STGADMIN.ADR.COPY.INCAT | INCAT processing | Require READ access to use. Restrict access to this |
TSOP | FACILITY | STGADMIN.ADR.COPY.PROCESS.SYS | Copy SYS1 data sets | Require READ access to use. Restrict access to this |
Column | Description |
---|---|
SYSTEM | Name of the LPAR on which the report is generated |
CLASS | TSS class. |
PROFILE | STGADMIN profile |
PURPOSE | Purpose of the TSS profile |
RECOMMENDED | BMC recommendations |
Missing Profiles > UNIXPRIV
The Missing UNIXPRIV Profiles report lists profiles with z/OS UNIX privileges related to the UNIXPRIV resource class that are missing or misconfigured. Use this information to validate that UNIXPRIV profiles are correctly set up.
This ensures proper access control for UNIX-related resources. You can create user profiles without superuser authority and grant them specific privileges using these UNIXPRIV profiles with fine granularity. This enhances security of your mainframe environment by ensuring user privileges are granted only where necessary.
As a security administrator, you can ensure controlled access to superuser-level actions, such as changing ownership or managing ACLs. You can activate and inactivate the UNIXPRIV class and define profiles with the necessary permissions to authorized UNIX administrators.
System | Class | Profile | Purpose | Recommended |
---|---|---|---|---|
TSOP | UNIXPRIV | SUPERUSER.IPC.RMID | Release IPC resources (ipcrm) | Require READ access to use. Limit to UNIX processes/debuggers |
TSOP | UNIXPRIV | SUPERUSER.PROCESS.KILL | Issue kill to processes | Require READ access to use. Limit to UNIX processes/debuggers |
TSOP | UNIXPRIV | SUPERUSER.PROCESS.PTRACE | Use ptrace through dbx debugger | Require READ access to use. Limit to UNIX processes/debuggers |
TSOP | UNIXPRIV | SUPERUSER.SETPRIORITY | Increase own priority | Require READ access to use. Limit to Storage Admin Group |
Column | Description |
---|---|
SYSTEM | Name of the LPAR on which the report is generated |
CLASS | TSS class. |
PROFILE | UNIXPRIV profile |
PURPOSE | Purpose of the TSS profile |
RECOMMENDED | BMC recommendations |
Missing Profiles > Command Verifier
The Missing Command Verifier Profiles report lists instances where profiles related to the Command Verifier (C4R) in the XFACILIT resource class are absent. Use this information to understand which profiles are missing, and ensure that the C4RPIER module is correctly configured and that zSecure Command Verifier is up-to-date. As a security administrator, you can investigate unauthorized attempts to access system resources.
The Missing Command Verifier Profiles report lists instances where profiles related to the Command Verifier (C4R) in the XFACILIT resource class are absent. Use this information to understand which profiles are missing, and ensure that the C4RPIER module is correctly configured and that zSecure Command Verifier is up-to-date.
As a security administrator, you can investigate unauthorized attempts to access system resources.
System | Class | Profile | Purpose | Recommended |
---|---|---|---|---|
TSOP | XFACILIT | C4R.EXEMPT | Allows certain users to be exempt from policy enforcement | If you are installing Command Verifier for the first time, ensure that 1 or 2 users are permitted |
TSOP | XFACILIT | C4R.USER.ATTR.AUDITOR.** | Prevents system AUDITOR from being granted to users | Very few users should have this access Set default universal access authority (UACC) to NONE. |
TSOP | XFACILIT | C4R.USER.ATTR.OPERATIONS.** | Prevents system OPERATIONS from being granted to users | Very few users should have this access Set UACC to NONE. |
TSOP | XFACILIT | C4R.USER.ATTR.SPECIAL.** | Prevents system SPECIAL from being granted to users | Very few users should have this access Set UACC to NONE. |
Column | Description |
---|---|
SYSTEM | Name of the LPAR on which the report is generated |
CLASS | Class name to which the profile belongs |
Profile | Command Verifier profile |
Purpose | Profile owner |
Recommended | BMC recommendations for this setting |
Missing Profiles > Certificate
The Missing Certificate Profiles report lists RACF certificate management-related profiles in the FACILITY class, which are not defined. It includes all the recommended general resource profiles related to digital certificates that are not defined to RACF. Use this information to ensure that only authorized personnel have access to commands used to store and maintain digital certificate information in RACF.
As a security administrator, you can ensure that digital certificate information is stored securely without any unauthorized access or change attempts.
System | Class | Profile | Recommended |
---|---|---|---|
TSOP | FACILITY | IRR.DIGTCERT.** | Set UACC/ID(*) to NONE. READ allows users to issue the RACDCERT commands for themselves, UPDATE for others and CONTROL for SITE and CERTAUTH certificates |
TSOP | FACILITY | IRR.DIGTCERT.CHECKCERT | Set UACC/ID(*) to NONE. READ allows users to issue the RACDCERT commands for themselves, UPDATE for others and CONTROL for SITE and CERTAUTH certificates |
Column | Description |
---|---|
SYSTEM | Name of the LPAR on which the report is generated |
CLASS | TSS class |
PROFILE | Missing TSS profile |
RECOMMENDED | BMC recommended profile |
Certificates > All Profiles
The All Certificate Profiles report lists all the general resource profiles related to the maintenance of digital certificates including Profile name, Owner, Universal Access, Audit controls, and ACL Count. Use this information to verify the validity of the profile definitions and make necessary updates or deletions to maintain system security.
As a security administrator, you can identify and validate access to maintain certificates, ensuring proper configuration and security.
System | Class | Profile | Owner | UACC | Warn | Audit S/F | ID(*) | Level | ACL Count |
---|---|---|---|---|---|---|---|---|---|
TSOP | FACILITY | IRR.DIGTCERT.* | TSGDL | None | N | /R |
| 0 |
|
TSOP | FACILITY | IRR.DIGTCERT.ADD | TSGCG | None | N | /R | R | 0 | 7 |
TSOP | FACILITY | IRR.DIGTCERT.ADDRING | TSGCG | None | N | /R | R | 0 | 7 |
TSOP | FACILITY | IRR.DIGTCERT.ALTER | TSGCG | None | N | /R | R | 0 | 7 |
Column | Description |
---|---|
SYSTEM | Name of the LPAR on which the report is generated |
CLASS | TSS class |
PROFILE | TSS profile |
OWNER | Profile owner |
UACC | TSS Universal ACCess setting |
WARN | Whether the WARNING attribute is on |
AUDIT S/F | Audit successes and failures The audit levels can have the following values:
For example, U/R is equal to Success(Update)/Failures(Read). |
ID(*) | Default access for the profile |
LEVEL | Resource level |
ACL COUNT | Number of users on the access list |
Certificates > Expiring
The Expiring Certificates report provides a comprehensive list of certificates that are due to expire in 365 days or less. It includes details such as the certificate label, start date, end date, owner, days to expiry, and the certificate profile. Use this information to proactively renew or replace expiring certificates and avoid service disruptions.
As a security administrator, you can proactively manage expiring certificates, safeguard security, and ensure compliance within the mainframe environment.
System | Label | Owner | Start Date | End Date | Days to Expiry | Profile |
---|---|---|---|---|---|---|
TSOP | ZBASIL_TEST.NEW | AVUSTR | 2022/05/04 | 2023/05/04 | 7 | 01.CN=ZBASIL.CA.OU=ZBASIL�CA.O=EC�TEST.L=ALTON.SP=HANTS.C=GB |
Column | Description |
---|---|
SYSTEM | Name of the LPAR on which the report is generated |
LABEL | Digital certificate label |
OWNER | Certificate owner, CERTAUTH (CA), or SITE (site certificate) |
START DATE | Certificate start date, if available |
END DATE | Certificate expiration date |
DAYS TO EXPIRY | Number of days until the certificate expires |
PROFILE | TSS DIGICERT name of the certificate |
Certificates > Expired
The Expired Certificates report provides a detailed list of digital certificates that have already expired and not been deleted. It includes information such as the certificate label, start and end date, owner, days since expiry, and the certificate profile. Use this information to manage expired certificates that might cause security vulnerabilities or service disruptions.
As a security administrator, you can promptly ensure that the mainframe environment remains secure and compliant.
System | Label | Owner | Start Date | End Date | Days After Expiry | Profile |
---|---|---|---|---|---|---|
TSOP | ZBASIL_TEST.NEW | AVUSTR | 2022/05/04 | 2023/05/04 | 7 | 01.CN=ZBASIL.CA.OU=ZBASIL�CA.O=EC�TEST.L=ALTON.SP=HANTS.C=GB |
Column | Description |
---|---|
SYSTEM | Name of the LPAR on which the report is generated |
LABEL | Digital certificate label |
OWNER | Certificate owner, CERTAUTH (CA), or SITE (site certificate) |
START DATE | Certificate start date, if available |
END DATE | Certificate expiration date |
DAYS AFTER EXPIRY | Number of days after the certificate expired |
PROFILE | TSS DIGICERT name of the certificate |
Certificates > All
The All Certificates report provides a comprehensive list of all digital certificates managed within the mainframe environment. It includes details such as the certificate label, start and end dates, and the certificate profile. Use this information to gain a complete overview of the certificates in use.
As a security administrator, you can regularly review this information to identify and address any issues related to certificates, ensuring a secure and compliant mainframe environment.
System | Label | Owner | Start Date | End Date | Profile |
---|---|---|---|---|---|
TSOP | ZBASIL_TEST.NEW | AVUSTR | 2022/05/04 | 2023/05/04 | 01.CN=ZBASIL.CA.OU=ZBASIL�CA.O=EC�TEST.L=ALTON.SP=HANTS.C=GB |
Column | Description |
---|---|
SYSTEM | Name of the LPAR on which the report is generated |
LABEL | Digital certificate label |
OWNER | Certificate owner, CERTAUTH (CA), or SITE (site certificate) |
START DATE | Certificate start date, if available |
END DATE | Certificate expiration date |
PROFILE | TSS DIGICERT name of the certificate |
Misconfigured Settings > CICS SIT
The Misconfigured CICS SIT Settings report lists security configurations in CICS sessions defined in the CICS system initialization table (SIT) that conflict with BMC recommendations. This report includes information about improperly configured security settings, such as unauthorized access and incorrect permissions. Use this information to correct these misconfigurations and to ensure that access controls are properly enforced and the system remains secure.
As a security administrator, you can identify security misconfigurations to correct them and maintain system integrity and compliance with security policies.
System | Region | Setting | Current | Recommended | Purpose | Notes |
---|---|---|---|---|---|---|
TSOP | CICSTS55 | CONFDATA | Show | HIDETC | Determines whether user data to appear in traces or dumps. This data could be used to penetrate the system. | Default is SHOW. This may have SOX implications |
TSOP | CICSTS55 | CONFTXT | No | Yes | Determines whether user data to appear in traces or dumps. This data could be used to penetrate the system. | Default is NO VTAM can trace user data. |
TSOP | CICSTS55 | GMTRAN | CESN | CSGM | Specifies the initial transaction that will be executed. | Default is CSGM. Specify an ATI transaction that will be run. |
TSOP | CICSTS55 | SECPRFX | No | Yes | This parameter allows for segregation of access to separate regions. CICS will prefix all resource names with the CICS userid ID when talking to the ESM | YES is generally recommended if multiple CICS systems are running. |
Column | Description |
---|---|
System | Name of the LPAR on which the report is generated |
Region | CICS region name |
Setting | System name |
Current | Current value |
Recommended | BMC recommended value |
Purpose | Description of the purpose of the setting |
Notes | Supplementary notes regarding the BMC recommendation |
Misconfigured Settings > IMS
The Misconfigured IMS Settings report lists IBM Information Management System (IMS) environment settings that conflict with BMC recommendations. It provides information about improperly configured security settings, such as unauthorized access, outdated or incorrect permissions, and deviations from BMC recommendations in integrating with IMS.
Use this information to correct these misconfigurations, adjust access controls, and enforce stringent security policies to ensure that IMS environments are configured securely in line with organizational and regulatory requirements.
As a security administrator, you can address configuration and access concerns to help maintain a secure and compliant mainframe system.
System | Region | Setting | Current | Recommended | Purpose | Notes |
---|---|---|---|---|---|---|
|
|
|
|
|
|
|
Column | Description |
---|---|
System | Name of the LPAR on which the report is generated |
Region | IMS region name |
Setting | System name |
Current | Current value |
Recommended | BMC recommended value |
Purpose | Description of the purpose of the setting |
Notes | Supplementary notes regarding the recommendation |
Misconfigured Settings > DB2
The Misconfigured Db2 Settings report lists Db2 environment settings that conflict with BMC recommendations. Potential security misconfigurations in the Db2 database environment can include issues such as incorrect user access levels, improperly assigned roles, and discrepancies between the ESM and Db2 access control settings. Use this information to gain insights into areas in which access controls might be lenient or inconsistent with security policies, and correct user permissions to ensure that the Db2 security settings align with organizational security standards.
As a security administrator, you can mitigate risks and enhance the overall security posture of the mainframe system.
System | Region | Setting | Current | Recommended | Purpose | Notes |
---|---|---|---|---|---|---|
|
|
|
|
|
|
|
Column | Description |
---|---|
System | Name of the LPAR on which the report is generated |
Region | Db2 region name |
Setting | System name |
Current | Current value |
Recommended | BMC recommended value |
Purpose | Description of the purpose of the setting |
Notes | Supplementary notes regarding the recommendation |
Misconfigured Settings > MQ
The Misconfigured MQ Settings report lists MQ environment settings that conflict with BMC recommendations. This can include issues such as improper user access, unsecured queue permissions, and discrepancies between the ESM and MQ security configurations.
Use this information to identify potential vulnerabilities where unauthorized users might be able to gain access to sensitive messages or queues. You can adjust user roles, refine access controls, and enforce security policies to ensure that MQ settings are tightly controlled.
As a security administrator, you can monitor and manage these misconfigurations, prevent unauthorized access, and enhance the overall security of the messaging infrastructure.
System | Region | Setting | Current | Recommended | Purpose | Notes |
---|---|---|---|---|---|---|
|
|
|
|
|
|
|
Column | Description |
---|---|
System | Name of the LPAR on which the report is generated |
Region | MQ region name |
Setting | System name |
Current | Current value |
Recommended | BMC recommended value |
Purpose | Description of the purpose of the setting |
Notes | Supplementary notes regarding the recommendation |
Software Security Settings > CICS SIT
The CICS SIT Settings report lists the security settings defined in the CICS system initialization table (SIT) of each active CICS region. This report provides details about the security settings for the CICS (Customer Information Control System) environment and reflects configurations related to resource access and control mechanisms defined in the CICS SIT. Use this information to identify any security vulnerabilities, misconfigurations, or deviations from best practices in CICS settings.
As a security administrator, you can monitor compliance with organizational security policies, and fine-tune access controls, enforce security policies, and enhance the overall protection of CICS applications.
System | Region | Parameter | Current Setting |
---|---|---|---|
TSOP | CICSTS51 | AIEXIT | DFHZATDX |
TSOP | CICSTS51 | APPLIDG | A05CICS1 |
TSOP | CICSTS55 | APPLIDG | A |
Column | Description |
---|---|
SYSTEM | Name of the LPAR on which the report is generated |
REGION | CICS region name |
PARAMETER | SIT initialization parameter |
CURRENT SETTING | Current setting |
Software Security Settings > IMS
The IMS Security Settings report provides information about the security configurations for IBM Information Management System (IMS) applications defined for each active IMS region. It details access controls and resource protections defined within these applications. Use this information to review how IMS is configured to secure sensitive data and manage user access.
As a security administrator, you can identify potential vulnerabilities and misconfigurations in security policies and ensure that only authorized users can interact with critical IMS data and services. You can thus enforce stronger security policies, prevent unauthorized access, and maintain compliance with security standards.
System | Region | Parameter | Current setting |
---|---|---|---|
|
|
|
|
Column | Description |
---|---|
SYSTEM | Name of the LPAR on which the report is generated |
REGION | IMS region name |
PARAMETER | Initialization parameter |
CURRENT SETTING | Current setting |
Software Security Settings > Db2
The Db2 Security Settings report lists the security settings defined for each active Db2 region. It provides a detailed view of the security configurations for Db2, a relational database management system and outlines settings related to user access controls and resource protections for Db2 databases.
Use this information to detect potential security risks, such as overly permissive access and misconfigured permissions.
As a security administrator, you can fine-tune access controls, regulate authority and access, enforce security policies, strengthen database security, and make sure that the Db2 configurations align with your organizational security standards.
System | Region | Parameter | Current setting |
---|---|---|---|
|
|
|
|
Column | Description |
---|---|
SYSTEM | Name of the LPAR on which the report is generated |
REGION | Db2 region name |
PARAMETER | Initialization parameter |
CURRENT SETTING | Current setting |
Software Security Settings > MQ
The MQ Security Settings report lists the security settings defined for each active MQ region. This report provides a detailed overview of the security configurations for IBM MQ. It also highlights access control settings, encryption protocols, user permissions, and authentication methods used within the MQ environment. Use this information to identify potential security risks related to message queuing, such as unauthorized access or weak encryption, and misconfigurations or vulnerabilities that might compromise MQ system integrity.
As a security administrator, you can ensure that sensitive messages and data are protected during transmission. You can adjust security settings, implement tighter controls, and enforce compliance with organizational security policies.
System | Region | Parameter | Current setting |
---|---|---|---|
TSOP | QCBAMSTR | ACTIVE | Yes |
TSOP | QCBAMSTR | ACTIVE | No |
TSOP | QCBAMSTR | ACTIVE | No |
TSOP | QCBAMSTR | ACTIVE | No |
Column | Description |
---|---|
SYSTEM | Name of the LPAR on which the report is generated |
REGION | MQ region name |
PARAMETER | Parameter name |
CURRENT SETTING | Current setting |
Profiles with Inappropriate Audit
The Resource Profiles with Inappropriate Audit report lists all general resource profiles that do not comply with the recommended audit settings, including profiles for which auditing might be disabled or wrongly configured, potentially leaving security events untracked. Use this report to help spot gaps in monitoring audit parameters and to ensure that all critical resources are properly audited for access and activity.
As a security administrator, you can review and update audit settings and ensure proper supervision to mitigate potential security vulnerabilities and enhance detection capabilities, strengthen compliance with audit policies, and improve overall security monitoring.
System | Class | Profile | Owner | UACC | Warn | Audit S/F | ID(*) | Level | ACL Count | Cert Start | Cert End |
---|---|---|---|---|---|---|---|---|---|---|---|
TSOP | DIGTCERT | 023456.CN=GeoTrust?Global?CA.O=GeoTrust?Inc..C=US | TSGAT | T | N | / |
| 0 |
| 2002-05-21 | 2022-05-21 |
TSOP | FACILITY | AOPADMIN | IBMUSER | N | N | /R |
| 0 | 1 |
|
|
TSOP | FACILITY | AP | #OPSMVS | N | N | /R |
| 0 | 1 |
|
|
TSOP | FACILITY | BPX.CONSOLE | TSGSJ | N | N | /R |
| 0 | 8 |
|
|
Column | Description |
---|---|
SYSTEM | Name of the LPAR on which the report is generated |
CLASS | TSS class |
PROFILE | TSS profile |
OWNER | Profile owner |
UACC | Universal ACCess for undefined user IDs |
WARN | Is the WARNING attribute on? |
AUDIT S/F | Audit successes and failures The audit levels can have the following values:
For example, U/R is equal to Success(Update)/Failures(Read). |
ID(*) | Default access for defined user IDs |
LEVEL | Level from the TSS profile definition |
ACL COUNT | Number of users on the access list (ACL) |
CERT START | Start date if a certificate |
CERT END | End date if a certificate |
All Profiles
The All Resource Profiles report lists all general resource profiles from the recommended RACF classes defined in the system. This report includes details such as resource class, resource name, access levels, and audit settings offering a snapshot of how each resource is protected. Use this information to review and audit resource profiles, detect unauthorized or outdated settings, and adjust access controls to align with security policies.
As a Security Administrator, you can identify resource access control configurations and ensure that the appropriate security measures are in place for each resource. You can proactively manage risk and ensure all resources are secured according to best practices to maintain system security and compliance with policies.
System | Class | Profile | Owner | UACC | Warn | Audit S/F | ID(*) | Level | ACL Count | Cert Start | Cert End |
---|---|---|---|---|---|---|---|---|---|---|---|
TSOP | DIGTCERT | 00.CN=CKNCA.OU=ZSECURE.O=IBM.C=US | TSGTS | T | N | / |
| 0 |
| 2018-05-24 | 2020-01-30 |
TSOP | FACILITY | AOPADMIN | IBMUSER | N | N | /R |
| 0 | 1 |
|
|
TSOP | FACILITY | AP | #OPSMVS | N | N | /R |
| 0 | 1 |
|
|
TSOP | FACILITY | BPX.CONSOLE | TSGSJ | N | N | /R |
| 0 | 8 |
|
|
Column | Description |
---|---|
SYSTEM | Name of the LPAR on which the report is generated |
CLASS | TSS class |
PROFILE | TSS profile |
OWNER | Profile owner |
UACC | Universal ACCess for undefined user IDs |
WARN | Is the WARNING attribute on? |
AUDIT S/F | Audit successes and failures The audit levels can have the following values:
For example, U/R is equal to Success(Update)/Failures(Read). |
ID(*) | Default access for defined user IDs |
LEVEL | Level from the TSS profile definition |
ACL COUNT | Number of users on the access list (ACL) |
CERT START | Start date of a certificate |
CERT END | End date of a certificate |
System Settings
Click System Settings and select one of the following reports to display information about your TSS and z/OS environment:
- PPT > Entries Specifying NOPASS
- PPT > Entries Defined as NOSWAP
- All Settings
- STC Entries with Unprotected User ID
- Inactive Monitored Jobs
- Misconfigured Settings
- TSSPARM Settings
PPT > Entries Specifying NOPASS
The PPT Entries Specifying NOPASS in Parmlib report lists all Program Properties Table (PPT) entries that have NOPASS specified in z/OS PARMLIB member SCHEDxx. This report provides information about program entries that might lack security protection. Use this information to identify programs that can access the resources without security protection, and modify these entries to require password protection where necessary.
As a security administrator, you can make sure that only trusted programs have such exceptions and take corrective actions, such as removing unnecessary NOPASS entries or tightening access control policies to mitigate potential vulnerabilities.
System | Program |
---|---|
TSOP | EPWINIT |
Column | Description |
---|---|
SYSTEM | Name of the LPAR on which the report is generated |
PROGRAM | Program that has NOPASS in the PPT |
PPT > Entries Defined as NOSWAP
The PPT Entries Defined as NOSWAP in Parmlib report lists all Program Properties Table (PPT) entries with NOSWAP defined in z/OS PARMLIB member SCHEDxx. This report provides information to z/OS about programs that are configured to prevent z/OS from swapping them out to auxiliary storage. The NOSWAP parameter is important to ensure that critical processes or high-priority tasks remain in the main memory for faster execution. Use the information in this report to review and modify these entries to adjust the ability to swap programs based on security policies and requirements.
As a security administrator, you can make sure that essential processes are protected and prevent misuse by non-critical users or unauthorized programs to help maintain system performance and security.
System | Program | Key |
---|---|---|
TSOP | AZFSTCMN | 2 |
TSOP | BNJLINTX | 8 |
TSOP | BPEINI00 | 7 |
TSOP | BPXBATA2 | 2 |
Column | Description |
---|---|
SYSTEM | Name of the LPAR on which the report is generated |
PROGRAM | Program name in the PPT |
KEY | MVS storage protect key that the program runs under and has been defined in the MVS PPT |
All Settings
The All Settings report provides a comprehensive overview of all the RACF, TSS, or ACF2, and z/OS security settings currently configured within the system. This report includes details about user permissions, access controls, password policies, and other critical security parameters. Use this information to assess whether settings align with organizational policies, to identify potential security gaps, and to verify compliance with regulations.
As a security administrator, you can take corrective actions to enhance the overall security posture of your mainframe environment.
System | Type | Setting | Current Value |
---|---|---|---|
TSOP | PASSWORD | HISTORY | 6 |
TSOP | PASSWORD | INTERVAL | 30 |
TSOP | PASSWORD | MINCHANGE | 0 |
TSOP | PASSWORD | MIXEDCASE | MIXEDCASE |
Column | Description |
---|---|
SYSTEM | Name of the LPAR on which the report is generated |
TYPE | Setting type |
SETTING | Setting name |
CURRENT VALUE | Current value of the setting from storage |
STC Entries with Unprotected User ID
The Started Task Entries with Unprotected User ID report lists all started tasks (STCs) defined to RACF or TSS that are associated with user IDs lacking proper security protections, which could potentially be exploited. Use this information to investigate whether to increase security measures for these tasks or to reconfigure the security settings of the affected user IDs to prevent exploitation.
As a security administrator, you can secure the user IDs to mitigate potential security risks and ensure that only authorized users can access critical system tasks.
System | Profile | Stuser | Stgroup | Privileged | Trusted | Traced |
---|---|---|---|---|---|---|
LPAR1 | BPXAS.* | OMVSKERN | OMVSGRP |
|
|
|
LPAR1 | FTPD.* | FTPD |
|
|
|
|
LPAR2 | TCPIP.* | TCPIP | OMVSGRP |
| Yes |
|
LPAR3 | TN3270.* | TN3270 | OMVSGRP |
| Yes |
|
Column | Description |
---|---|
SYSTEM | Name of the LPAR on which the report is generated |
PROFILE | Started task profile name |
STUSER | Started task user IDs associated with the profile |
STGROUP | Started task group associated with the profile |
PRIVILEGED | Whether the task is privileged |
TRUSTED | Whether the task is trusted |
TRACED | Whether the task is traced |
Inactive Monitored Jobs
The Inactive Monitored Jobs report lists all jobs that have been inactive for a specified period but are still being monitored. Use this report to identify dormant, idle, or unauthorized jobs that could pose security risks.
As a security administrator, you can take appropriate actions against anomalies in job activity and remove unnecessary jobs to enhance system security and maintain system performance.
System | Job not running |
---|---|
TSOP | RSSTAM |
TSOP | CICSTS42 |
Column | Description |
---|---|
SYSTEM | Name of the LPAR on which the report is generated |
JOB NOT RUNNING | Name of the monitored job that appears not to be running |
Misconfigured Settings
The Misconfigured Settings report lists
System | Type | Setting | Current Value | Recommended | Description | Notes |
---|---|---|---|---|---|---|
|
|
|
|
|
|
|
Column | Description |
---|---|
SYSTEM | Name of the LPAR on which the report is generated |
TYPE | Setting type |
SETTING | Setting name |
CURRENT VALUE | Current value of the setting from storage |
RECOMMENDED |
|
DESCRIPTION |
|
NOTES |
|
TSSPARM Settings
The TSSPARM Settings report lists
System | Type | Setting | Current Value |
---|---|---|---|
|
|
|
|
Column | Description |
---|---|
SYSTEM | Name of the LPAR on which the report is generated |
TYPE | Setting type |
SETTING | Setting name |
CURRENT VALUE | Current value of the setting from storage |
Users
Click Users and select one of the following reports to display information about TSS users:
- Specific User Activity
- Inactive (Non-STC)
- File Transfers
- ACIDs > No 'Last Used' Date
- ACIDs > With NOxxxCHK
- ACIDs > With Non-Expiring Passwords
- ACIDs > With UID(0)
Specific User Activity
Select Users > Specific User Activity to fetch information about a specific user. Enter the user ID you want to query, and click Submit.
The Detailed User Activity report is displayed as in the following example:
Inactive (Non-STC)
The All Inactive Non-STC Users report lists user accounts that are inactive and not associated with started tasks.
System | User | Name | Type | Revoked | Created | DateUsed | TimeUsed | Last Facility | Last CPU |
---|---|---|---|---|---|---|---|---|---|
TSOP | TSGAT | ADRIAN TOPP | USER |
| 2018-03-05 | 2020-07-17 | 14:30 | TSO | RSMX |
TSOP | TSGCH | CHRIS HARVEY | CENTRAL |
| 2019-07-04 | 2019-10-07 | 09:22 | TSO | RSMZ |
Column | Description |
---|---|
SYSTEM | Name of the LPAR on which the report is generated |
USER | ACID |
NAME | Name of the ACID |
TYPE | Type of ACID |
REVOKED | Date ACID was revoked |
CREATED | Date ACID was created |
DATEUSED | Date ACID was last used |
TIMEUSED | Time ACID was last used |
LAST FACILITY | Name of the last facility that ACID used on the system |
LAST CPU | Name of last CPU (LPAR) accessed by ACID |
File Transfers
The User File Transfers report lists the following:
System | Date | Time | System | User | Action | Program | Dataset | Jobname |
---|---|---|---|---|---|---|---|---|
|
|
|
|
|
|
|
|
|
Column | Description |
---|---|
SYSTEM | Name of the LPAR on which the report is generated |
DATE | Date the file transfer was run |
TIME | Time the file transfer was run |
SYSTEM | System the file transfer was run from |
USER | ACID performing the file transfer |
ACTION | PUT (Send) or GET (Receive) |
PROGRAM | Name of the program used to transfer the file |
DATASET | Name of the data set that was transferred |
JOBNAME | Name of the job that ran the file transfer |
ACIDs > No 'Last Used' Date
The ACIDs with no 'Last Used' Date report lists the following:
System | ACID | Name | Type | Suspended | Creation Date | Time |
---|---|---|---|---|---|---|
TSOP | BPXROOT | BPX ROOT | USER |
| 2018-03-02 | 12:20 |
TSOP | ECWFSEC | SECURITY ADMIN | CENTRAL |
| 2020-04-27 | 11:54 |
TSOP | GSVNDTCL | SYSVIEW | USER |
| 2019-11-20 | 10:44 |
Column | Description |
---|---|
SYSTEM | Name of the LPAR on which the report is generated |
ACID | ACID |
NAME | Name of ACID |
TYPE | Type of ACID |
SUSPENDED | Date ACID was suspended |
CREATION DATE | Date ACID was created |
TIME | Time ACID was last used |
ACIDs > With NOxxxCHK
In the ACIDs with NOxxxCHK report, for the listed ACID with expanded privileges, the access and activity are logged, but the specified security checks are not performed.
System | ACID | Name | Type | DSN | LCF | RES | SUB | VMD | VOL | STC? |
---|---|---|---|---|---|---|---|---|---|---|
TSOP | SMFCLEAR | OMVS | USER | NODSNCHK |
|
|
|
| NOVOLCHK | *STC* |
TSOP | TSGCW | CHAD WICK | CENTRAL | NODSNCHK | NOLCFCHK | NORESCHK |
|
| NOVOLCHK |
|
TSOP | TSGTA | TROY AIKMAN | CENTRAL | NODSNCHK | NOLCFCHK | NORESCHK | NOSUBCHK | NOVMDCHK |
|
|
Column | Description |
---|---|
SYSTEM | Name of the LPAR on which the report is generated |
ACID | ACID |
NAME | Name of the ACID |
TYPE | Type of ACID |
DSN | ACID bypasses data sets name checks |
LCF | ACID bypasses LCF restrictions and can run any command on facility |
SUB | ACID can submit all jobs regardless of the ACID specified on the jobcard in the JCL |
VMD | ACID bypasses VM minidisk-level security checking |
VOL | ACID bypasses volume-level security checking |
STC? | If ACID is a started task ACID, *STC* is displayed |
ACIDs > With Non-Expiring Passwords
The ACIDs with Non-Expiring Passwords report lists the following:
System | ACID | Name | Type | LastUsed | Zone | Division | Department |
---|---|---|---|---|---|---|---|
|
|
|
|
|
|
|
|
Column | Description |
---|---|
SYSTEM | Name of the LPAR on which the report is generated |
ACID | ACID |
NAME | Name of ACID |
TYPE | Type of ACID |
LASTUSED | Date ACID was last used |
ZONE | Name of zone the ACID belongs to (ZCA) |
DIVISION | Name of division the ACID belongs to (VCA) |
DEPARTMENT | Name of department the ACID belongs to (DCA) |
ACIDs > With UID(0)
The ACIDs with UID(0) report lists users with UID(0)—that is, users with root accounts (also referred to as superusers).
System | Userid | Name | Default Group | UID(0) |
---|---|---|---|---|
|
|
|
|
|
Column | Description |
---|---|
SYSTEM | Name of the LPAR on which the report is generated |
USERID | ACID |
NAME | Name of ACID |
DEFAULT GROUP | Name of ACID default group |
UID(0) | Full user identifier number of the root account |
Compliance
Click Compliance and select one of the following reports to display information about security violations detected in the z/OS environment:
Access Violations
The Access Violations report lists all security access violations detected in your z/OS environment:
System | Date | Time | Userid | Name | Class | Resource | Volser | Intent | Allowed |
---|---|---|---|---|---|---|---|---|---|
TSOP | 2019-02-19 | 14:29:14 | RSS | RSS STARTED TASK | MQCMDS | QCBA.DISPLAY.SECURITY | Read | None | |
TSOP | 2019-02-19 | 14:29:14 | RSS | RSS STARTED TASK | MQCMDS | QCBB.DISPLAY.SECURITY | Read | None | |
TSOP | 2019-02-19 | 14:00:16 | RSSCHIP | RSS STARTED TASK | MQCMDS | QCBA.DISPLAY.SECURITY | Read | None | |
TSOP | 2019-02-19 | 14:00:16 | RSSCHIP | RSS STARTED TASK | MQCMDS | QCBA.DISPLAY.ARCHIVE | Read | None |
Column | Description |
---|---|
SYSTEM | Name of the LPAR where the violation is detected |
DATE | Event date |
TIME | Event time |
USERID | User ID who caused the violation |
NAME | User ID's name |
CLASS | Class of the resource that generated the violation |
RESOURCE | Resource that generated the violation |
VOLSER | Volume serial number if appropriate |
INTENT | Access 'intent' by the ESM that is being reported on* |
ALLOWED | Access 'allowed' by the ESM that is being reported on* |
*For more information about access (intent and allowed), see the individual documentation for the ESM for which you are running the report.
Allowlists
Many of the SPM queries can exclude results by using allowlists. Allowlists are defined in the index member of the rules data set and consist of exceptions that can be used to prevent specific users or resources from being reported on as non-compliant.
For example, if only one user ID is allowed to update APF libraries, then an allowlist containing that one user ID can be defined, and the compliance query can specify a clause such as:
AND userid NOT IN (SELECT userid FROM allowlist WHERE type='APF')
The allowlist defined would be:
Allowlist APF
TSGAPF Userid allowed to update APF data sets.
For an example of the allowlist, see Sample-index-member.
Compliance Reports
Select Overview to see the Compliance Overview dashboard that is described in Logging-on-and-viewing-compliance-summaries.
Select All to see all the compliance reports defined on the system, including all policies contained in the index member, their last run time, next run time, and result of the run. For more information, see "Examining all compliance reports" and "To run individual reports" in Logging-on-and-viewing-compliance-summaries.
Select one of the following report categories:
- DISA STIG
- z/OS
- DB2
- RACF (RACF users, only)
- TSS (TSS users, only)
- USS
- TCP/IP
- CICS
- REXX
- (SPE2410) (SPE2507)CIS RACF (RACF users, only)
- (SPE2501)PCI DSS RACF (RACF users, only)
The list of categories might change, depending on your system configuration.
If you add a custom category to the HLQ.RULES(INDEX) member and update the rules with the /f stc, loadrules command (or restart the product), the custom category is displayed in the Compliance menu and the All Compliance Reports table. For an example of the index member, see Sample-index-member.
TSS
Click TSS and select the Resources with *ALL* Access > None report to display information about issues on your TSS environment:
System | Class | Resource | Owner | Access |
---|---|---|---|---|
TSOP | CATALOG.HOUSEKP.SHARED | CATALOG. | MASTER | READ |
TSOP | CATALOG.GENERAL.UCAT | CATALOG. | MASTER | READ |
TSOP | CATALOG.SMF.SHARED | CATALOG. | MASTER | READ |
TSOP | CATALOG.ISVS.SHARED | CATALOG. | MASTER | READ |
TSOP | CATALOG.ISVS.UCAT | CATALOG. | MASTER | READ |
Column | Description |
---|---|
SYSTEM | Name of the LPAR on which the report is generated |
CLASS | Name of the class that the resource belongs to |
RESOURCE | Name of the physical or virtual component in the system |
OWNER | Name of the owner of the resource |
ACCESS | Access level permitted by TSS for accessing the resource |