SSR (Smart Security Reporter)

Creates Summary and Detail Security Reports from Data Obtained from the RACF Database

If you are relying on home grown reports, are forced to pay for programming or if you don't have the time to make the changes, then SSR will save you money.

  • OVERVIEW
    OVERVIEW
    OVERVIEW
    OVERVIEW
    OVERVIEW
    OVERVIEW
  • AT-A-GLANCE
    AT-A-GLANCE
    AT-A-GLANCE
    AT-A-GLANCE
    AT-A-GLANCE
    AT-A-GLANCE
  • REQUIREMENTS
    REQUIREMENTS
    REQUIREMENTS
    REQUIREMENTS
    REQUIREMENTS
    REQUIREMENTS

OVERVIEW

SSR is designed for the busy RACF security administrator and auditor. You need information on a regular basis and you need to be able to quickly research details whenever a crisis develops. With the demanding pressure placed on today's RACF security team, SSR helps in five ways:

Risk Identification.

Focus on specific users or critical resources to review successful accesses and violations.

Security Monitoring.

Logon/logoff frequency, time of day usage or originating terminal can pinpoint unusual activity worth investigating.

Regular Vigilance.

Each day you can quickly review invalid logon attempts and violations on attempted resource access.

Verification.

Reviewing the RACF command usage to study activity and validity of commands issued – especially critical if you have multiple or remote administrators.

Tracking and Control.

For the application owner to spot potential misuse, tracking and analyzing successful accesses to resources is critical.

AT-A-GLANCE

  • Auto submit requests
  • Auto submit commands
  • History and purging automation is built-in.

REQUIREMENTS

  • Mainframe
    IBM z/Architecture and compatible
  • Operating System
    z/OS
  • Host System
    RACF