S 2.296 Basic factors to consider with z/OS-transaction monitors

Initiation responsibility: Head of IT, IT Security Officer

Implementation responsibility: Administrator

The use of transaction monitors must be planned in detail and secured by means of appropriate mechanisms. As an aid, this safeguard describes some recommendations in an overview that have proved to be successful regarding the operation of transaction monitors from an information security point of view. Depending on the operational scenario, further specific planning and security mechanisms are normally required that cannot be detailed here. The database share of IMS is not considered within the framework of this safeguard in particular.

Transaction monitors are used on mainframe systems for online operations. They provide the users with access to their desired data using downstream database systems in dialogue operations. One of the core tasks of the transaction monitor is to ensure that the following conditions are met:

These conditions are applicable to both the online operations and transactions performed in batch mode.

Today, transaction monitors are normally used in a so-called three-tier configuration (presentation, application logic, data storage) and normally cover the following core functions:

Amongst other things, IMS TM (Information Management System Transaction Monitor) or CICS (Customer Information Control System) are used as transaction monitors. The IMS-internal DB part, VSAM databases (Virtual System Access Method), or DB2 (Database 2) are available for IMS as database system. For CICS, VSAM, IMS DB, or DB2 can be used as database system.

Even if the transaction monitors and database systems sometimes still offer proprietary protection systems for historical reasons, today a security system such as RACF (Resource AccessControl Facility) is usually used additionally. RACF allows for implementing authentication of the user, protection of the transactions, and access control to the data elements.

General considerations

The transaction monitors IMS TM and CICS are pure VTAM applications in terms of their historical development. They were initially designed for internal networks. Over the course of the past years, advanced interfaces have been provided due to the increasing importance of the internet. These make it possible to also allow accesses to applications of these transaction monitors from the internet.

The following recommendations are applicable to the entire field of transaction monitors and include the databases:

IMS TM (transaction monitor, previously referred to as DC)

The following recommendations are applicable to the IMS transaction monitor. Depending on the operational scenario, further security mechanisms are normally required.

CICS

The following recommendations are applicable to the CICS transaction monitor. Depending on the operational scenario, additional security mechanisms are normally required. More detailed information can be found in the IBM documentation CICS RACF Security Guide:

DB2

The following recommendations are applicable to the DB2 database system. Depending on the operational scenario, additional security mechanisms are normally required. More detailed information can be found in the IBM documentation DB2 UDB Administration Guide:

Review questions: