IBM OS/390 User Manual

Page of 673
The following books contain planning information for automation and illustrate
sample automated operational scenarios using IBM Systems Management
products:
TME 10 NetView Automation Guide, SC31-8225
Integrated Centralized Automation/Advanced Operation, GG24-2599
Using the products below to support operational tasks will allow you to support
growing workloads, as well as growing numbers of OS/390 images, in an efficient
manner.
TME 10 Operations Planning and Control (TME 10 OPC) automates the
scheduling and (if required) rerun of batch workloads. TME 10 OPC allows
you to define your batch scheduling requirements and will develop a
schedule of when batch applications will run, and where. It will also monitor
the real-time environment and notify you of deviations from the schedule. It
can schedule work across multiple OS/390 images, as well as other
platforms such as AIX, UNIX, Windows NT, and OS/400.
Data Facility Systems Managed Storage/MVS (DFSMS) allows the definition
of data classes and associating data sets with those classes, and will carry
automate data set allocation, migration, and backup actions specified in the
class definitions.
Adstar Distributed Storage Manager (ADSM) allows using OS/390 as a
repository to contain backup and archived data from other operating system
platforms, and to carry out the required backup/archiving actions without
manual intervention.
30.6 Security Management
30.6.1 Overview
Who the valid users of a system are, and what resources they are permitted to
use, are the foundation of security management.
Implementation of an overall system security philosophy requires identification of
system users and the resources they have access to, and what should happen (if
anything) when an unauthorized user attempts access to a secured resource. If
this design is done as the system is being installed and implemented, it is a
series of small increments rather than a major undertaking.
Remember that even in a highly secure system, some users must be trusted.
The security administration processes should be established with adequate
controls and backups.
30.6.2 Tasks
Security management involves the application of security policies through
functions such as:
Policy definition - creation, deletion, and control of security services and
mechanisms.
Monitoring - distribution of security relevant information.
Event or exception reporting - reporting security-relevant events.
468
VSE to OS/390 Migration Workbook