Implementing RACF Security for CICS/ESA and CICS/TS
This course teaches how to implement security for CICS systems using RACF as an external security manager. The lecture material will first explain the implementation tasks for a CICS system in a single region, and then extend to CICS systems in multiple regions connected to an MRO or ISC. In the class, you will learn both the CICS and RACF definitions necessary to establish effective security controls for CICS. You will learn how to:
Issues
-
Identify tasks to be performed in RACF and CICS to implement safeguards
-
Develop a detailed plan for implementing RACF security features in CICS systems
-
Implementation of RACF-based security for CICS in single-system environments and CICS inter-system communications (MRO and ISC)
-
Create definitions in RACF and CICS to protect transactions, CICS resources and SPI commands
-
Secure CICS system resources so that only CICS has access and others, such as TSO users or batch jobs, are denied access
-
Defining users of CICS terminals in RACF and limiting the CICS regions to which they can log in
-
Control access to individual CICS transactions, CICS application resources used by those transactions, CICS SPI commands in transactions, and resources defined by the installation to meet application security requirements
-
Using RACF to secure access to CICS from other platforms through Advanced Program-to-Program Communication (APPC) connections
-
Identify key areas that need to be secured in the CICSPlex System Manager
Who is this training for?
Prerequisites
- RACF (perhaps as a security administrator) **or** CICS (perhaps as a member of the CICS technical support staff).
Training program
Day 1
- Welcome, course introduction and administration
- Unit 1 - CICS Overview
- Exercise 1 - Getting acquainted with CICS
- Unit 2 - RACF Overview
- Exercise 2 - Getting to know the RACF
Day 2
- Laboratory review of unit 2
- Unit 3 - Protection of the CICS region
- Exercise 3 - Protecting the CICS region
- Unit 4 - Login Security
- Exercise 4 - Login security
Day 3
- Unit 5 - Security of transactions
- Exercise 5 - Security of transactions
- Unit 6 - Security of CICS resources and SPI commands.
- Exercise 6 - Security of CICS resources and SPI commands
Day 4
- Unit 7 - Security of connections and links between CICS
- Unit 8 - Security of conversations between CICS
Day 5
- Laboratory review
- Unit 9 - Securing CICSPlex SM
- Unit 10 - Implementation Planning
- Unit 11 - CICS and DB2 security
- Unit 12 - CICS Network Services Security
Delivery Methods
Online
- Convenience of participating from anywhere
- Interactive live sessions with trainer
- Materials available for 30 days
- No travel costs
On-site
- Direct contact with trainer and group
- Intensive hands-on workshops
- Networking with other participants
- Full focus on learning
Frequently asked questions
What are the prerequisites for this training?
For Implementing RACF Security for CICS/ESA and CICS/TS we recommend: RACF (perhaps as a security administrator) **or** CICS (perhaps as a member of the CICS technical support staff)..
What is the format and duration of this training?
The training lasts 5 days and is available in online and on-site format. Sessions run from 9:00 AM to 4:00 PM. We can also customize the schedule to fit your team's needs.
Who is this training designed for?
This training is designed for: The course is designed for CICS security and support personnel who are responsible for designing, implementing or administering RACF security on CICS Transaction Server systems.
Request a quote
Funding Options
Check funding options for your company
Development Services Database
Up to 80% funding for SMEs from EU funds
Check availabilityNational Training Fund
Up to 100% funding for employers
Learn moreTrusted by
We train teams at Poland's largest companies
Interested in this training?
Contact us - we'll prepare an offer tailored to your organization's needs.