Submit Search
Upload
Pre-Con Ed: CA ACF2 and CA Top Secret – Part 2: Advanced Security Controls
•
0 likes
•
474 views
CA Technologies
Follow
Pre-Con Ed: CA ACF2 and CA Top Secret – Part 2: Advanced Security Controls
Read less
Read more
Technology
Report
Share
Report
Share
1 of 23
Download now
Download to read offline
Recommended
Pre-Con Ed: CA ACF2 and CA Top Secret – Part 1: What’s New in the Enterprise ...
Pre-Con Ed: CA ACF2 and CA Top Secret – Part 1: What’s New in the Enterprise ...
CA Technologies
Pre-Con Ed: Deep Dive into CA Workload Automation ESP 11.4
Pre-Con Ed: Deep Dive into CA Workload Automation ESP 11.4
CA Technologies
Pre-Con Ed: Enterprise Wide Advanced Authentication: Introducing Advanced Aut...
Pre-Con Ed: Enterprise Wide Advanced Authentication: Introducing Advanced Aut...
CA Technologies
Pre-Con Ed: CA Spool Analytics Deep Dive
Pre-Con Ed: CA Spool Analytics Deep Dive
CA Technologies
Pre-Con Ed: CA View and CA Deliver Analytics Deep Dive
Pre-Con Ed: CA View and CA Deliver Analytics Deep Dive
CA Technologies
Pre-Con Ed: Improving Your Response to Events – Performance First Responders
Pre-Con Ed: Improving Your Response to Events – Performance First Responders
CA Technologies
Pre-Con Ed: Ideation: Intelligent Mainframe Management—Understanding Automati...
Pre-Con Ed: Ideation: Intelligent Mainframe Management—Understanding Automati...
CA Technologies
Pre-Con Ed: Bridge the Gap From Alert Suppression to MTTR Through Enterprise ...
Pre-Con Ed: Bridge the Gap From Alert Suppression to MTTR Through Enterprise ...
CA Technologies
Recommended
Pre-Con Ed: CA ACF2 and CA Top Secret – Part 1: What’s New in the Enterprise ...
Pre-Con Ed: CA ACF2 and CA Top Secret – Part 1: What’s New in the Enterprise ...
CA Technologies
Pre-Con Ed: Deep Dive into CA Workload Automation ESP 11.4
Pre-Con Ed: Deep Dive into CA Workload Automation ESP 11.4
CA Technologies
Pre-Con Ed: Enterprise Wide Advanced Authentication: Introducing Advanced Aut...
Pre-Con Ed: Enterprise Wide Advanced Authentication: Introducing Advanced Aut...
CA Technologies
Pre-Con Ed: CA Spool Analytics Deep Dive
Pre-Con Ed: CA Spool Analytics Deep Dive
CA Technologies
Pre-Con Ed: CA View and CA Deliver Analytics Deep Dive
Pre-Con Ed: CA View and CA Deliver Analytics Deep Dive
CA Technologies
Pre-Con Ed: Improving Your Response to Events – Performance First Responders
Pre-Con Ed: Improving Your Response to Events – Performance First Responders
CA Technologies
Pre-Con Ed: Ideation: Intelligent Mainframe Management—Understanding Automati...
Pre-Con Ed: Ideation: Intelligent Mainframe Management—Understanding Automati...
CA Technologies
Pre-Con Ed: Bridge the Gap From Alert Suppression to MTTR Through Enterprise ...
Pre-Con Ed: Bridge the Gap From Alert Suppression to MTTR Through Enterprise ...
CA Technologies
Pre-Con Ed: Streamline Agile Workload Automation Processes for a Repeatable a...
Pre-Con Ed: Streamline Agile Workload Automation Processes for a Repeatable a...
CA Technologies
Pre-Con Ed: CA Workload Automation ESP Edition: SLA Management and Business C...
Pre-Con Ed: CA Workload Automation ESP Edition: SLA Management and Business C...
CA Technologies
Pre-Con Ed: Best Practices: Enabling CA Workload Automation DE Artifacts to M...
Pre-Con Ed: Best Practices: Enabling CA Workload Automation DE Artifacts to M...
CA Technologies
Pre-Con Ed: Best practices for setting up CA Workload Automation ESP Applicat...
Pre-Con Ed: Best practices for setting up CA Workload Automation ESP Applicat...
CA Technologies
Pre-Con Ed: Your Voice Counts! Customer Driven Requirements for CA Workload A...
Pre-Con Ed: Your Voice Counts! Customer Driven Requirements for CA Workload A...
CA Technologies
Pre-Con Ed: CA Testing Tools Educational Session (Part 1 of 3): Learn, Engage...
Pre-Con Ed: CA Testing Tools Educational Session (Part 1 of 3): Learn, Engage...
CA Technologies
Hands-On Lab: CA OPS/MVS and System State Manager
Hands-On Lab: CA OPS/MVS and System State Manager
CA Technologies
Pre-Con Ed: CA OPS/MVS and the Power of Integration
Pre-Con Ed: CA OPS/MVS and the Power of Integration
CA Technologies
Pre-Con Ed: Better Big Data Analytics with CA Workload Automation for Hadoop
Pre-Con Ed: Better Big Data Analytics with CA Workload Automation for Hadoop
CA Technologies
Pre-Con Ed: CA Workload Automation ESP Edition: Hints, Tips and Tricks
Pre-Con Ed: CA Workload Automation ESP Edition: Hints, Tips and Tricks
CA Technologies
Pre-Con Ed: Understanding when and how to use JavaScript at the Event, Applic...
Pre-Con Ed: Understanding when and how to use JavaScript at the Event, Applic...
CA Technologies
CA Gen Updates: Application Modernization and What's New
CA Gen Updates: Application Modernization and What's New
CA Technologies
Pre-Con Ed: CA Workload Automation DE: Tips and Tricks
Pre-Con Ed: CA Workload Automation DE: Tips and Tricks
CA Technologies
Pre-Con Ed: CA Workload Automation DE and ESP Edition: Some Novel Uses for th...
Pre-Con Ed: CA Workload Automation DE and ESP Edition: Some Novel Uses for th...
CA Technologies
Pre-Con Ed: Learn, Engage and Grow with CA Endevor: What's New, What's Ahead
Pre-Con Ed: Learn, Engage and Grow with CA Endevor: What's New, What's Ahead
CA Technologies
Pre-Con Ed: Upgrading CA Workload Automation DE to R12
Pre-Con Ed: Upgrading CA Workload Automation DE to R12
CA Technologies
Pre-Con Ed: Migrating to COBOL 5 and Beyond
Pre-Con Ed: Migrating to COBOL 5 and Beyond
CA Technologies
Pre-Con Ed: Interactive Session: Mainframe & DevOps in your Organization
Pre-Con Ed: Interactive Session: Mainframe & DevOps in your Organization
CA Technologies
Pre-Con Ed: What's New in Service Virtualization V10.0?
Pre-Con Ed: What's New in Service Virtualization V10.0?
CA Technologies
Mainframe Application Modernization for Enterprise Developers
Mainframe Application Modernization for Enterprise Developers
CA Technologies
Tech Tak: Threat Analytics for Privileged Access Management
Tech Tak: Threat Analytics for Privileged Access Management
CA Technologies
Tech Talk: Web Access Management and Federation – Two Great Tastes that Taste...
Tech Talk: Web Access Management and Federation – Two Great Tastes that Taste...
CA Technologies
More Related Content
What's hot
Pre-Con Ed: Streamline Agile Workload Automation Processes for a Repeatable a...
Pre-Con Ed: Streamline Agile Workload Automation Processes for a Repeatable a...
CA Technologies
Pre-Con Ed: CA Workload Automation ESP Edition: SLA Management and Business C...
Pre-Con Ed: CA Workload Automation ESP Edition: SLA Management and Business C...
CA Technologies
Pre-Con Ed: Best Practices: Enabling CA Workload Automation DE Artifacts to M...
Pre-Con Ed: Best Practices: Enabling CA Workload Automation DE Artifacts to M...
CA Technologies
Pre-Con Ed: Best practices for setting up CA Workload Automation ESP Applicat...
Pre-Con Ed: Best practices for setting up CA Workload Automation ESP Applicat...
CA Technologies
Pre-Con Ed: Your Voice Counts! Customer Driven Requirements for CA Workload A...
Pre-Con Ed: Your Voice Counts! Customer Driven Requirements for CA Workload A...
CA Technologies
Pre-Con Ed: CA Testing Tools Educational Session (Part 1 of 3): Learn, Engage...
Pre-Con Ed: CA Testing Tools Educational Session (Part 1 of 3): Learn, Engage...
CA Technologies
Hands-On Lab: CA OPS/MVS and System State Manager
Hands-On Lab: CA OPS/MVS and System State Manager
CA Technologies
Pre-Con Ed: CA OPS/MVS and the Power of Integration
Pre-Con Ed: CA OPS/MVS and the Power of Integration
CA Technologies
Pre-Con Ed: Better Big Data Analytics with CA Workload Automation for Hadoop
Pre-Con Ed: Better Big Data Analytics with CA Workload Automation for Hadoop
CA Technologies
Pre-Con Ed: CA Workload Automation ESP Edition: Hints, Tips and Tricks
Pre-Con Ed: CA Workload Automation ESP Edition: Hints, Tips and Tricks
CA Technologies
Pre-Con Ed: Understanding when and how to use JavaScript at the Event, Applic...
Pre-Con Ed: Understanding when and how to use JavaScript at the Event, Applic...
CA Technologies
CA Gen Updates: Application Modernization and What's New
CA Gen Updates: Application Modernization and What's New
CA Technologies
Pre-Con Ed: CA Workload Automation DE: Tips and Tricks
Pre-Con Ed: CA Workload Automation DE: Tips and Tricks
CA Technologies
Pre-Con Ed: CA Workload Automation DE and ESP Edition: Some Novel Uses for th...
Pre-Con Ed: CA Workload Automation DE and ESP Edition: Some Novel Uses for th...
CA Technologies
Pre-Con Ed: Learn, Engage and Grow with CA Endevor: What's New, What's Ahead
Pre-Con Ed: Learn, Engage and Grow with CA Endevor: What's New, What's Ahead
CA Technologies
Pre-Con Ed: Upgrading CA Workload Automation DE to R12
Pre-Con Ed: Upgrading CA Workload Automation DE to R12
CA Technologies
Pre-Con Ed: Migrating to COBOL 5 and Beyond
Pre-Con Ed: Migrating to COBOL 5 and Beyond
CA Technologies
Pre-Con Ed: Interactive Session: Mainframe & DevOps in your Organization
Pre-Con Ed: Interactive Session: Mainframe & DevOps in your Organization
CA Technologies
Pre-Con Ed: What's New in Service Virtualization V10.0?
Pre-Con Ed: What's New in Service Virtualization V10.0?
CA Technologies
Mainframe Application Modernization for Enterprise Developers
Mainframe Application Modernization for Enterprise Developers
CA Technologies
What's hot
(20)
Pre-Con Ed: Streamline Agile Workload Automation Processes for a Repeatable a...
Pre-Con Ed: Streamline Agile Workload Automation Processes for a Repeatable a...
Pre-Con Ed: CA Workload Automation ESP Edition: SLA Management and Business C...
Pre-Con Ed: CA Workload Automation ESP Edition: SLA Management and Business C...
Pre-Con Ed: Best Practices: Enabling CA Workload Automation DE Artifacts to M...
Pre-Con Ed: Best Practices: Enabling CA Workload Automation DE Artifacts to M...
Pre-Con Ed: Best practices for setting up CA Workload Automation ESP Applicat...
Pre-Con Ed: Best practices for setting up CA Workload Automation ESP Applicat...
Pre-Con Ed: Your Voice Counts! Customer Driven Requirements for CA Workload A...
Pre-Con Ed: Your Voice Counts! Customer Driven Requirements for CA Workload A...
Pre-Con Ed: CA Testing Tools Educational Session (Part 1 of 3): Learn, Engage...
Pre-Con Ed: CA Testing Tools Educational Session (Part 1 of 3): Learn, Engage...
Hands-On Lab: CA OPS/MVS and System State Manager
Hands-On Lab: CA OPS/MVS and System State Manager
Pre-Con Ed: CA OPS/MVS and the Power of Integration
Pre-Con Ed: CA OPS/MVS and the Power of Integration
Pre-Con Ed: Better Big Data Analytics with CA Workload Automation for Hadoop
Pre-Con Ed: Better Big Data Analytics with CA Workload Automation for Hadoop
Pre-Con Ed: CA Workload Automation ESP Edition: Hints, Tips and Tricks
Pre-Con Ed: CA Workload Automation ESP Edition: Hints, Tips and Tricks
Pre-Con Ed: Understanding when and how to use JavaScript at the Event, Applic...
Pre-Con Ed: Understanding when and how to use JavaScript at the Event, Applic...
CA Gen Updates: Application Modernization and What's New
CA Gen Updates: Application Modernization and What's New
Pre-Con Ed: CA Workload Automation DE: Tips and Tricks
Pre-Con Ed: CA Workload Automation DE: Tips and Tricks
Pre-Con Ed: CA Workload Automation DE and ESP Edition: Some Novel Uses for th...
Pre-Con Ed: CA Workload Automation DE and ESP Edition: Some Novel Uses for th...
Pre-Con Ed: Learn, Engage and Grow with CA Endevor: What's New, What's Ahead
Pre-Con Ed: Learn, Engage and Grow with CA Endevor: What's New, What's Ahead
Pre-Con Ed: Upgrading CA Workload Automation DE to R12
Pre-Con Ed: Upgrading CA Workload Automation DE to R12
Pre-Con Ed: Migrating to COBOL 5 and Beyond
Pre-Con Ed: Migrating to COBOL 5 and Beyond
Pre-Con Ed: Interactive Session: Mainframe & DevOps in your Organization
Pre-Con Ed: Interactive Session: Mainframe & DevOps in your Organization
Pre-Con Ed: What's New in Service Virtualization V10.0?
Pre-Con Ed: What's New in Service Virtualization V10.0?
Mainframe Application Modernization for Enterprise Developers
Mainframe Application Modernization for Enterprise Developers
Viewers also liked
Tech Tak: Threat Analytics for Privileged Access Management
Tech Tak: Threat Analytics for Privileged Access Management
CA Technologies
Tech Talk: Web Access Management and Federation – Two Great Tastes that Taste...
Tech Talk: Web Access Management and Federation – Two Great Tastes that Taste...
CA Technologies
Pre-Con Ed: How to IAM-Enable Your Office 365 Environment
Pre-Con Ed: How to IAM-Enable Your Office 365 Environment
CA Technologies
Tech Talk: Forty2.io: Leveraging Machine Learning to Protect Your Web Applica...
Tech Talk: Forty2.io: Leveraging Machine Learning to Protect Your Web Applica...
CA Technologies
The Importance of Mainframe Security Education
The Importance of Mainframe Security Education
CA Technologies
Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...
Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...
CA Technologies
Pre-Con Ed: Governance of Privileged Identities—Key to Breach Prevention
Pre-Con Ed: Governance of Privileged Identities—Key to Breach Prevention
CA Technologies
Simplified Identity Management and Governance from One UI — The CA Identity S...
Simplified Identity Management and Governance from One UI — The CA Identity S...
CA Technologies
The answer is Forty2 - How analytics-backed bot mitigation helped Insilicum
The answer is Forty2 - How analytics-backed bot mitigation helped Insilicum
CA Technologies
Viewers also liked
(9)
Tech Tak: Threat Analytics for Privileged Access Management
Tech Tak: Threat Analytics for Privileged Access Management
Tech Talk: Web Access Management and Federation – Two Great Tastes that Taste...
Tech Talk: Web Access Management and Federation – Two Great Tastes that Taste...
Pre-Con Ed: How to IAM-Enable Your Office 365 Environment
Pre-Con Ed: How to IAM-Enable Your Office 365 Environment
Tech Talk: Forty2.io: Leveraging Machine Learning to Protect Your Web Applica...
Tech Talk: Forty2.io: Leveraging Machine Learning to Protect Your Web Applica...
The Importance of Mainframe Security Education
The Importance of Mainframe Security Education
Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...
Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...
Pre-Con Ed: Governance of Privileged Identities—Key to Breach Prevention
Pre-Con Ed: Governance of Privileged Identities—Key to Breach Prevention
Simplified Identity Management and Governance from One UI — The CA Identity S...
Simplified Identity Management and Governance from One UI — The CA Identity S...
The answer is Forty2 - How analytics-backed bot mitigation helped Insilicum
The answer is Forty2 - How analytics-backed bot mitigation helped Insilicum
Similar to Pre-Con Ed: CA ACF2 and CA Top Secret – Part 2: Advanced Security Controls
Pre-Con Ed: CA Testing Tools Educational Session (Part 3 of 3): CA Mainframe ...
Pre-Con Ed: CA Testing Tools Educational Session (Part 3 of 3): CA Mainframe ...
CA Technologies
Pre-Con Ed: Real-Time Data Audit and Security: Find, Classify and Protect Sen...
Pre-Con Ed: Real-Time Data Audit and Security: Find, Classify and Protect Sen...
CA Technologies
From Fantasy to Reality: Mobile to Mainframe Infrastructure Visibility
From Fantasy to Reality: Mobile to Mainframe Infrastructure Visibility
CA Technologies
Tech Talk: Mainframe Team Center—Event Management and Automation Sneak Peek
Tech Talk: Mainframe Team Center—Event Management and Automation Sneak Peek
CA Technologies
Pre-Con Ed: Achieving Continuous Test & Delivery for Mainframe with CA Applic...
Pre-Con Ed: Achieving Continuous Test & Delivery for Mainframe with CA Applic...
CA Technologies
Pre-Con Ed: The Role of SCM in Agile Development Methodology: CA Endevor Admi...
Pre-Con Ed: The Role of SCM in Agile Development Methodology: CA Endevor Admi...
CA Technologies
Pre-Con Ed: New CA SYSVIEW Features to Quickly & Easily Create Reports
Pre-Con Ed: New CA SYSVIEW Features to Quickly & Easily Create Reports
CA Technologies
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...
CA Technologies
Pre-Con Ed: CA Testing Tools Educational Session (Part 2 of 3): Learn, Engage...
Pre-Con Ed: CA Testing Tools Educational Session (Part 2 of 3): Learn, Engage...
CA Technologies
Securing Mobile Payments: Applying Lessons Learned in the Real World
Securing Mobile Payments: Applying Lessons Learned in the Real World
CA Technologies
Pre-Con Ed: Migrate to CA Release Automation 6.x to Exploit New Features
Pre-Con Ed: Migrate to CA Release Automation 6.x to Exploit New Features
CA Technologies
Pre-Con Ed: Webhooks & Continuous Feedback with CA Application Lifecycle Cond...
Pre-Con Ed: Webhooks & Continuous Feedback with CA Application Lifecycle Cond...
CA Technologies
Introducing New Identity as a Service
Introducing New Identity as a Service
CA Technologies
Vision and Roadmap: CA Roadmap for the Continuous Delivery Portfolio
Vision and Roadmap: CA Roadmap for the Continuous Delivery Portfolio
CA Technologies
Pre-Con Ed: So You Implemented a Service Bus? How Ya' Gonna Test That Monster?
Pre-Con Ed: So You Implemented a Service Bus? How Ya' Gonna Test That Monster?
CA Technologies
Pre-Con Education: Winning at Continuous Delivery with Service Virtualization
Pre-Con Education: Winning at Continuous Delivery with Service Virtualization
CA Technologies
Auto Integrate – DevTest Automation and Integration Best Practices
Auto Integrate – DevTest Automation and Integration Best Practices
CA Technologies
Tech Talk: CA API Gateway: Deploying Docker Container Gateways
Tech Talk: CA API Gateway: Deploying Docker Container Gateways
CA Technologies
CA Project & Portfolio Management Resource Management Best Practices
CA Project & Portfolio Management Resource Management Best Practices
CA Technologies
What's New in CA Agile Requirements Designer?
What's New in CA Agile Requirements Designer?
CA Technologies
Similar to Pre-Con Ed: CA ACF2 and CA Top Secret – Part 2: Advanced Security Controls
(20)
Pre-Con Ed: CA Testing Tools Educational Session (Part 3 of 3): CA Mainframe ...
Pre-Con Ed: CA Testing Tools Educational Session (Part 3 of 3): CA Mainframe ...
Pre-Con Ed: Real-Time Data Audit and Security: Find, Classify and Protect Sen...
Pre-Con Ed: Real-Time Data Audit and Security: Find, Classify and Protect Sen...
From Fantasy to Reality: Mobile to Mainframe Infrastructure Visibility
From Fantasy to Reality: Mobile to Mainframe Infrastructure Visibility
Tech Talk: Mainframe Team Center—Event Management and Automation Sneak Peek
Tech Talk: Mainframe Team Center—Event Management and Automation Sneak Peek
Pre-Con Ed: Achieving Continuous Test & Delivery for Mainframe with CA Applic...
Pre-Con Ed: Achieving Continuous Test & Delivery for Mainframe with CA Applic...
Pre-Con Ed: The Role of SCM in Agile Development Methodology: CA Endevor Admi...
Pre-Con Ed: The Role of SCM in Agile Development Methodology: CA Endevor Admi...
Pre-Con Ed: New CA SYSVIEW Features to Quickly & Easily Create Reports
Pre-Con Ed: New CA SYSVIEW Features to Quickly & Easily Create Reports
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...
Pre-Con Ed: CA Testing Tools Educational Session (Part 2 of 3): Learn, Engage...
Pre-Con Ed: CA Testing Tools Educational Session (Part 2 of 3): Learn, Engage...
Securing Mobile Payments: Applying Lessons Learned in the Real World
Securing Mobile Payments: Applying Lessons Learned in the Real World
Pre-Con Ed: Migrate to CA Release Automation 6.x to Exploit New Features
Pre-Con Ed: Migrate to CA Release Automation 6.x to Exploit New Features
Pre-Con Ed: Webhooks & Continuous Feedback with CA Application Lifecycle Cond...
Pre-Con Ed: Webhooks & Continuous Feedback with CA Application Lifecycle Cond...
Introducing New Identity as a Service
Introducing New Identity as a Service
Vision and Roadmap: CA Roadmap for the Continuous Delivery Portfolio
Vision and Roadmap: CA Roadmap for the Continuous Delivery Portfolio
Pre-Con Ed: So You Implemented a Service Bus? How Ya' Gonna Test That Monster?
Pre-Con Ed: So You Implemented a Service Bus? How Ya' Gonna Test That Monster?
Pre-Con Education: Winning at Continuous Delivery with Service Virtualization
Pre-Con Education: Winning at Continuous Delivery with Service Virtualization
Auto Integrate – DevTest Automation and Integration Best Practices
Auto Integrate – DevTest Automation and Integration Best Practices
Tech Talk: CA API Gateway: Deploying Docker Container Gateways
Tech Talk: CA API Gateway: Deploying Docker Container Gateways
CA Project & Portfolio Management Resource Management Best Practices
CA Project & Portfolio Management Resource Management Best Practices
What's New in CA Agile Requirements Designer?
What's New in CA Agile Requirements Designer?
More from CA Technologies
CA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
CA Technologies
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
CA Technologies
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
CA Technologies
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
CA Technologies
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
CA Technologies
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
CA Technologies
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
CA Technologies
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
CA Technologies
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
CA Technologies
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
CA Technologies
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
CA Technologies
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
CA Technologies
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
CA Technologies
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
CA Technologies
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
CA Technologies
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
CA Technologies
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
CA Technologies
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
CA Technologies
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
CA Technologies
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
CA Technologies
More from CA Technologies
(20)
CA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
Recently uploaded
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
apidays
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Drew Madelung
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Deepika Singh
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
Remote DBA Services
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
DianaGray10
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
Overkill Security
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
apidays
presentation ICT roal in 21st century education
presentation ICT roal in 21st century education
jfdjdjcjdnsjd
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
lior mazor
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Juan lago vázquez
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
debabhi2
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
apidays
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Martijn de Jong
Architecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Edi Saputra
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
Igalia
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
MIND CTI
Recently uploaded
(20)
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
presentation ICT roal in 21st century education
presentation ICT roal in 21st century education
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Architecting Cloud Native Applications
Architecting Cloud Native Applications
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
Pre-Con Ed: CA ACF2 and CA Top Secret – Part 2: Advanced Security Controls
1.
World® ’16 CA ACF2 and CA Top Secret – Part 2: Advanced Security Controls John Pinkowski - Product Owner MFX39EB MAINFRAME AND WORKLOAD AUTOMATION
2.
2 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD For Informational Purposes Only Terms of this Presentation © 2016 CA. All rights reserved. All trademarks referenced herein belong to their respective companies. The presentation provided at CA World 2016 is intended for information purposes only and does not form any type of warranty. Some of the specific slides with
customer references relate to customer's specific use and experience of CA products and solutions so actual results may vary. Certain information in this presentation may outline CA’s general product direction. This presentation shall not serve to (i) affect the rights and/or obligations of CA or its licensees under any existing or future license agreement or services agreement relating to any CA software product; or (ii) amend any product documentation or specifications for any CA software product. This presentation is based on current information and resource allocations as of November 1, 2016, and is subject to change or withdrawal by CA at any time without notice. The development, release and timing of any features or functionality described in this presentation remain at CA’s sole discretion. Notwithstanding anything in this presentation to the contrary, upon the general availability of any future CA product release referenced in this presentation, CA may make such release available to new licensees in the form of a regularly scheduled major product release. Such release may be made available to licensees of the product who are active subscribers to CA maintenance and support, on a when and if- available basis. The information in this presentation is not deemed to be incorporated into any contract.
3.
3 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Abstract More than 70 percent of corporate mission-essential data resides on the mainframe. Do you have enough security controls in place to protect it? This session will do a deep dive into the most granular configuration and security controls of CA Top Secret® and CA ACF2™, and provide a walk-through of why it's absolutely necessary to implement granular security in mainframe environments. John Pinkowski CA Technologies
4.
4 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Agenda CASECAUT RESOURCE CLASS NEW GENCERT GRANULARITY CONTROLS 1 2
5.
5 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD What Is CASECAUT?
6.
6 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD The CASECAUT Resource § CA ACF2 r15 introduced the new pre=defined resorruce
clas of CASECAUT. The internal CLASSMAP record with TYPE=AUT. § CA Top Secret r15 introduced the new resource definition table (RDT) class of CASECAUT.
7.
7 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD The CASECAUT Resource § Supplements existing administrative authorities by providing the ability to authorize users to perform administrative functions over passwords, password fields, and certificates without adding any high-level privileges to the user. §
To granularly control administrative functions in order to prevent users from performing administration tasks that they should not be authorized to do. For instance, modifying the passwords for user ID’s outside of their scope, like a high- level security admin. Conversely, CASECAUT can be used to allow certain administrative functions for use by an ID while blocking others. For instance, allowing a Help-Desk administrator to modify another user’s password, but not change any of the password requirements, like number of special characters required.
8.
8 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD What Can I Control?
9.
9 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Changing Password Fields (CA Top Secret) The following shows the authorizations needed to change password-related fields: Field Name CASECAUT Entity Name
Applicable Commands for cmd Qualifier ASUSPEND TSSCMD.USER.cmd.ASUSPEND REMOVE KERBVIO TSSCMD.USER.cmd.KERBVIO REMOVE NOPW TSSCMD.USER.cmd.NOPW CREATE, ADDTO, or REMOVE NOPWCHG TSSCMD.USER.cmd.NOPWCHG CREATE, ADDTO, or REMOVE PASSWORD TSSCMD.USER.cmd.PASSWORD CREATE, ADDTO, or REPLACE PHRASE TSSCMD.USER.cmd.PHRASE CREATE, ADDTO, or REPLACE PSUSPEND TSSCMD.USER.cmd.PSUSPEND ADDTO or REMOVE SUSPEND TSSCMD.USER.cmd.SUSPEND CREATE, ADDTO, or REMOVE VSUSPEND TSSCMD.USER.cmd.VSUSPEND ADDTO or REMOVE XSUSPEND TSSCMD.USER.cmd.XSUSPEND ADDTO or REMOVE
10.
10 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD NEWPW Restrictions (CA Top Secret) The following shows the authorizations needed to bypass PWADMIN NEWPW restrictions: Field Name CASECAUT Entity Name
Applicable Commands for cmd Qualifier PASSWORD(newpw) TSSCMD.USER.cmd.PWADMIN.NO CREATE, ADDTO, or REPLACE PASSWORD(newpw) TSSCMD.USER.cmd.PWADMIN.EXP CREATE, ADDTO, or REPLACE PASSWORD(newpw) TSSCMD.USER.cmd.PWADMIN.INT CREATE, ADDTO, or REPLACE PASSWORD(newpw) TSSCMD.USER.cmd.PWADMIN.ZEROINT CREATE, ADDTO, or REPLACE PASSWORD(newpw) TSSCMD.USER.cmd.PWADMIN.HISTBYP ADDTO or REPLACE
11.
11 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Digital Certificate and Keyring Commands (CA Top Secret) The following shows the authorizations needed to issue digital certificate and keyring-related commands: Command CASECAUT Entity Name ADD
TSSCMD.CERTUSER.ADDTO CHKCERT TSSCMD.CERTUSER.CHKCERT EXPORT TSSCMD.CERTUSER.EXPORT GENCERT TSSCMD.CERTUSER.GENCERT GENREQ TSSCMD.CERTUSER.GENREQ P11TOKEN TSSCMD.DIGTCRT.P11TOKEN.tokencmd REKEY TSSCMD.CERTUSER.REKEY REMOVE TSSCMD.CERTUSER.REMOVE ROLLOVER TSSCMD.CERTUSER.ROLLOVER
12.
12 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Running Utilities (CA Top Secret) The following shows the authorizations needed to execute TSS batch utilities: Utility CASECAUT Entity Name TSSXTEND
CASECAUT(TSSUTILITY.TSSXTEND) TSSFAR CASECAUT(TSSUTILITY.TSSFAR) TSSAUDIT CASECAUT(TSSUTILITY.TSSAUDIT) TSSCHART CASECAUT(TSSUTILITY.TSSCHART) TSSUTIL CASECAUT(TSSUTILITY.TSSUTIL) TSSSIM CASECAUT(TSSUTILITY.TSSSIM) TSSCFILE CASECAUT(TSSUTILITY.TSSCFILE) TSSTRACK CASECAUT(TSSUTILITY.TSSTRACK)
13.
13 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Controlling Password/Password Field Administration (CA ACF2) Field Name CASECAUT Resource
Name PASSWORD ACFCMD.USER.PASSWORD PWPHRASE ACFCMD.USER.PWPHRASE PWP-VIO ACFCMD.USER.PWP-VIO PSWD-VIO ACFCMD.USER.PSWD-VIO PSEDCVIO ACFCMD.USER.PSWDCVIO KERB-VIO ACFCMD.USER.KERB-VIO CANCEL ACFCMD.USER.CANCEL SUSPEND ACFCMD.USER.SUSPEND
14.
14 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Controlling Certificate Administration (CA ACF2) Certificate Command
Resource Names CHKCERT ACFCMD.DIGTCERT.CHKCERT CHANGE ACFCMD.DIGTCERT.ALTER CONNECT ACFCMD.DIGTCERT.CONNECT DELETE ACFCMD.DIGTCERT.DELETE EXPORT ACFCMD.DIGTCERT.EXPORT EXPORT (KEYRING) ACFCMD.DIGTCERT.EXPORTKEY GENCERT ACFCMD.DIGTCERT.GENCERT GENREQ ACFCMD.DIGTCERT.GENREQ
15.
15 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Controlling Certificate Administration (CA ACF2) Certificate Command
Resource Names INSERT ACFCMD.DIGTCERT.ADD INSERT (CERTMAP) ACFCMD.DIGTCERT.ADDMAP INSERT (KEYRING) ACFCMD.DIGTCERT.ADDRING LIST ACFCMD.DIGTCERT.LIST P11TOKEN BIND ACFCMD.DIGTCERT.P11TOKEN.BIND P11TOKEN IMPORT ACFCMD.DIGTCERT.P11TOKEN.IMPORT P11TOKEN UNBIND No CASECAUT auth’s required. REKEY ACFCMD.DIGTCERT.REKEY
16.
16 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Controlling Certificate Administration (CA ACF2) Certificate Command
Resource Names REMOVE ACFCMD.DIGTCERT.REMOVE RENEW ACFCMD.DIGTCERT.RENEW ROLLOVER ACFCMD.DIGTCERT.ROLLOVER
17.
17 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD New GENCERT Granularity controls
18.
18 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Granular Certificate Administration To Turn On/Off Granular Administration
19.
19 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Granular Certificate Administration § New Certificate/Key ring Administration –
Use RDATALIB class – Access is given to specific certificate/key ring – Rules can be masked – Scoping can be used to restrict access further – Similar rules used by R_datalib callable service (DataPut, DataRemove)
20.
20 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Questions?
21.
21 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Recommended Sessions SESSION # TITLE
DATE/TIME/ROOM MFX119S Encryption and Hashing and Keys – Oh, my! 11/16/2016 at 1:45pm Jasmine E MFX118S How is Buying a Home Like Justifying Data Security Investments? Developing Return on Security Investment (ROSI) Analysis 11/16/2016 at 3:00pm Jasmine E MFX173S The Importance of Mainframe Security Education 11/16/2016 3:45pm Jasmine E MFX172S The Key to Complying With New Regulations and Standards: Comprehensive Mainframe Security 11/16/2016 at 4:30pm Jasmine E MFT174S Mainframe Security Strategy and Roadmap: Best Practices for Protecting Mission Essential Data 11/17/2016 12:45pm Mainframe Theater MFT175S Gaps in Your Defense: Hacking the Mainframe 11/17/2016 3:00pm Mainframe Theater
22.
22 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Must See Tech Talks and Demos – Expo Floor MFT53T How Can Mainframe Security be Made Easier? 11/16/2016 @ 12:45pm Mainframe Theater Mainframe Security and Enterprise Security Demos SCT38T
SCX05E PAM Threat Analytics 11/17/2016 @ 4:00pm Security Theater Governing Your Privileged Users 11/16/2016 @ 3:45pm Security Theater
23.
23 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Thank you. Stay connected at communities.ca.com
Download now