CA Top Secret for z/OS ® At a Glance

DATA SHEET
CA Top Secret® for z/OS
At a Glance
CA Top Secret® for z/OS (CA Top Secret) provides innovative, comprehensive security for your business transaction
environments, including z/OS®, UNIX and Linux® on System z—helping your business realize the reliability, scalability
and cost-effectiveness of the mainframe. Administrative tools, extensive reporting options, online monitoring and
automatic logging capabilities accompany CA Top Secret to secure your environment while enabling comprehensive
auditing and controlled sharing of data and resources.
Key Benefits/Results
• Improves efficiency by providing
streamlined administrative functions
• Simplifies the tasks associated with
maintaining compliance
• Reduces the cost of securing your systems
• Strengthens security and reduces risks
across your enterprise
Key Features
• Comprehensive, easy-to-use, rolebased security. CA Top Secret provides
comprehensive security for z/OS resources
across operating systems, subsystems, OEM
software and databases.
• Data and resource management. CA Top
Secret is designed to protect data sets and
selected resource classes by default or once
ownership has been established.
• Auditing and monitoring. CA Top Secret
includes a variety of audit functions that
provide information and capabilities to
help you monitor access and access rights.
• Separation of administrative functions.
CA Top Secret provides separation of security
administration functions and duties as well
as an additional management control that
safeguards your systems.
Business Challenges
Today, organizations view technology as a strategic resource and seek to gain competitive
advantage by providing easier, faster and more reliable access to products and services.
However, there is increased concern about the security issues that arise when valuable
mainframe data is accessible to the outside world. Thus, a secure, reliable and costeffective security infrastructure is essential for the execution of today’s business strategies.
Many organizations are also required to comply with government regulations, and existing
corporate policies and industry agreements. In addition, with the continuous introduction of
new technologies for the mainframe, new security and compliance, problems will continue
to evolve. To stay abreast of today’s challenges, organizations must strengthen security,
streamline administration and provide enhanced auditing and compliance capabilities.
Solution Overview
CA Top Secret is designed to protect your mainframe computer systems and data by
controlling access to resources. It closely maps security to how you manage your
organization by using a flexible configuration mechanism unique to CA that automatically
associates users to one or more roles. CA Top Secret delivers out-of-the-box access control
software for z/OS operating systems, which includes interfaces for CICS®, z/OS Unix
(formerly known as OMVS) and IMS™ (and an optional add-on for DB2®). Its mechanisms
provide flexibility and control to help you monitor and adjust your security policies and
accommodate virtually all organizational structures.
CA TOP SECRET FOR z/OS
Critical Differentiators
Release 12.0 Key Features:
Because individual accountability is
the key to effective information security,
CA Top Secret lets you decide what policies
are relevant and implement those
structures. It provides easy-to-use, rolebased administration functions that adapt
to your organization’s structure and
procedures to support compliance with
regulations and laws.
New Utility and Documentation for Enhanced Role-based Security. Easier administration.
CA Top Secret delivers several ways for
you to separate security administration
functions, providing different levels of
administrative authority (privileges) over
your users and resources. It can scope
or limit privileges to discrete security
functions, areas or resources. Users are
protected by a password, and consistent
password policies are enforced throughout
your organization, increasing information
security.
CA Top Secret works with other solutions to
provide comprehensive information security
across your network, and it generates audit
records for virtually any security-related
event. It provides a comprehensive set of
reports that enable you to view and analyze
your security event information. It also
enables you to limit the output of a
particular report according to the privileges
and restrictions of the specific user.
1. A RENEW command to simplify the administration of renewing certificates that are
defined on the Top Secret database
2. Expanded size limits of the IDN/SDN extensions
3. Certificate Utility now displays all Certificate extensions
Restricted Administrative Privileges. The ability to create “limited” security officers. For
example, ‘helpdesk’ personnel can be created who only administer password resets and
password-related fields, or users who are only authorized to issue digital certificate related
commands.
Administrative Archive. The ability to automatically generate archival commands during a
security administrator’s list or removal of a user. The user security record with all associated
user profile data as well as all profiles the user is associated with are captured and
commands are generated that can be used to restore the user to an original status if
needed.
User Modeling. The ability to automatically model one user to create another, including
user profile information, permissions and profiles. This can be extremely useful when users
switch roles or new users are created.
Virtual Storage Constraint Relief. Improved storage utilization and increased performance
through exploitation of above-the-bar 64-bit storage.
Serviceability. Additional diagnostic capabilities help CA Support identify product release
and maintenance status.
Related Products/Solutions
•CA Chorus™ for Security and Compliance Management. Reduce the time and effort required
to more securely manage the mainframe environment and enable faster issue resolution.
•CA Cleanup for z/OS. Easily automate continuous and unattended security file cleanup.
•CA Auditor for z/OS. Help identify and control z/OS security exposures.
•CA ACF2 Option for DB2 for z/OS. Provides protection against unauthorized destruction,
disclosure, or modification of DB2 data and protects DB2 resources by default using
standard ACF2 syntax.
For more information, please visit ca.com/mainframe-security
CA Technologies (NASDAQ: CA) creates software that fuels transformation for companies and enables them to seize the opportunities
of the application economy. Software is at the heart of every business, in every industry. From planning to development to
management and security, CA is working with companies worldwide to change the way we live, transact and communicate – across
mobile, private and public cloud, distributed and mainframe environments. Learn more at ca.com.
Copyright © 2014 CA. All rights reserved. All trademarks, trade names, service marks and logos referenced herein belong to their respective companies. z/OS is a trademark of International Business Machines Corporation in
the United States, other countries, or both. This document is for your informational purposes only. CA assumes no responsibility for the accuracy or completeness of the information. To the extent permitted by applicable
law, CA provides this document ‘‘as is’’ without warranty of any kind, including, without limitation, any implied warranties of merchantability, fitness for a particular purpose, or non-infringement. In no event will CA be liable
for any loss or damage, direct or indirect, from the use of this document, including, without limitation, lost profits, business interruption, goodwill or lost data, even if CA is expressly advised in advance of the possibility of
such damages.
CS200-94743_1014