This chapter provides information on Adabas Auditing for z/OS, a selectable unit of Adabas that enables specific Adabas files to be monitored for auditing purposes.
Adabas Auditing helps you to:
Maintain data security and compliance with a simple, powerful
way to track and audit all activity on your Adabas databases.
Maintain full visibility into your database activity while enhancing cybersecurity efforts by detecting unauthorized access.
Track and trace who is accessing, reading and changing your data.
Organizations running Adabas on IBM z/OS have generated valuable information such as financial data, personnel files and proprietary business material over decades.
Common business operations require this data to be accessed regularly by multiple applications, end-users and services.
To maintain security and comply with regulations, you need to know:
Who is reading or changing your data.
Which changes were made.
When were changes made.
Where did the activity occur.
Which applications were used to access your data.
This calls for a solution that delivers efficient and comprehensive ways to track and trace both read and edit activities in your databases.
Adabas Auditing for z/OS tracks and stores audit data safely in secure, indexed, long-term archives, helping you stay on top of data security and compliance regulations, including HIPAA, SOX and GDPR, and to keep your Adabas systems secure and reliable for years to come.
- Audit all Adabas applications
Use Adabas Auditing for z/OS on all Adabas applications, including Natural, COBOL, Assembler, PL/1 and Fortran.
- Track all Adabas database operations
Track and audit all commands for user files on the database including read, search, browsing, insert, delete and update commands for all user files on a database.
- Customize audit tracks
Select your choice of data from many Adabas databases, then apply filters to focus only on relevant Adabas events.
- Protect audit data
Ensure audit data is only available to authorized persons. Prevent alterations to audited data and mask sensitive archived information.
- Archive and retrieve audit data
Retain audit data with long-term archiving capabilities to comply with both regulations and internal standards. Index archived data to quickly retrieve and search data logs.
- Easy-to-use web-based user experience
Enable fast deployment and use by multiple stakeholders including auditors, security officers, and database administrators.
- Enable Database Administrators to track all access and activity on the database
Know what data is being captured or exported. Trace specific users and applications for each event. Resolve data inconsistencies. Fix production outages and provide proper access rights.
- Support Data Protection Officers with infrastructure and tools for security audits
Ensure data is available to external auditors, archived consistently and separately from production data; stored for specific periods to comply with regulations, with access limited to authorized personnel.