RSM Enterprise Solutions z/OS

exceptionReporter Modernization Guide

AdministrationSecurityReport Generation and Management

exceptionReporter is a administration product by RSM Enterprise Solutions. Explore technical details, modernization strategies, and migration paths below.

Product Overview

exceptionReporter automates the creation of security reports on z/OS systems, leveraging RACF data to identify potential vulnerabilities and security exceptions.

It uses RACF for authentication and authorization.

Modernization Strategies

Rehost

Timeline:
6-12 months

Lift-and-shift to cloud infrastructure with minimal code changes. Fast migration with lower risk.

Refactor (Recommended)

Timeline:
18-24 months

Optimize application architecture for cloud while preserving business logic. Best ROI long-term.

Replatform

Timeline:
3-5 years

Complete rewrite to cloud-native architecture with microservices and modern tech stack.

Frequently Asked Questions

General

What is the primary function of exceptionReporter?

exceptionReporter automates the generation of security reports based on z/OS RACF data. It identifies security exceptions and vulnerabilities, delivering reports via email or other channels.

What data sources does exceptionReporter use?

exceptionReporter uses RACF data as its primary source. It analyzes RACF configurations, user profiles, and access permissions to identify potential security risks.

How are reports delivered?

Reports can be delivered via email, stored in datasets, or integrated with other security information and event management (SIEM) systems. The specific delivery method is configurable.

Can reports be customized?

exceptionReporter supports customization of report content and format. Users can define specific criteria for identifying exceptions and tailor the report layout to meet their needs.

Technical

What configuration files are used by exceptionReporter?

exceptionReporter uses configuration files to define report parameters, data sources, and delivery methods. These files are typically stored as datasets on z/OS.

Does exceptionReporter have an API?

exceptionReporter does not expose a public API. Integration with other systems is typically achieved through report delivery to shared datasets or SIEM solutions.

What are the main system components?

The main components include the report generation engine, the RACF data extraction module, and the report delivery module. These components communicate through internal z/OS mechanisms.

What databases or storage mechanisms are used?

exceptionReporter uses z/OS datasets for storing configuration files, report output, and log data. VSAM datasets may be used for storing historical data.

Business Value

How does exceptionReporter provide business value?

exceptionReporter helps organizations identify and remediate security vulnerabilities in their z/OS environment. This reduces the risk of security breaches and data loss.

How does it reduce manual effort?

By automating report generation, exceptionReporter reduces the manual effort required to monitor security compliance. This frees up security personnel to focus on other critical tasks.

How does it help with compliance?

exceptionReporter provides detailed reports that can be used to demonstrate compliance with industry regulations and internal security policies.

How does it improve decision-making?

The reports generated by exceptionReporter provide valuable insights into the security posture of the z/OS environment, enabling informed decision-making and proactive risk management.

Security

How does exceptionReporter ensure security?

exceptionReporter leverages the security features of z/OS and RACF. It relies on RACF for authentication and authorization, ensuring that only authorized users can access security reports.

What access control model is used?

exceptionReporter supports role-based access control (RBAC). Access to reports and configuration options can be restricted based on user roles.

Is data encrypted?

exceptionReporter does not encrypt report data by default. However, reports can be stored in encrypted datasets using z/OS encryption facilities.

What audit/logging capabilities exist?

exceptionReporter provides audit logging of report generation activities and configuration changes. These logs can be used to track user activity and identify potential security breaches.

Operations

How is exceptionReporter administered?

exceptionReporter is administered through z/OS TSO/ISPF panels. These panels provide a user-friendly interface for configuring report parameters, scheduling report generation, and managing user access.

How is user management handled?

User management is handled through RACF. exceptionReporter relies on RACF for user authentication and authorization.

What are the main configuration parameters?

Key configuration parameters include report selection criteria, output dataset names, email distribution lists, and scheduling parameters. These parameters are defined in configuration files.

What monitoring/logging capabilities exist?

exceptionReporter provides logging of report generation activities and errors. These logs are stored in z/OS datasets and can be used for troubleshooting and monitoring.

Ready to Start Your Migration?

Download our comprehensive migration guide for exceptionReporter or calculate your ROI.

Calculate ROI