HORIZONT z/OS

IWS/Audit Modernization Guide

BatchChange Management

IWS/Audit is a batch product by HORIZONT. Explore technical details, modernization strategies, and migration paths below.

Product Overview

IWS/Audit is a tool designed to audit and report on changes made to IBM Workload Scheduler (IWS) configurations.

By providing a detailed audit trail, IWS/Audit allows you to track who changed what, when, and how within your IWS setup. Consider using IWS/Audit if you need to: * Comply with internal policies or external regulations. * Troubleshoot configuration-related issues in IWS. * Maintain a clear audit trail for security and compliance purposes. IWS/Audit integrates directly with IWS and z/OS security subsystems to provide a comprehensive auditing solution.

Modernization Strategies

Rehost

Timeline:
6-12 months

Lift-and-shift to cloud infrastructure with minimal code changes. Fast migration with lower risk.

Refactor (Recommended)

Timeline:
18-24 months

Optimize application architecture for cloud while preserving business logic. Best ROI long-term.

Replatform

Timeline:
3-5 years

Complete rewrite to cloud-native architecture with microservices and modern tech stack.

Frequently Asked Questions

General

What does IWS/Audit do?

IWS/Audit is a tool designed to monitor and report on modifications made to IBM Workload Scheduler configurations. It provides an audit trail of changes, helping organizations maintain control and compliance over their workload automation environment.

Is this a system, application, or tool?

IWS/Audit is a tool set that enhances the auditing capabilities of IBM Workload Scheduler. It is not a system or application in itself, but rather a specialized utility that provides detailed reporting and tracking of configuration changes within the IWS environment.

What types of organizations use this?

Organizations that rely on IBM Workload Scheduler for their batch processing and job scheduling needs, particularly those in regulated industries or with strict compliance requirements, would benefit from IWS/Audit. These organizations often need to track and audit changes to their workload definitions and scheduling parameters.

When should we consider IWS/Audit?

A company should consider using IWS/Audit when they need to maintain a clear audit trail of changes made to their IBM Workload Scheduler environment. This is especially important for organizations that need to comply with internal policies, industry regulations, or external audit requirements.

What are the alternatives to IWS/Audit?

Alternatives to IWS/Audit include manual tracking of changes, custom scripting for auditing, or other third-party auditing tools. However, IWS/Audit is specifically designed for IBM Workload Scheduler, offering deeper integration and more comprehensive reporting capabilities than generic solutions.

Technical

What infrastructure is required?

IWS/Audit requires an existing IBM Workload Scheduler environment. It runs on z/OS and depends on the IWS infrastructure for accessing and monitoring configuration data. It may also require access to security subsystems like RACF, ACF2, or Top Secret for user authentication and authorization.

For mainframe products: Does this run in an LPAR?

Yes, IWS/Audit runs in an LPAR on z/OS. It is z/OS dependent and integrates with the operating system's security and logging facilities. It requires access to the IWS controller and database to monitor and report on configuration changes.

How does IWS/Audit integrate with IBM Workload Scheduler?

IWS/Audit integrates with IBM Workload Scheduler by monitoring its configuration files and database. It captures changes made through the IWS user interface or command-line tools. It then generates reports and audit trails based on these changes.

What configuration files are used by IWS/Audit?

IWS/Audit uses configuration files to define the scope of auditing, reporting parameters, and user access controls. These files specify which IWS objects and attributes to monitor, how to format reports, and which users have permission to access the audit data.

Business Value

What business value does IWS/Audit provide?

IWS/Audit provides business value by ensuring the integrity and compliance of IBM Workload Scheduler environments. It helps organizations track changes, identify potential issues, and maintain control over their workload automation processes. This reduces the risk of errors, downtime, and non-compliance penalties.

What happens if an organization does NOT use this product?

Without IWS/Audit, organizations may struggle to maintain an accurate audit trail of changes made to their IBM Workload Scheduler configurations. This can lead to difficulties in troubleshooting problems, complying with regulations, and demonstrating control over their workload automation environment. It increases the risk of errors and non-compliance.

How does IWS/Audit help with compliance?

IWS/Audit helps organizations meet compliance requirements by providing a detailed audit trail of changes made to their IBM Workload Scheduler environment. This audit trail can be used to demonstrate adherence to internal policies, industry regulations, and external audit standards. It simplifies the compliance process and reduces the risk of penalties.

Security

What authentication methods are supported?

IWS/Audit supports authentication methods provided by z/OS security subsystems such as RACF, ACF2, and Top Secret. It leverages these systems to verify user identities and control access to audit data and reporting functions. This ensures that only authorized personnel can access sensitive information.

What access control model is used?

IWS/Audit uses an access control model based on roles and permissions. It allows administrators to define roles with specific privileges, such as viewing audit data, generating reports, or configuring auditing parameters. Users are then assigned to these roles, granting them the appropriate level of access.

What encryption is used and where?

IWS/Audit encrypts sensitive data, such as user credentials and audit logs, using industry-standard encryption algorithms. This protects the data from unauthorized access and ensures its confidentiality. The encryption keys are managed securely to prevent compromise.

What audit/logging capabilities exist?

IWS/Audit provides comprehensive audit logging capabilities. It logs all user activity, configuration changes, and access attempts. These logs can be used to track user behavior, identify security breaches, and investigate suspicious activity. The logs are stored securely and can be used for forensic analysis.

Operations

How is this product typically deployed?

IWS/Audit is typically deployed on-premise, alongside the IBM Workload Scheduler environment. It requires installation on a z/OS system with access to the IWS controller and database. The implementation process involves configuring the auditing parameters, defining user roles, and setting up reporting schedules.

What level of technical expertise is required to implement it?

Implementing IWS/Audit requires a moderate level of technical expertise. Personnel familiar with z/OS, IBM Workload Scheduler, and security subsystems like RACF, ACF2, or Top Secret are needed. They should understand how to configure the auditing parameters, define user roles, and generate reports.

What ongoing operational requirements exist?

Ongoing operational requirements for IWS/Audit include monitoring the audit logs, reviewing reports, and maintaining the configuration parameters. Regular maintenance is needed to ensure the accuracy and completeness of the audit data. Staffing requirements depend on the size and complexity of the IWS environment.

What are common implementation challenges?

Common implementation challenges include configuring the auditing parameters correctly, defining appropriate user roles, and ensuring the performance of the IWS environment is not negatively impacted. It is important to carefully plan the implementation and test the configuration thoroughly before deploying it to production.

Ready to Start Your Migration?

Download our comprehensive migration guide for IWS/Audit or calculate your ROI.

Calculate ROI