SQL/AF Modernization Guide
SQL/AF is a report generation and management product by Software Product Research. Explore technical details, modernization strategies, and migration paths below.
Product Overview
SQL/AF is a tool set designed to audit access to DB2 databases running on z/VM and z/VSE operating systems.
It helps organizations maintain a secure environment by providing detailed audit trails of data access.
Modernization Strategies
Rehost
- Timeline:
- 6-12 months
Lift-and-shift to cloud infrastructure with minimal code changes. Fast migration with lower risk.
Refactor (Recommended)
- Timeline:
- 18-24 months
Optimize application architecture for cloud while preserving business logic. Best ROI long-term.
Replatform
- Timeline:
- 3-5 years
Complete rewrite to cloud-native architecture with microservices and modern tech stack.
Frequently Asked Questions
General
What does SQL/AF do?
SQL/AF is a tool designed to audit access to DB2 tables in z/VM and z/VSE environments. It monitors and reports on who is accessing what data, providing a detailed record of database activity. This helps organizations meet compliance requirements and identify potential security breaches.
Is this a system, application, or tool?
SQL/AF is a tool set. It provides a collection of utilities and functions specifically designed for auditing DB2 database access. It is not a full-fledged application or operating system, but rather a focused set of tools to enhance security and compliance.
What types of organizations use this?
Organizations that require strict auditing and compliance for their DB2 databases on z/VM and z/VSE systems benefit most from SQL/AF. This includes companies in regulated industries such as finance, healthcare, and government. Any organization concerned about data security and access control on these platforms should consider using SQL/AF.
When should we consider SQL/AF?
A company should consider SQL/AF when they need to improve their auditing capabilities for DB2 databases on z/VM and z/VSE. This is especially important when facing regulatory audits, experiencing security incidents, or needing to track data access for internal controls. It is also useful when migrating to newer versions of DB2 and needing to validate access controls.
What are the alternatives to SQL/AF?
Alternatives to SQL/AF include general-purpose security information and event management (SIEM) systems, database activity monitoring (DAM) tools, and custom-built auditing solutions. Examples include SecureSphere Agent for z/OS and CDB/Audit. However, these may not offer the same level of integration and specific functionality for DB2 on z/VM and z/VSE.
Technical
What infrastructure is required?
SQL/AF requires a running DB2 instance on either z/VM or z/VSE. It also needs sufficient storage for audit logs and reports. The system should have the necessary security software installed and configured to allow SQL/AF to access and monitor DB2 activity. Proper network connectivity between SQL/AF and the DB2 instance is also essential.
For mainframe products: Does this run in an LPAR?
SQL/AF runs on z/VM and z/VSE operating systems. It is not z/OS dependent but requires a DB2 subsystem to be present and active. It typically runs in an LPAR environment on the mainframe.
Does this extend/enhance another product?
SQL/AF extends the auditing capabilities of DB2 by providing more detailed and specific reporting on data access. It enhances the existing DB2 security features by offering a dedicated tool for monitoring and analyzing database activity.
What configuration files or interfaces are used?
SQL/AF uses configuration files to define audit rules, specify report formats, and set up user access controls. These files are typically text-based and can be edited using standard text editors. The interface may also include panels or screens for configuring the system.
Business Value
How does SQL/AF provide business value?
SQL/AF helps organizations meet regulatory compliance requirements by providing detailed audit trails of DB2 access. It reduces the risk of data breaches by identifying unauthorized access attempts. The product also improves operational efficiency by automating the auditing process and generating reports.
What would happen if an organization did NOT use this product?
Without SQL/AF, organizations would need to rely on manual auditing processes or less comprehensive tools, which can be time-consuming and error-prone. This increases the risk of non-compliance, data breaches, and inefficient operations. The lack of detailed audit trails can also make it difficult to investigate security incidents.
What is the typical total cost of ownership beyond licensing?
The total cost of ownership for SQL/AF includes the initial licensing fees, implementation costs, and ongoing operational expenses. Implementation costs may involve configuring the system, setting up audit rules, and training staff. Operational expenses include monitoring the system, maintaining the audit logs, and generating reports.
Security
What specific authentication methods are supported?
SQL/AF supports authentication methods available on z/VM and z/VSE, which may include RACF, ACF2, or Top Secret. The access control model used is typically role-based access control (RBAC), where users are assigned roles with specific permissions to access DB2 data. Encryption methods used depend on the DB2 configuration and may include SSL/TLS for network communication.
What audit/logging capabilities exist?
SQL/AF provides audit logging capabilities that record all access attempts to DB2 tables, including the user ID, timestamp, and data accessed. These logs can be used to track user activity, identify potential security breaches, and demonstrate compliance with regulatory requirements.
How does SQL/AF help with data privacy regulations?
SQL/AF helps organizations comply with data privacy regulations by providing detailed audit trails of data access. This allows companies to demonstrate that they are monitoring and controlling access to sensitive data, as required by regulations such as GDPR and HIPAA.
Operations
How is SQL/AF typically deployed?
SQL/AF can be deployed on-premise, typically within the same data center as the DB2 instances it is monitoring. The implementation process involves installing the software, configuring the audit rules, and setting up user access controls. Ongoing operational requirements include monitoring the system, maintaining the audit logs, and generating reports.
What level of technical expertise is required to implement it?
Implementing SQL/AF requires technical expertise in DB2, z/VM, and z/VSE environments. This includes knowledge of database administration, security configuration, and system programming. The implementation team should also have experience with auditing and compliance requirements.
What are common implementation challenges?
Common implementation challenges include configuring the audit rules to capture the desired level of detail, ensuring that the system can handle the volume of audit data, and integrating SQL/AF with existing security and monitoring tools. It is also important to properly train staff on how to use the system and interpret the reports.
Ready to Start Your Migration?
Download our comprehensive migration guide for SQL/AF or calculate your ROI.