Modernization Hub

Data Sensitivity - Importance Level

Enhanced Definition

Data sensitivity, in the context of IBM z/OS, refers to the classification of data based on its confidentiality, integrity, and availability requirements, and the potential impact if it were compromised, altered, or unavailable. The "importance level" is the assigned classification (e.g., Public, Internal, Confidential, Restricted) that dictates the security controls, access policies, and handling procedures necessary to protect that data throughout its lifecycle within the mainframe environment.

Key Characteristics

    • Classification Tiers: Data is typically categorized into multiple tiers (e.g., Low, Medium, High, Critical) based on its business value, regulatory requirements, and the consequences of its exposure or corruption.
    • Impact Assessment: The importance level is determined by assessing the potential financial, reputational, legal, and operational impact on the organization if the data were to be breached, lost, or corrupted.
    • Regulatory Compliance: Directly driven by industry regulations (e.g., GDPR, HIPAA, PCI DSS) and internal corporate policies that mandate specific protection levels for certain types of data (e.g., Personally Identifiable Information - PII, Protected Health Information - PHI).
    • Security Control Mandates: Each importance level dictates specific security controls, such as encryption requirements, access control policies, audit logging, data retention periods, and disaster recovery priorities.
    • Dynamic Nature: Data sensitivity can change over time; for instance, data that is highly sensitive during active use might become less sensitive after a certain period, or vice versa, requiring re-classification and adjustment of controls.

Use Cases

    • Access Control Implementation: Defining RACF (Resource Access Control Facility) profiles, ACF2 rules, or Top Secret permits that grant or deny access to datasets, DB2 tables, IMS segments, or CICS transactions based on the sensitivity level of the data they contain.
    • Encryption Strategy: Determining which datasets (e.g., VSAM, sequential files), DB2 tablespaces, or IMS databases require z/OS Pervasive Encryption or application-level encryption due to their high sensitivity.
    • Data Masking/Obfuscation: Implementing processes to mask or obfuscate highly sensitive data (e.g., credit card numbers, social security numbers) when it is copied from production to non-production environments (development, test, QA) to prevent exposure.
    • Audit and Monitoring: Establishing enhanced auditing and monitoring for access to and modifications of highly sensitive data, often integrating with Security Information and Event Management (SIEM) systems.
    • Disaster Recovery Planning: Prioritizing the recovery of systems and data containing highly sensitive information during a disaster, ensuring faster restoration of critical business functions and compliance.

Related Concepts

Data sensitivity is foundational to Data Governance and Information Security Management on z/OS. It directly influences the configuration of Security Servers like RACF, which enforce access control based on the data's classification. It dictates the use of Encryption Technologies such as z/OS Pervasive Encryption and Data Loss Prevention (DLP) solutions. Furthermore, it guides Compliance Audits and the implementation of Data Masking techniques, ensuring that data is protected throughout its lifecycle, from creation in COBOL or PL/I applications to storage in DB2, IMS, or VSAM files, and processing via JCL batch jobs.

Best Practices:
  • Establish Clear Policies: Define and document a comprehensive data classification policy that clearly outlines sensitivity levels, criteria for classification, and corresponding protection requirements for all data on the mainframe.
  • Automate Classification (where possible): Leverage tools and processes to automatically identify and classify data based on patterns, metadata, or location, reducing manual effort and potential errors.
  • Implement Least Privilege: Ensure that access controls (via RACF, ACF2, Top Secret) are strictly enforced, granting users and applications only the minimum necessary permissions to access data based on its sensitivity.
  • Encrypt Sensitive Data: Utilize z/OS Pervasive Encryption for datasets and DB2 tablespaces, and consider application-level encryption for highly critical data elements, both at rest and in transit.
  • Regularly Audit and Monitor: Conduct frequent audits of access to sensitive data and monitor for suspicious activities, integrating SMF records and RACF audit logs with enterprise SIEM systems for proactive threat detection.

Related Vendors

ASE

3 products

IBM

646 products

Candle Corporation

16 products

ADPAC Corporation

5 products

UNICOM Systems

35 products

Tone Software

14 products

Related Categories

Security

144 products

Tools and Utilities

519 products

Operating System

154 products

Performance

171 products

Monitor

262 products

CICS

214 products