Modernization Hub

ESP - External Security Package

Enhanced Definition

An External Security Package (ESP) is a generic term for a security software product used on IBM z/OS mainframe systems to provide comprehensive access control and security management. It acts as the gatekeeper for system resources, ensuring that only authorized users and processes can access specific data, programs, and system functions. The most prominent examples of ESPs are IBM's `RACF` (Resource Access Control Facility), Broadcom's `ACF2`, and Broadcom's `Top Secret`.

Key Characteristics

    • Centralized Security Management: Provides a single point of control for defining, managing, and enforcing security policies across the entire z/OS environment.
    • Resource Protection: Secures a wide range of z/OS resources, including datasets, volumes, programs, transactions (e.g., CICS), databases (e.g., DB2, IMS), system commands, and network access.
    • Authentication and Authorization: Handles user authentication (verifying identity via passwords, multi-factor authentication) and authorization (determining what authenticated users are permitted to do).
    • Auditing and Logging: Records security-relevant events, such as access attempts (both successful and failed), changes to security rules, and user activity, for compliance, auditing, and forensic analysis.
    • Integration with z/OS Subsystems: Deeply integrates with core z/OS components and major subsystems like CICS, DB2, IMS, JES, TSO, and UNIX System Services to extend security controls to their specific resources.
    • Rule-Based Access Control: Security decisions are typically based on predefined rules or profiles that specify who can access what, under which conditions (e.g., time of day, program being used).

Use Cases

    • User Access Control: Granting or revoking access for users to log into TSO, CICS regions, IMS transactions, or DB2 databases based on their roles and responsibilities.
    • Dataset Protection: Preventing unauthorized read, write, update, or delete operations on critical datasets, such as production data files, system libraries, or sensitive configuration files.
    • Program Execution Control: Restricting the execution of sensitive utilities, system programs, or specific application modules to authorized users or groups.
    • System Command Authorization: Controlling which operators or automated processes are permitted to issue powerful z/OS system commands (e.g., DISPLAY, VARY, CANCEL).
    • Compliance and Audit Reporting: Generating detailed reports on access permissions, security violations, and user activity to satisfy regulatory requirements (e.g., SOX, GDPR, HIPAA).

Related Concepts

ESPs are foundational to z/OS security, working hand-in-hand with the operating system and its subsystems. They provide the actual implementation of security policies that protect resources managed by JES (Job Entry Subsystem), CICS (Customer Information Control System), DB2 (IBM Db2 for z/OS), and IMS (Information Management System). While JCL (Job Control Language) defines job steps and resource requests, the ESP determines if the requesting job or user has the necessary authorization to perform those actions or access those datasets. Without an ESP, z/OS systems would lack granular, centralized access control, making them vulnerable.

Best Practices:
  • Principle of Least Privilege: Grant users and applications only the minimum access rights necessary to perform their functions, reducing the attack surface.
  • Regular Auditing and Review: Periodically review security rules, access permissions, and audit logs to identify and rectify unauthorized access, dormant accounts, or overly permissive rules.
  • Strong Authentication: Implement and enforce strong password policies, including complexity, expiration, and multi-factor authentication (MFA) where supported, to protect user identities.
  • Segregation of Duties (SoD): Design security roles and profiles to ensure that no single individual has control over an entire critical process, reducing the risk of fraud or error.
  • Security by Default: Configure new resources and users with the most restrictive access initially, then explicitly grant additional permissions as required.

Related Vendors

Broadcom

235 products

IBM

646 products

Tone Software

14 products

Related Categories

Security

144 products

Operating System

154 products

CASE/Code Generation

19 products

Automation

222 products