Your Browser is not longer supported

Please use Google Chrome, Mozilla Firefox or Microsoft Edge to view the page correctly
Loading...

{{viewport.spaceProperty.prod}}

Table of object-related events

&pagelevel(3)&pagelevel

The table in the following shows the objects and their auditable events, the abbreviated names of the events and indication of their audit attributes.
The /MODIFY-SAT-PRESELECTION command enables the security administrator to modify the SAT preselection values for most events.

The individual columns have the following meanings:

  • OBJECT Event columnSpecification of the object, accompanied by the operations which result in auditable events.

  • Event name columnEach event has a 3-character event name which may be used as a keyword in the commands /SHOW-SAT-STATUS and /MODIFY-SAT-PRESELECTION as well as in the statements //ADD-SELECTION-CONDITIONS and //SELECT-RECORDS .

  • Audit attribute Chg columnIndication of whether the audit attribute for the event can be changed.

    Y (YES)

    The audit attribute can be changed

    N (NO)

    The audit attribute cannot be changed
    (permanently security-relevant event)

    -

    Entry not relevant

  • Audit attribute Dft

    columnShows the default setting for the audit attribute (see "Selection procedure") of the event:

    A

    Audit attribute ALL, i.e. the event is always logged

    S

    Audit attribute SUCCESS, i.e. the event is logged if it has been successfully executed
    (data field res equal S in the SATLOG record)

    F

    Audit attribute FAILURE, i.e. the event is logged if it has not been successfully executed
    (data field res equal F in the SATLOG record)

    N

    Audit attribute NONE, i.e. the event is not logged

    -

    Entry not relevant

    Note

The events and fields documented in this manual correspond to the status at the time when the manual was published. However, the type and scope of the audited information may change for products which pass information to SAT for logging and which appear after publication of this manual. The related product manual will contain an updated list of events and fields, and you should therefore use only the information provided in these product manuals.

OBJECT
Event

Event name

Audit attribute

Chg

Dft

ADAM (device management)

Add device operation

ADO

Y

N

ANY




Any event (system exit) (see note)

ANY

Y

N

APPLICATION (DCAM)

Open application (YOPEN)

DON

Y

N

Close application (YCLOSE)

DCL

Y

N

Connect application (YOPNCON)

DCN

Y

N

Disconnect application (YCLSCON)

DDS

Y

N

BCAM

Open TSAP

BAO

Y

N

Close TSAP

BAC

Y

N

Open connection

BCN

Y

N

Close connection

BDS

Y

N

CATALOG (PVS)

Start import pubset task

CIP

Y

S

Start export pubset task

CEP

Y

S

Check catalog

CKR

Y

N

Convert catalog

CVR

Y

N

CONSLOG (see note)

CONSLOG entry


-

-

COOWNER PROTECTION

Add co-owner protection rule

CRA

Y

N

Modify co-owner protection rule

CRM

Y

N

Display co-owner authorization rule

CRQ

Y

N

Remove co-owner protection rule

CRR

Y

N

Display co-owner protection rule

CRS

Y

N

DATA SPACES (see note)

Create DATA SPACE

DSB

Y

N

Connect to DATA SPACE

DSC

Y

N

Release connection to DATA SPACE

DSD

Y

N

Delete DATA SPACE

DSE

Y

N

Modify/reset DATA SPACE

DSM

Y

N

DEFAULT PROTECTION

Define default values for protection attributes

DAA

Y

N

Modify default values for protection attributes

DAM

Y

N

Display default values for protection attributes

DAS

Y

N

Add default protection rule

DRA

Y

N

Modify default protection rule

DRM

Y

N

Display default protection attributes for object

DRQ

Y

N

Remove default protection rule

DRR

Y

N

Display default protection rule

DRS

Y

N

Add user ID for object path

DUA

Y

N

Remove user ID for object path

DUR

Y

N

Display user ID for object path

DUS

Y

N

EVENTING-ITEM (see note)

Activate eventing

EEE

Y

N

Deactivate eventing

EDE

Y

N

Activate serialization

EES

Y

N

Deactivate serialization

EDS

Y

N

FILE (see note)

Create file

FCD

Y

N

Read file

FRD

Y

N

Execute file (open exec)

FED

Y

N

Modify file

FMD

Y

N

Close file

FCL

Y

N

Delete file

FDD

Y

N

Rename file with ARCHIVE

FAR

Y

N

Rename file

FRN

Y

N

Define protection attributes

FCS

Y

N

Modify protection attributes

FMS

Y

N

Delete protection attributes

FDS

Y

N

Read protection attributes

FRS

Y

N

Import protection attributes

FIS

Y

N

Export protection attributes

FES

Y

N

Convert file into decrypted file

FDC

Y

N

Convert file into encrypted file

FEC

Y

N

Move file extents (SPACEOPT)

FME

Y

N

Select object for reorganization (SPACEOPT)

FSO

Y

N

FITC (Fast Intertask Comm.) (see note)

Define port access

POA

Y

N

Define port

POB

Y

N

Connect to port

POC

Y

N

Disconnect from port

POD

Y

N

Release port

POE

Y

N

Release port access

POR

Y

N

Implicit exchange with port

POX

Y

N

GROUP (user group)

Add

GSH

Y

A

Modify

GRM

Y

A

Remove

GMD

Y

A

Show

GAD

Y

N

GUARDS

Generate a guard

GUB

Y

N

Copy a guard

GUC

Y

N

Delete a guard

GUD

Y

N

Change guards catalog

GUF

Y

N

Repair guards catalog

GUR

Y

N

Modify attributes

GUM

Y

N

Show attributes

GUS

Y

N

Define access conditions

GAA

Y

N

Modify access conditions

GAM

Y

N

Remove access conditions

GAR

Y

N

Show access conditions

GAS

Y

N

Interrogate access conditions

GAQ

Y

N

IPSEC

Load IPSEC security database

ILD

Y

N

Security policy infringement during data transfer

IPV

Y

N

JOB (see note)

Initiate batch job or subtask

JBE

Y

F

Abort job

JCN

Y

N

Initiate dialog or RLOGIN

JDE

Y

A

End job

JED

Y

N

Initialize batch job or subtask

JIN

Y

A

Modify batch job

JMD

Y

N

Generate POSIX task

JFK

Y

A

JOB VARIABLES

Rename with ARCHIVE

JVA

Y

N

Create protection attributes

JVC

Y

N

Delete protection attributes

JVD

Y

N

Modify protection attributes

JVM

Y

F

Read data (GETJV)

JVG

Y

F

Write data (SETJV)

JVS

Y

F

Query JV

JVQ

Y

N

Rename JV

JVR

Y

N

KEY

Add KERBEROS Encryption Type

KEA

Y

A

Delete KERBEROS Encryption Type

KED

Y

A

Add KERBEROS Principal

KPA

Y

A

Delete KERBEROS Principal

KPD

Y

A

Modify KERBEROS Principal

KPM

Y

A

KERBEROS ticket check

KTC

Y

F

Abortive attempt at a crypto password check after exceeding
the maximum number of abortive attempts

KXM

Y

F

MEMORY-POOL (see note)

Enable (ENAMP)

MEN

Y

N

Disable (DISMP)

MDS

Y

N

Release (RELMP)

MRL

Y

N

Make readable for TU (with ($)CSTMP in TPR)

MRD

Y

N

Make readable with CSTMP in TU

MAC

Y

S

OPERATOR ROLE

Add routing code

ORA

Y

N

Create operator role

ORB

Y

N

Assign operator role

ORC

Y

N

Delete operator role from user record

ORD

Y

N

Delete operator role

ORE

Y

N

Withdraw routing code

ORR

Y

N

PLAM

Create library member

LCE

Y

N

Modify library member

LME

Y

N

Read library member

LRE

Y

N

Execute library member

LEE

Y

N

Close library member

LCL

Y

N

Delete library member

LDE

Y

N

Rename library member

LRN

Y

N

Create security attributes

LCS

Y

N

Delete security attributes

LDS

Y

N

Modify security attributes

LMS

Y

N

POSIX-CHILD-Process (see note)

Create new process (fork)

XFK

Y

N

Create new process on rlogin access (rfork)

XRF

Y

N

POSIX-FILE-and-Directory (see note)

Change current directory (chdir)

XCD

Y

N

Close file (close)

XCL

Y

N

Change file access rights (chmod)

XCM

Y

N

Change file owner or group (chown)

XCO

Y

N

Create new file (creat)

XCR

Y

N

Create directory via descriptor (mkdirat)

XDA

Y

N

Duplicate file descriptor (dup)

XDP

Y

N

File control operation (fcntl)

XFC

Y

N

Change current directory via descriptor (fchdir)

XFD

Y

N

Change file access rights via descriptor (fchmod)

XFM

Y

N

Change a file’s owner or group via descriptor (fchown)

XFO

Y

N

Create a link to a file via descriptor (linkat)

XLA

Y

N

Create a link to a file (link)

XLN

Y

N

Change the owner or group of a file or link (lchown)

XLO

Y

N

Change file access rights via descriptor (fchmodat)

XMA

Y

N

Create directory (mkdir)

XMD

Y

N

Map file in virtual memory(mmap)

XMM

Y

N

Set protection attributes for file mapping in virtual memory
(mprotect)

XMP

Y

N

Mount file system (mount)

XMT

Y

N

Cancel mapping of file in virtual memory (munmap)

XMU

Y

N

Open file via descriptor (openat)

XOA

Y

N

Open file (open)

XOP

Y

N

Rename file via descriptor (renameat)

XRA

Y

N

Remove directory (rmdir)

XRD

Y

N

Rename file (rename)

XRN

Y

N

Create symbolic link to a file via descriptor (symlinkat)

XSA

Y

N

Create symbolic link to a file (symlink)

XSL

Y

N

Delete file or directory via descriptor (unlinkat)

XUA

Y

N

Set file bit mask for a process (umask)

XUM

Y

N

Delete file (remove/unlink)

XUN

Y

N

Unmount file system (umount)

XUT

Y

N

Change file group or owner via descriptor (fchownat)

XWA

Y

N

POSIX-PROCESS (see note)

Set effective group number for a process (setegid)

XEG

Y

N

Set effective user number for a process (seteuid)

XEU

Y

N

Execute file (exec)

XEX

Y

N

Set maximum number of group members for a process
(setgroups)

XGR

Y

N

Send signal to process or process group (kill)

XKL

Y

N

Set process limits (ulimit)

XLM

Y

N

Set real and effective group number for a process (setregid)

XRG

Y

N

Set real and effective user number for a process (setreuid)

XRU

Y

N

Set group number of a process (setgid)

XSG

Y

N

Set process group number (setpgrp)

XSP

Y

N

Set limit value for a resource (setrlimit)

XSR

Y

N

Set user number of a process (setuid)

XSU

Y

N

POSIX-SYSTEM-Resources (see note)

Change system time (adjtime)

XAJ

Y

N

Set user attributes (pwent)

XPW

Y

N

Semaphore control operations (semsys)

XSE

Y

N

Shared memory control operations (shmsys)

XSH

Y

N

PRIVILEGE




Grant

PST

N

A

Revoke

PRT

N

A

Create privilege set

PSC

Y

S

Delete privilege set

PSD

Y

S

Add privilege to privilege set

PSA

N

A

Remove privilege from privilege set

PSR

N

A

PROGRAM (see note)

Load/execute

XLD

Y

Y

Unload

XUL

Y

Y

SAT (see note)

Command HOLD-SAT-LOGGING

ZHO

N

A

Command RESUME-SAT-LOGGING

ZRE

N

A

Command MODIFY-SAT-PRESELECTION

ZPS

N

A

Command MODIFY-SAT-SUPPORT-PARAMETERS

ZMS

N

A

Command CHANGE-SAT-FILE

ZCH

N

A

Command SAVE-SAT-PARAMETERS

ZSP

N

A

Open SATLOG file (HEADER record)

ZBG

N

A

Close SATLOG file (TRAILER record)

ZND

N

A

SAT event preselection

ZEP

N

A

SAT-ALARM

Command ADD-SAT-ALARM-CONDITIONS

ZCA

N

A

Command REMOVE-SAT-ALARM-CONDITIONS

ZDA

N

A

Command MODIFY-SAT-ALARM-CONDITIONS

ZMA

N

A

Trigger SAT alarm

ZAL

N

A

SAT-FILTER




Command ADD-SAT-FILTER-CONDITIONS

ZCF

N

A

Command REMOVE-SAT-FILTER-CONDITIONS

ZDF

N

A

Command MODIFY-SAT-FILTER-CONDITIONS

ZMF

N

A

SESAM (see note)

Administer DBH session

SEA

Y

N

Change access rights and user accesses

SEP

Y

N

DDL, SSL, utility statement

SES

Y

N

Start/stop SESAM task (DBH or service task)

SET

Y

N

Stop process

SEU

Y

N

SMS (System Managed Storage)


Create storage class

SCC



Modify characteristics of storage class

SCM



Delete storage class

SCD



Bind storage class to volume set list

SCB



PVSREN: delete all storage classes

SCP



Unbind storage class from volume set list

SCU



Command CHANGE-STORAGE-CLASS-CATALOG

SCX



Create volume set list

VLC



Modify volume set list

VLM



Delete volume set list

VLD

Y

N

Add volume to volume set list

VLA

Y

N

Remove volume from volume set list

VLR

Y

N

Command CHANGE-VOLUME-SET-LIST-CATALOG

VLX

Y

N

PVSREN: rename volume set

VP1

Y

N

PVSREN: rename all volume sets

VP2

Y

N

PVSREN: delete all volume sets

VP3

Y

N

SPOOL DEVICE

Define RSO device

SDA

Y

N

Modify attributes

SDM

Y

N

Delete entry

SDR

Y

N

SPOOL JOBS (see note)

Request printing

JPR

Y

N

Delete job

JPC

Y

N

Terminate printing

JPE

Y

N

Interrupt printing

JPI

Y

N

SUBSYSTEM (see note)

Activate

SCR

Y

A

Deactivate

SDL

Y

A

Hold

SHD

Y

A

Remove

SRM

Y

A

Resume

SRS

Y

A

Connection with nonprivileged subsystem

SCN

Y

N

Disconnection from nonprivileged subsystem

SDS

Y

N

Catalog management

SCT

Y

A

Load subsystem part

SLP

Y

N

Change subsystem file

SFC

Y

N

SYNTAX FILE

Activate

YAC

Y

N

Modify

YMD

Y

N

Open hierarchy (OPNCALL macro)

YON

Y

N

Activate for subsystem

YAD

Y

N

Check

YCK

Y

N

TAPE encryption

CREATE-ENCRYPTION-KEY statement

TKC

Y

A

ADD-ENCRYPTION-KEY statement

TKA

Y

A

COPY-ENCRYPTION-KEYS statement

TKP

Y

A

REMOVE-ENCRYPTION-KEYS statement

TKR

Y

A

SHOW-ENCRYPTION-KEYS statement

TKS

Y

N

SET-WRITE-ENCRYPTION-KEY statement

TWK

Y

A

DELETE-KEY-BOX statement

TBD

Y

A

EXPORT-KEY-BOX statement

TBE

Y

A

IMPORT-KEY-BOX statement

TBI

Y

A

REPAIR-KEY-BOX statement

TBR

Y

N

MODIFY-VOLUME-ENCRYPTION-ATTR statement

TVM

Y

A

SHOW-VOLUME-ENCRYPTION-ATTR statement

TVS

Y

N

Access to key box

TBA

Y

A

TERMINAL SET

Generate

TSB

Y

N

Copy

TSC

Y

N

Delete

TSD

Y

N

Modify

TSM

Y

N

USERID (see note)

Add

UAD

Y

A

Modify attributes

UMD

Y

N

Remove

URM

Y

A

Lock

ULK

Y

N

Unlock

UUL

Y

S

Check

UCK

Y

F

Define protection attributes

USL

Y

A

Modify protection attributes

UML

Y

A

Modify password protection

UMP

Y

A

Command REQUEST-OPERATOR-ROLE

UOP

Y

A

Command MODIFY-POSIX-USER-ATTRIBUTES

UPA

Y

N

Command MODIFY-POSIX-USER-DEFAULTS

UPD

Y

N

Command MODIFY-USER-PUBSET-ATTRIBUTES

UUP

Y

A

Command MODIFY-LOGON-DEFAULTS

UDM

Y

A

Command SET-LOGON-DEFAULTS

UDS

Y

A

Command UNLOCK-USER-SUSPEND

UUS

Y

A

UTM events (see note)

TRM

Y

A

VOLUME (MAREN) (see note)

Administrator is modifying attributes

VMA

Y

N

Remove volume

VRM

Y

N

Add volume

VAD

Y

N

User is modifying attributes

VMU

Y

N

User is processing volume

VVP

Y

N

Modify MAREN parameters

VMM

Y

N

Show volume attributes

VSA

Y

N

Show MAREN parameters

VSP

Y

N

VOLUME (other products) (see note)

Open volume

VON

Y

N

Close volume

VCL

Y

N

Initialize protected volume

VIP

Y

A

Initialize unprotected volume

VIN

Y

N

Initialize disk

VID

Y

A

Install IOCF

VIO

Y

N

Request volume (FDDRL)

VDA

Y

S

Release volume (FDDRL)

VDR

Y

N

Modify volume (FDDRL)

VDU

Y

S

Table 4: Object-related events, event names and audit attributes

Notes on objects and events relating to them

Note on ANY events

The $SATANY macro may be issued by the security administrator and the SAT file manager (using system exit 110) to write to the SATLOG file any information they wish to record about an event that is to be logged (see section “Refining selection with system exit no.110”).

Note on CONSLOG

CLG are not auditable events.
For the purpose of SATUT evaluation, however, it is also possible to use standard format CONSLOG as input files. The entries in these files are converted into CLG records for evaluation, and as a result can be incorporated in the selection. The contents of the audit record are dependent on the type of CONSLOG message (see "Tables of auditable information on object-related events (1)").

Note on DATA SPACES

Operations in the privileged state (TPR) are not logged. If SCOPE=LOCAL is used, failure of the command is logged.

Note on EVENTING-ITEM

If SCOPE = LOCAL applies, no auditing takes place.

Note on FILE and FITC
  1. If the audit attribute of a file is activated, all attempted or successful accesses to the file are logged, provided the event result matches the value of the audit attribute (seesection “Subject, object and event”).

  2. The following file attributes are security-relevant: user-access, access, audit, passwords, retention period, basic access control list. Since system administration under TSOS is authorized to read the passwords entered in the directory entry, this event (’read password’) is also rated as security-relevant.

  3. The following two events may be logged when deleting a file:

    • delete data

    • delete protection attributes

    The same events may occur in conjunction with the renaming of a file with simultaneous modification of the protection attributes.

  4. In the event of a single programmed instruction closing all files, the event (’close file’) is recorded separately for each file.

  5. In multiprocessor systems, auditing is performed by the computer from which the file was opened, while the shareability and the access rights are checked on the computer on which the file is cataloged.

  6. Since ARCHIVE subtasks make use of the Subject Identification Interface (SID), all events relating to a FILE object are treated as if they were part of the main task and therefore logged [5]. In addition, the ARCHIVE-specific event ’rename file’ is logged.

  7. The FSO event is used to log user requests, i.e. requests from the job to SPACEOPT.

    The FME event is used to log the result of job processing.

    An FSO event record can be associated with no, one or multiple FME result records depending on whether any, and if so how many, files have been moved during job processing.

    In contrast, a record containing the FME result is always preceded by a record with the FSO result.

Notes on JOB
  1. Jobs that are canceled while in the wait state are only logged via the CANCEL command.

  2. Print jobs are logged in conjunction with the appropriate commands (see SPOOL JOBS).

  3. Job classes are irrelevant for SAT logging.

  4. In multiprocessor systems, REMOTE ENTER and REMOTE CANCEL are logged in the target computer, while OPEN is recorded in the source computer.

  5. SAT does not log the event ’terminate job’ (JED) unless expressly requested to do so; this is because the event is already logged by CONSLOG and accounting.

Notes on MEMORY-POOL
  1. When in privileged mode (TPR), the only logged event is ’Make readable in TU’.

  2. For memory pools with SCOPE = LOCAL, the only logged events are ’Modify read access’ and ’Make readable in TU’.

Note on POSIX-...

Logging of events for POSIX-CHILD-Process, POSIX-FILE-and-Directory, POSIX-PROCESS and POSIX-System-Resources takes place only if SAT support has been activated for these events:

/MODIFY-SAT-SUPPORT-PARAMETERS POSIX-EVENTS=*ENABLED

Note on PROGRAM

No SAT logging is performed in the event of SLICE OVERLOADING.

Note on SAT events

SAT events are always logged, and auditing cannot be deactivated for these events even via a selection function. SATLOG files always have a header and a trailer record corresponding to the special events ’start of SATLOG file’ (ZBG) and ’end of SATLOG file’ (ZND). ZBG and ZND events are likewise always logged and cannot be excluded by means of deactivation.

A header record corresponding to the event “Create an analysis file” is created in the analysis files generated by SATUT (ZRR for replacement files, ZRA for analysis files).

Each event which is related to the definition of alarms or filters (ZCA, ZDA, ZMA, ZAL, ZCF, ZDF, ZMF) is also logged. This also includes saving the SAT parameter file (ZSP).

Note on SESAM

SESAM/SQL Server provides the SESAM administrator with options for switching the SAT logging on and off for SESAM. This means that SESAM events can only occur if
SESAM/SQL Server is being used, and only then if the SAT logging is enabled for SESAM. The settings of the SAT preselection have no effect on the SESAM results in all other cases.

Therefore, to log the SESAM events, both the SAT logging in SESAM and the SESAM events in the SAT preselection must be enabled.

Further information on the SESAM options can be found in the “SESAM/SQL Server Database Operation” manual [33].

Note on SPOOL JOBS

Only the fact that /PRINT and /CANCEL commands have been issued is recorded, i.e. the command execution itself is not recorded.

Notes on SUBSYSTEM
  1.  Any subsystem activation that takes place prior to SYSTEM READY is not logged in the SATLOG file, but in the CONSLOG. Thus security is ensured by setting system parameter SECSTART=Y (see the "Commands" manual), what forces creation of the CONSLOG file.

  2. When a subsystem is accessed, the access request is recorded but not the subsystem operations (since they are performed under a different TSN).

  3. Only connection or disconnection requests to nonprivileged subsystems are logged, provided they have been successful.

Notes on USERID
  1. The audit data does not indicate whether the authorization to activate AUDIT mode (event UAD or UMD) has been modified.

  2. The rejection of interactive and batch jobs is recorded only indirectly by the ’check user ID’ event, since it does not involve any other security-relevant events.

Notes on UTM events

Since the subject of a UTM event usually is not a BS2000 user ID, such events are treated differently by SAT.

SAT only recognizes that a UTM event has occurred. The audit data contains a subcode indicating the specific UTM events.

For detailed information on SAT logging under openUTM, refer to the openUTM manual “Generating Applications” [17].

Notes on VOLUME
  1. SAT does not record whether or not the write-enable ring of a magnetic tape was present.

  2. SAT records any reservation of a magnetic tape via DMS (see the “Introductory Guide to DMS” [6]), FDDRL (see the “FDDRL” manual [9]) or INIT (see the “Utility Routines” manual [14]). The VSN of a tape being initialized is unknown.

  3. SHOW-VOLUME-ATTRIBUTES statements are not considered to be security-relevant events unless they are part of a user job under TSOS or under a user ID possessing the TAPE-ADMINISTRATION privilege.

    MAREN parameters are those parameters to be modified by means of the MAREN statement MODIFY-MAREN-PARAMETERS.