Security Events

Security events turn IBM MQ authorization failures into structured signals your security operations center can correlate with firewalls, identity systems, and application logs. When a misconfigured service account attempts PUT on a payroll queue, the client sees reason 2035 MQRC_NOT_AUTHORIZED; security events copy that fact to SYSTEM.ADMIN.SECURITY.EVENT for automated triage. Beginners enable SECEV after an audit, never deploy a reader, and miss brute-force patterns on SVRCONN listeners until a penetration test report arrives. This tutorial covers enabling security events, typical failure scenarios (CONNAUTH, CHLAUTH, OAM, RACF on z/OS), event message handling, SIEM rule examples, relationship to configuration and performance events, reducing false positives from development environments, and coordinated response with middleware and InfoSec teams.

What Generates Security Events

  • Failed connection authentication — wrong password, expired certificate, unknown user.
  • Authority failures on MQOPEN, MQPUT, MQGET, MQINQ, MQSET.
  • CHLAUTH rules blocking channel connection or mapping MCAUSER.
  • Attempts to access system queues without authority.
  • Administrative commands rejected for insufficient privilege (version-specific).

Each event message encodes context: queue manager, object name, user identifier, connection type, and reason information parsers map to tickets. Exact fields follow IBM event message reference for your release.

Failure surface vs where to look
Failure typeClient seesOperations checks
Application PUT denied2035 on PUTSecurity event, OAM profile, app user
SVRCONN login failed2059 or auth errorCONNAUTH, LDAP, event queue
SDR blocked at connectChannel errorCHLAUTH, TLS, security event
Browse production queue2035 on OPENSOC rule on repeated OPEN fails

Enabling Security Events

shell
1
2
3
4
5
6
ALTER QMGR SECLEV(ENABLED) DISPLAY QMGR SECLEV DISPLAY QLOCAL('SYSTEM.ADMIN.SECURITY.EVENT') CURDEPTH MAXDEPTH * After test failure from unauthorized user: * Confirm CURDEPTH increased on security event queue

Verify attribute name SECLEV versus SECEV in your version documentation—IBM has used SECEV in materials; always DISPLAY QMGR after ALTER to confirm active values. Protect the security event queue with strict OAM: only the event consumer service account may GET; admins may DISPLAY depth.

SIEM Integration Patterns

  1. Consumer forwards parsed JSON with fields: qmgr, user, object, action, rc, source IP.
  2. Rule: ten 2035 failures in five minutes from one IP to SVRCONN — severity high.
  3. Rule: CHLAUTH block on production SDR name — page middleware immediately.
  4. Enrich with CMDB owner and business service tag.
  5. Auto-open ticket with link to runbook for 2035 on named object.

CHLAUTH and Security Events Together

CHLAUTH ADDRESSMAP and USERMAP rules block connections before full session establishment. Logs show AMQERR messages; security events give SOC a stream without shell access to MQ servers. After rule changes, configuration events record the ALTER CHLAUTH while security events should drop if the change fixed legitimate partners—validate both streams during change windows.

z/OS RACF and Security Events

On z/OS, RACF profiles govern queue manager and queue profiles in addition to distributed-style OAM on some setups. Security events still centralize middleware perspective; RACF SMF and audit cover platform identity. Mainframe security reviews expect both. Document which queue managers forward events to enterprise SIEM versus platform-only tools.

False Positive Control

  • Suppress lab queue managers by hostname tag in SIEM.
  • Rate-limit alerts per user and per queue name pattern.
  • Separate break-glass admin accounts with louder alerting.
  • Weekly report of top ten failure objects instead of page per event in dev.

Explainer: Door Alarm

Security events are the alarm on the server room door when someone uses the wrong badge—whether they got in or not, the attempt is recorded centrally.

Explain Like I'm Five: Security Events

When someone tries to open a toy box they are not allowed to use, a helper writes their name and what they tried in a special notebook for grown-up guards.

Practice Exercises

Exercise 1

Write three SIEM rules with thresholds for production MQ security events.

Exercise 2

Map investigation steps for ten 2035 errors in one minute on ORDERS.IN.

Exercise 3

Explain difference between security event and configuration event when CHLAUTH is ALTERed.

Frequently Asked Questions

Frequently Asked Questions

Test Your Knowledge

Test Your Knowledge

1. Security events help detect:

  • Auth and authority failures
  • Only queue depth
  • Successful batch end
  • Log archive size

2. SECEV on queue manager enables:

  • Security event generation
  • Higher MAXDEPTH
  • Faster channels
  • Pub/sub only

3. CHLAUTH block may appear as:

  • Security event and channel error
  • Only successful PUT
  • JCL abend
  • SMF type 30

4. Reason code 2035 means:

  • NOT_AUTHORIZED
  • Q_FULL
  • UNKNOWN_OBJECT
  • CONN_BROKEN
Published
Read time21 min
AuthorMainframeMaster
Verified: IBM MQ 9.3 documentation