Skip to main content
MainTegrity Cyber Security Framework (CSF)
MainTegrity Cyber Security Framework (CSF)
End-to-End Cyber Security for IBM z/OS
The CSF Suite // FIM+ //

FIM+

What Makes FIM+ Unique

FIM+ is the file-focused module of CSF. It monitors critical system files for unauthorized changes—detecting malware insertion, ransomware attacks, and unapproved updates before damage spreads.

FIM+ answers the question: "Has anyone tampered with my critical files?"


FIM+ Capabilities

  • Detect Malware/Ransomware Insertion — Identifies malicious code and encryption patterns in real-time
  • Alert on Unapproved Updates — Flags changes that don't match approved change requests
  • Remove Ransomware & Verify — Guides recovery and verifies restored files match trusted state

How FIM+ Works

FIM+ continuously monitors your z/OS environment, detecting changes at the member and dataset level by creating and comparing cryptographic signatures. When something changes unexpectedly, you know immediately—not hours or days later.

Real-Time Detection

Unlike log-based detection that reviews SMF records after the fact (sometimes 30+ minutes delayed), FIM+ detects changes as they happen. When ransomware or unauthorized modifications occur:

  1. Malicious process is suspended instantly (typically under 1 second)
  2. Support team receives real-time alert with job name, ID, and submitter
  3. Forensics browser shows exactly which datasets were impacted
  4. Support investigates while attack is frozen—it cannot progress
  5. Cancel or resume: if legitimate, resume; if malicious, cancel and recover

Change Control Integration

FIM+ integrates with your change control processes (ServiceNow, BMC Helix) to verify whether detected changes have approved change requests. When an alert fires, it's a real issue—not planned maintenance.

Recovery Guidance

FIM+ knows when issues started and which components were affected. Through CSF Foundation's Restore Assist, it recommends the best recovery source:

  • IBM SafeGuarded Copy
  • Dell SnapVX / ZDP snap sets
  • Hitachi snapshots
  • Conventional backups (DFDSS, FDR, HSM)

Critical insight: SafeGuarded copies may contain malware if attackers installed backdoors hours or days before the visible attack. FIM+ scans identify when malware was installed, helping select the correct backup point—sometimes a conventional backup from before the compromise, not the most recent immutable copy.

Backup Verification

Using the mainframe's onboard hashing facilities, FIM+ verifies backup integrity in seconds, ensuring restored files exactly match their trusted state.


Detection Coverage

FIM+ monitors:

  • Authorized program libraries (APF)
  • System parameter libraries (PARMLIB)
  • Procedure libraries (PROCLIB)
  • Configuration datasets (VTAMLST, TCPPARMS)
  • Started task libraries and datasets
  • User-defined critical files and datasets

Technical Specifications

  • FIM+ Server: 64MB minimum
  • FIM+ Agents: 32MB each
  • CPU usage: Negligible in production environments

Compliance Support

FrameworkRequirement Addressed
PCI DSSControl 10.5 (FIM required), Control 11.5 (monitor log files)
NIST CSFDetect and Respond functions
DORAICT risk management, operational resilience
Zero TrustContinuous verification of system integrity

FIM+ vs. Other CSF Products

If you need to...Use...
Detect file changes, malware, ransomwareFIM+
Catch attackers before they attackEarly Warning
Stop data leaving your mainframeData Exfiltration Defense
Verify vendor software before installSupply Chain

FIM+ runs on CSF Foundation, which provides Real-time Reaction, Human Interface, Whitelisting, and Restore Assist capabilities.