The requirement is to monitor end-to-end access from requester to the databases. The audit information must be available in real time to a Security Information and Event Management system (QRadar). Monitoring is for both inbound and outbound access to and from the mainframe. Auditors need the ability to correlate the user ID, the transaction or application, and the database access.
Do not place IBM confidential, company confidential, or personal information into any field.