Keeping Up With Security And Compliance On Ibm Z

Download Keeping Up With Security And Compliance On Ibm Z PDF/ePub or read online books in Mobi eBooks. Click Download or Read Online button to get Keeping Up With Security And Compliance On Ibm Z book now. This website allows unlimited access to, at the time of writing, more than 1.5 million titles, including hundreds of thousands of titles in various foreign languages.
Keeping Up With Security and Compliance on IBM Z

Non-compliance can lead to increasing costs. Regulatory violations involving data protection and privacy can have severe and unintended consequences. In addition, companies must keep pace with changes that arise from numerous legislative and regulatory bodies. Global organizations have the added liability of dealing with national and international-specific regulations. Proving that you are compliant entails compiling and organizing data from multiple sources to satisfy auditor's requests. Preparing for compliance audits can be a major time drain, and maintaining, updating, and adding new processes for compliance can be a costly effort. How do you keep constant changes to regulations and your security posture in check? It starts with establishing a baseline: knowing and understanding your current security posture, comparing it with IBM Z® security capabilities, and knowing the latest standards and regulations that are relevant to your organization. IBM Z Security and Compliance Center can help take the complexity out of your compliance workflow and the ambiguity out of audits while optimizing your audit process to reduce time and effort. This IBM Redbooks® publication helps you make the best use of IBM Z Security and Compliance Center and aid in mapping all the necessary IBM Z security capabilities to meet compliance and improve your security posture. It also shows how to regularly collect and validate compliance data, and identify which data is essential for auditors. After reading this document, you will understand how your organization can use IBM Z Security and Compliance Center to enhance and simplify your security and compliance processes and postures for IBM z/OS® systems. This publication is for IT managers and architects, system and security administrators
Scale up for Linux on IBM Z

This book was written by IBM® IT specialists who have experience implementing IBM Z® solutions, especially Linux on IBM LinuxONETM (LinuxONE) or IBM Z servers. Therefore, the content of this book follows the guidelines from Linux and IBM z/VM® regarding LinuxONE and IBM Z installations. The preferred practices described in this book are gathered from the experiences of those specialists in hundreds of projects at IBM and customer environments. This publication provides you with all of the information that you need to decide the best scaling architecture when implementing Linux on IBM Z or LinuxONE. This book has the following goals: To inform you about x86 sprawl problems To inform you that x86 Vertical Scale out architectures are problematic going forward To provide solutions to x86 server sprawl problems To inform you about the LinuxONE and IBM Z differentiation for each x86 server sprawl problem To provide virtulization and security options for LinuxOne and IBM Z The scaling up and scaling out architectures enable you to scale the capacity of an existing system to attend a sporadic application demand or an application workload. This gives you some freedom to operate in the environment. However, if this activity is performed without correct planning and the correct architecture choice, it leads to a server sprawl situation where your environment houses more servers than it should based on its current and predicted requirements. Although scaling out on x86 systems is a common form of scaling because of their popularity, the x86 systems were originally designed as cheap computers. Unfortunately, the scale out on x86 can easily become a problem in terms of total cost of ownership (TCO) when the environment starts to increase in terms of number of physical servers. The LinuxONE and IBM Z servers solve the sprawl problem caused by the scaling out of x86 servers, and are an excellent choice for cloud, mobile, big data, blockchain, analytics, and other workloads that require a robust and flexible environment. This publication describes the advantages and disadvantages of the scaling options. The audience of this publication consists of the following groups: Customers, IBM Business Partners, and IBM consultants planning and installing Linux on IBM Z, IBM Z family or x86 platform System administrators administering the Linux Systems If you are a customer considering LinuxONE and IBM Z family as a platform for your applications (analytics, blockchain, cloud, or other) or a pre-sales person, read those publications.
Empowering Security and Compliance Management for the z/OS RACF Environment using IBM Tivoli Security Management for z/OS

Every organization has a core set of mission-critical data that requires protection. Security lapses and failures are not simply disruptions, they can be catastrophic events with consequences felt across the enterprise. The inadvertent mistakes of privileged users alone can result in millions of dollars in damages through unintentional configuration errors and careless security commands. Malicious users with authorized access can cause even greater damage. As a result, security management faces a serious challenge to adequately protect a company's sensitive data. Likewise, IT staff is challenged to provide detailed audit and controls documentation in the face of increasing demands on their time. Automation and simplification of security and compliance processes can help you meet these challenges and establish effective, sustainable user administration and audit solutions. This includes security database cleanup, repeatable audit of configurations and settings, and active monitoring of changes and events. IBM Tivoli Security Management for z/OS V1.11 provides these solutions to help enhance the security of mainframe systems through automated audit and administration. In this IBM® RedpaperTM document we discuss how Tivoli® Security Management for z/OS® allows you to submit mainframe security information from z/OS, RACF®, and DB2® into an enterprise audit and compliance solution and how to combine mainframe data from z/OS, RACF, and DB2 with that from other operating systems, applications, and databases in order to provide the ability to capture comprehensive log data, interpret that data through sophisticated log analysis, and communicate results in an efficient, streamlined manner for full enterprise-wide audit and compliance reporting.