IBM Z and LinuxONE Security and Compliance Center

Security and compliance with automation, monitoring and reporting

A woman working on a computer in the server room

Streamline compliance for your mainframe

The IBM Z® Security and Compliance Center (zSCC) is a microservice that gathers compliance data from IBM software and products on IBM Z and LinuxONE platforms to simplify audits, saving time and effort.

Read IBM zSCC solution brief Read IBM LinuxONE SCC solution brief
Time and resource savings

Reduce audit prep to one week from one month, lowering team involvement by over 40%.

Continuous monitoring

Keep automating current tracking despite regulatory drifts through a unified compliance dashboard.

Process standardization

Simplify processes and prevent misinterpretation of regulations by inexperienced users.

Increased visibility

Automate data collection and validation to enhance compliance oversight visibility.

Use cases

Two office colleagues looking at a laptop
Enable continuous compliance

Translation of regulations to IBM Z and LinuxONE-specific controls add clarity. A centralized, interactive dashboard displays baseline standards. Time-stamped evidence can be captured for multiple industries.

A mature businessperson leading a project discussion with coworkers in the office
Control and track success

See how your new or changing business requirements can affect regulation compliance. Clear, jargon-free mapping to the regulations helps you control your business’ infrastructure.

Two colleagues gather around the laptop and shared reports
Streamline compliance

See how different regulations overlap or differ in terms of security controls. You can automate the data-gathering process to save time and effort.

Mainframes in the server room
Track compliance over time

Quickly gather trustworthy evidence that is time-stamped, immutable and from a clear source. Compliance is shown over time, not just a snapshot with a tool that “runs silently”.

Two business colleagues looking at a dual monitor setup in a modern office space discussing technical issues together.
Save time and money through compliance automation

Attempting to maintain your mainframe compliance manually, in an antiquated, periodic, labor-intensive process is not worth the risk. Automation of compliance preserves budget and staff focus.

Two office colleagues looking at a laptop
Enable continuous compliance

Translation of regulations to IBM Z and LinuxONE-specific controls add clarity. A centralized, interactive dashboard displays baseline standards. Time-stamped evidence can be captured for multiple industries.

A mature businessperson leading a project discussion with coworkers in the office
Control and track success

See how your new or changing business requirements can affect regulation compliance. Clear, jargon-free mapping to the regulations helps you control your business’ infrastructure.

Two colleagues gather around the laptop and shared reports
Streamline compliance

See how different regulations overlap or differ in terms of security controls. You can automate the data-gathering process to save time and effort.

Mainframes in the server room
Track compliance over time

Quickly gather trustworthy evidence that is time-stamped, immutable and from a clear source. Compliance is shown over time, not just a snapshot with a tool that “runs silently”.

Two business colleagues looking at a dual monitor setup in a modern office space discussing technical issues together.
Save time and money through compliance automation

Attempting to maintain your mainframe compliance manually, in an antiquated, periodic, labor-intensive process is not worth the risk. Automation of compliance preserves budget and staff focus.

Stay compliant and secure with IBM Z. Learn more about prime security with Linux on IBM Z and LinuxONE.

Tackle compliance anxiety in the mainframe era

Discover how modernizing mainframe compliance can ease regulatory anxiety and strength your organization's security posture in today's complex digital landscape. 

Read the blog

Related products

IBM zSecure audit

Measure and verify the effectiveness of your mainframe security policies and security compliance.

Learn more
IBM Cloud® Security and Compliance Center

Automate and centrally manage your organization’s compliance to regulatory and internal standards.

Learn more
Resource access control facility

Protect your mainframe resources with tools that manage and control access to valuable z/OS® data.

Learn more
Discover other IBM Z security products

Explore a broad portfolio of IBM Z security products.

Explore now

Frequently asked questions (FAQ)

The IBM Z Security and Compliance Center can be deployed from z15 or newer. In addition, it can be deployed natively on LinuxONE. IBM Z Security and Compliance Center can collect data from any system running z/OS 2.4 version or newer.

This solution can be deployed on Linux on IBM Z through OpenShift Container Platform. It can be deployed on z/OS with the support of IBM zCX Classic or IBM zCX Foundation for Red Hat® OpenShift®.

Yes, if you are running z/OS 2.4 or later.

It can be used for the listed standards:

  • PCI DSS
  • NIST SP800-53
  • CIS benchmarks
  • DORA
  • DISA STIGs

Supplementary standards will be considered in the future based on user feedback.

Yes, you can create your own profiles and groups of controls based on a selection of hundreds of technical checks that the IBM Z Security and Compliance Center can perform out of the box. You can also import an extensive set of predefined mappings as a basis for your security procedures.

Through this process, the application can be used to prepare your organization for regulatory frameworks not covered by the initially available predefined mappings. It can also support internal requirements that are specific to your organization.

Yes, for z/OS systems you can select which LPARs are included in the scope of your scan.

The IBM Z Security and Compliance Center automates the collection of compliance relevant data on IBM Z and Linux on IBM Z.

The application contains predefined 1-to-1 mappings of security controls written for IBM Z components (including RACF, Db2, IBM CICS, IBM IMS and IBM MQ) to requirements from regulatory frameworks (including PCI DSS). IBM SMEs defined these mappings and auditors validated them.

Moreover, the solution includes an interactive, customizable dashboard displaying the security controls validated for each requirement, as well as which resources passed and failed. The solution also reports on compliance drift: how compliance posture has changed from one point in time to another.

Yes. You can view detailed scan results in the IBM Z Security and Compliance Center dashboard or in a report generated by the application.

For each technical check, you can view a list of all the IBM Z resources that have passed and failed across multiple sysplexes.

You can also view the logic of each scan performed by the application to see exactly what it checked.

The IBM Z Security Compliance Center includes a microservice that sends an ENF signal to all compatible IBM Z components. These components generate compliance data in an enhanced SMF record, which is tailored specifically for this application.

Take the next step

Streamline your compliance. Schedule a no-cost 30-minute meeting with an IBM Z and LinuxONE representative and start your deployment process effortlessly in just five easy steps.

Get started
More ways to explore Documentation Support Community Lifecycle services and support