Security and compliance with automation, monitoring and reporting
Reduce audit prep to one week from one month, lowering team involvement by over 40%.
Keep automating current tracking despite regulatory drifts through a unified compliance dashboard.
Simplify processes and prevent misinterpretation of regulations by inexperienced users.
Automate data collection and validation to enhance compliance oversight visibility.
IBM Z Security and Compliance Center follows multiple industry standards to meet the increasing regulatory compliance requirements on a global scale.
The IBM Z Security and Compliance Center can be deployed from z15 or newer. In addition, it can be deployed natively on LinuxONE. IBM Z Security and Compliance Center can collect data from any system running z/OS 2.4 version or newer.
This solution can be deployed on Linux on IBM Z through OpenShift Container Platform. It can be deployed on z/OS with the support of IBM zCX Classic or IBM zCX Foundation for Red Hat® OpenShift®.
Yes, if you are running z/OS 2.4 or later.
It can be used for the listed standards:
Supplementary standards will be considered in the future based on user feedback.
Yes, you can create your own profiles and groups of controls based on a selection of hundreds of technical checks that the IBM Z Security and Compliance Center can perform out of the box. You can also import an extensive set of predefined mappings as a basis for your security procedures.
Through this process, the application can be used to prepare your organization for regulatory frameworks not covered by the initially available predefined mappings. It can also support internal requirements that are specific to your organization.
Yes, for z/OS systems you can select which LPARs are included in the scope of your scan.
The IBM Z Security and Compliance Center automates the collection of compliance relevant data on IBM Z and Linux on IBM Z.
The application contains predefined 1-to-1 mappings of security controls written for IBM Z components (including RACF, Db2, IBM CICS, IBM IMS and IBM MQ) to requirements from regulatory frameworks (including PCI DSS). IBM SMEs defined these mappings and auditors validated them.
Moreover, the solution includes an interactive, customizable dashboard displaying the security controls validated for each requirement, as well as which resources passed and failed. The solution also reports on compliance drift: how compliance posture has changed from one point in time to another.
Yes. You can view detailed scan results in the IBM Z Security and Compliance Center dashboard or in a report generated by the application.
For each technical check, you can view a list of all the IBM Z resources that have passed and failed across multiple sysplexes.
You can also view the logic of each scan performed by the application to see exactly what it checked.
The IBM Z Security Compliance Center includes a microservice that sends an ENF signal to all compatible IBM Z components. These components generate compliance data in an enhanced SMF record, which is tailored specifically for this application.