Business context
In this chapter, we discuss enterprise mainframe security and audit management. Across the wide variety of companies that exploit mainframe technology, a range of security architectures are used, from little or no added security through to sophisticated architectures designed to allow for growth and extension as business requirements evolve. All of these architectures rely on the underlying security facilities provided by the z/OS mainframe operating system. This function is often performed by an IBM software product called the ...