Exploring security and compliance use cases
In this chapter, we explore several use case scenarios in which IBM Z Security and Compliance Center can play a role in the journey toward continuous compliance. We describe how this solution can be used by the different security team members in your organization. We show how IBM Z Security and Compliance Center can be used to prepare for audits, validate system settings, and create reports for auditors to review.
This chapter covers the following topics:
Get Keeping Up With Security and Compliance on IBM Z now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.