Validating security and compliance postures
The intent of this chapter is to provide clarity around how IBM Z Security and Compliance Center GUI can function in everyday use. The chapter also helps ground the concepts that have been described so far by demonstrating how the use case scenarios that are described in Chapter 4, “Exploring security and compliance use cases” on page 51 can be deployed.
Before using IBM Z Security and Compliance Center to monitor and validate your security and compliance postures, plan the scopes, profiles, and goals ...
Get Keeping Up With Security and Compliance on IBM Z now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.