Skip to main content

Securing Your z/TPF Environment

An IBM Redpaper publication

thumbnail 

Published on 29 July 2024

  1. .PDF (14.8 MB)

Share this page:   

ISBN-10: 073846158X
ISBN-13: 9780738461588
IBM Form #: REDP-5740-00


Authors: Mark Gambino, Jamie Farmer, Angel Baez, Jennifer Chiarieri, Claire Durant, Chris Filachek, Luanne Jagich and Kelly Paesano

menu icon

Abstract

Because of the financial impacts and brand reputation damage that can result from cyberattacks on your business, modernization of your z/TPF environment must be done with security at the forefront. This Redbook provides information about securing and enhancing the cybersecurity features of your z/TPF systems, ensuring both current and future needs are met.

Table of Contents

Introduction

Security by design with risk management frameworks

Understanding and reducing risk with the NIST Cybersecurity Framework

Identifying your cybersecurity risks

Protecting your z/TPF data and resources

Detecting anomalies and security events

Responding and recovering from security events

Conclusion

Appendix: z/TPF system and workload resiliency

Appendix: Identifying your threat targets