Skip to main content

Securing Your z/TPF Environment

An IBM Redpaper publication

thumbnail 

Published on 29 July 2024

  1. .PDF (14.8 MB)

Share this page:   

ISBN-10: 073846158X
ISBN-13: 9780738461588
IBM Form #: REDP-5740-00


Authors: Mark Gambino, Jamie Farmer, Angel Baez, Jennifer Chiarieri, Claire Durant, Chris Filachek, Luanne Jagich and Kelly Paesano

    menu icon

    Abstract

    Because of the financial impacts and brand reputation damage that can result from cyberattacks on your business, modernization of your z/TPF environment must be done with security at the forefront. This Redbook provides information about securing and enhancing the cybersecurity features of your z/TPF systems, ensuring both current and future needs are met.

    Table of Contents

    Introduction

    Security by design with risk management frameworks

    Understanding and reducing risk with the NIST Cybersecurity Framework

    Identifying your cybersecurity risks

    Protecting your z/TPF data and resources

    Detecting anomalies and security events

    Responding and recovering from security events

    Conclusion

    Appendix: z/TPF system and workload resiliency

    Appendix: Identifying your threat targets