IBM Security zSecure Audit Rule-based Compliance Evaluation and Customization
Kurs
In
Beschreibung
-
Kursart
Kurs
The target audience for this advanced level course is security administrators, auditors, and compliance officers. Das Zentrum IBM präsentiert das folgende Programm, mit dem Sie Ihre Kompetenzen stärken sowie Ihre gesteckte Ziele erreichen können. In dem Kurs zu dieser Schulung gibt es verschiedene Module zur Auswahl und Sie können mehr über die angebotenen Thematiken erfahren. Einfach anmelden und Zugang zu den folgenden Themen erhalten
Hinweise zu diesem Kurs
You should have the following skills:
Basic knowledge of and experience with z/OS and RACF
Familiarity with the IBM Security zSecure Audit ISPF panel interface
Knowledge of and experience with the CARLa programming language
Meinungen
Themen
- IBM
- Compliance
- Audit
Inhalte
This course introduces the IBM Security zSecure Audit rule-based compliance evaluation framework.
The course discusses rule-based compliance evaluation concepts and includes an overview and demonstration of the supported compliance functions and reports. With the standard built-in compliance evaluation interface, you report the compliance of your systems against one or more of the supported external standards: STIG, GSD, or PCI-DSS.
The course teaches you how to customize the compliance evaluation for the supported standards to fit your company's requirements. Finally, you learn how to create a company-defined compliance standard.
Hands-on exercises are included to enforce the skills that are taught in this course so that you can experiment with the rule-based compliance evaluation interface.
Training Paths that reference this course are:
- Auditor skills for IBM Security zSecure
- Central Security Administrator skills for IBM Security zSecure
- Decentralized Local Security Administrator skills for IBM Security zSecure
Zusätzliche Informationen
- Explain the concept of rule-based compliance evaluation with zSecure Audit.
- Run compliance evaluations against the supported standards: GSD, STIG, and PCI-DSS.
- Use the compliance evaluation results to apply the applicable changes to comply with the applicable (external) standard.
- Customize compliance evaluation to fit with company security and audit policies.
- Build customized company-specific compliance standards, rules, and tests.
IBM Security zSecure Audit Rule-based Compliance Evaluation and Customization