Rocket® Mainframe Compliance Assessment Services

Ensure mainframe compliance and alignment with corporate policy. 

Talk to an expert

Does your mainframe suffer from excessive access?

How do you know? Our compliance assessment software help you prevent privileged access while ensuring that your security configuration parameters are in sync with your corporate security policy. We’ll set you up to identify exactly where your critical system configurations may be drifting in the future.

"33% conduct compliance assessments for their mainframes every one-to-two years, while a more proactive 56% undertake them annually."

Stay ahead of compliance challenges. All of them.

Without systematic attention to mainframe compliance, organizations face undue risk. By taking a base-lining approach to security configurations, security and risk management teams can build a continuous process for identifying where critical system configurations drift from policy while ensuring appropriate access for optimal compliance.

Rocket® Mainframe Compliance Assessment Services deliver a proactive approach to assessing mainframe compliance. Our services are designed and delivered by mainframe security teams with decades of knowledge and experience in protecting z/OS® systems and the data that resides on these systems.

circular graph

Ensure mainframe compliance with a comprehensive assessment

A comprehensive compliance assessment starts with a detailed discussion/definition of your needs and objectives. Next, we do a hands-on evaluation of the confidentiality and integrity of all physical and logical systems. Finally, we do a baseline assessment of your current operational environment against your Security Policy. An in-depth review of your current security and mainframe z/OS implementation is achieved using the Compliance Assessment Tool.

Go deep on your mainframe to ask and answer questions:

  • Are security parameters in sync with our corporate security policy?
  • Do users have the appropriate access for their job function?
  • How pervasive is excessive access?
  • Is our audit logging appropriate for the level of access given to privileged authorities?

A full assessment based on the DISA Stigs includes the following, and much more:

  • Operating System Control Parameter
  • System Access parameters
  • Authorizations
  • Separation of authority
  • Security database configurations
  • Implementation parameter settings
  • Number of users/groups/profiles/permissions
  • Role definitions
  • Users with the ability to bypass security
  • Password requirements

Resources

Use Case

Enable and Assess z/OS® Compliance

Article

Make the most of mainframe security services | CIO

Blog

Threat-hunting on the mainframe

Blog

The difference between compliance auditing and pen testing

Datasheet

Mainframe Security Services