89065: zCX Security: Recommended Best Practices and Considerations
In this session, we will review zCX configurations and recommend security best
practices to consider during deployment of zCX instances in your installation.
Learn how to setup user IDs associated with zCX instance, configure VSAM data
set protection, started task user ID and PROC setup, zFS file system security,
enabling pervasive encryption for VSAM data sets, security considerations for
DVIPA network definitions and SERVAUTH profile setup, secure registry
configuration and zCX Docker user management considerations using LDAP or RACF.