Speaker:
Glennon Bagsby, CEO, NewEra
Description: ZeroTrust is the Heart of Modern z/OS Security. Excess Access Checking is a key component of a Strong ZeroTrust Policy. “Trust but Verify” dictates that no one is given access because of role or duty. Such implied access rights are viewed as creating inherent system vulnerability, easily exploited when credential malfeasance is in play. Even practices such as limiting access to critical resources to specific users for a limited time, so called “Break Glass” or “OTP” systems, are out of date and no longer acceptable when viewed against the backdrop of today’s threat environment. What is required are automated processes. Such automated systems focus on the relationship between the user and a targeted resource, support layers of enforcement, provide and maintain backups, report all changes from the last backup, provide real-time documentation, log activity, and send alerts as necessary. We will explore the full functionality of The Control Editor (TCE) as your ZeroTrust Policy Enforcement Point and how it’s controls resource access can be easily implemented in steps that provide the precise level of control needed for compliance with governmental and industry regulations. TCE requires NO CHANGES to the controls defined by RACF, ACF2 or TSS.”