Security on z/OS
|
Previous topic |
Next topic |
Contents |
Glossary |
Contact z/OS |
PDF
Who is the security auditor? Security on z/OS |
|
|
Security audits are a way of examining a system, policy or process for violations and exposures. Auditing is the process of ensuring that the information processing system
(hardware, software, liveware, middleware, policies, and procedures) complies
with the installation security policy. Auditing may be:
Security audits are a catch-all that have been used for actions ranging from checks on physical security to implementation of the information security plan. The two types of information security audits can be termed preemptive and reactive. As their names indicate, preemptive audits test security controls. Reactive audits respond to potential security breach events. |
Copyright IBM Corporation 1990, 2010 |