Getting started with IBM Z Security and Compliance Center
Topics in this part describe the IBM Z® Security and Compliance Center dashboard functions that systems programmers, security administrators, and systems administrators use for daily operations. Common tasks include viewing and analyzing compliance data from participating components and modifying resources and operations.
As the administrator, you are responsible for managing IBM Z Security and Compliance Center after it is installed. Common tasks include authorizing other users, operating the console, and applying periodic updates to the solution software.
When you work with the IBM Z Security and Compliance Center, you interact with several interrelated components, including profiles, goals, and scopes.

As shown in Figure 1, you can create profiles, associate them with goals, and enforce them across scopes that you specify to continuously validate your resources for compliance.
As the administrator, you start by creating the collector. Only one collector can be created. Then, you select pre-defined profiles or create custom profiles and associate them with scopes. The scopes designate specific areas of your business for validation against specific regulations or requirements.
With everything configured, the IBM Z Security and Compliance Center works in the background to monitor for potential risk by scanning your resources on a schedule that you determine. When the scans of your resources are complete, the service displays your detailed results in a dashboard. From the dashboard, you can download a detailed report that you can use to provide compliance data to stakeholders or external auditors.

Summary of the setup steps
- Log in to the IBM Z Security and Compliance Center.
- From the Settings page:
- Create the collector.
- Create a credential.
- Add the IBM Z connection from IBM Z settings.
- From the Scopes page:
- Create a scope.
- Map the credentials to the scopes you defined.
These actions are described in more detail in this chapter.
For typical use case scenarios, see the IBM Redbook Keeping Up With Security and Compliance on IBM zSystems.