89065: zCX Security: Recommended Best Practices and Considerations
Project and Program:
Service Delivery,
Security and Compliance
Tags:
Proceedings,
SHARE DC 2025,
2025
In this session, we will review zCX configurations and recommend security best
practices to consider during deployment of zCX instances in your installation.
Learn how to setup user IDs associated with zCX instance, configure VSAM data
set protection, started task user ID and PROC setup, zFS file system security,
enabling pervasive encryption for VSAM data sets, security considerations for
DVIPA network definitions and SERVAUTH profile setup, secure registry
configuration and zCX Docker user management considerations using LDAP or RACF.
Back to Proceedings File Library