Zero Trust Architecture (ZTA), as defined by NIST SP 800-207, aim to ensure precise access decisions in compromised network environments. ZTA is a cybersecurity plan utilizing ZT concepts, encompassing component relationships, workflow planning, and access policies. Mainframe ZTA addresses weaknesses by focusing on granular user-resource relationships and bypassing perimeter security. NewEra Software’s Control Editor aligns with ZT standards, resolving these weaknesses as per NIST 800.
TCE Benifits
You’re in control
TCE empowers your team to uphold the strictest internal controls, meeting regulatory and best practice demands. It addresses fundamental issues of z/OS configuration control, tracking who makes changes with detailed records of what, when, where, and how. Your team’s work is managed and documented, ensuring absolute control.
ICE/TCE Builds and Maintains a Secondary Layer of Access Control
TCE streamlines the TSO/ISPF experience for z/OS System Programmers, guiding them through tasks to meet best practices. It balances productivity and security needs, compensating for weaknesses in Legacy Security Manager processes. By addressing issues like JCL alterations and access control, ICE/TCE enhances z/OS configuration control and accountability, ensuring system integrity.
TCE encourages best practices
Supporting and maintaining z/OS is intricate, but there are clear best practices. However, human error is common, and adherence to these practices can slip. Does your team always take backups, test changes, review histories, document changes, and notify relevant parties? Neglecting these steps can jeopardize z/OS integrity or availability. TCE automates tasks, aiding both experienced and new system programmers, reducing errors and system impact.