Is There a Need to Identify and Build a Zero-trust Model for z/OS Applications?
Project and Program:
Application Architecture Development and Integration,
Application Development Integration and Infrastructure
Tags:
Proceedings,
SHARE Columbus 2022
A zero-trust model reinforces the need to "always verify". How does this apply
to traditional zOS applications? What are the areas within an application that
needs to be rechecked for compliance. What are the security loopholes that a zOS
application can encounter. Can this be automated into a pipeline? This session
will be more of a discussion to talk and address these topics
Back to Proceedings File Library