Figure 3-4depicts Security Compliance Manager’s high-level component architecture, followed by a brief explanation.

 

Compliance Report

 

 

Components

 

 

SCM

SCM

 

 

Report

Operational

 

 

Report

 

 

 

 

SCM

 

 

SCM

Admin GUI

 

 

 

 

 

Snapshots

Administration

 

 

 

Components

SCM

SCM

Compliance Evaluation

 

 

Server

Database

Components

 

 

SCM

 

 

SCM

Admin CLI

 

 

 

 

Policies

 

 

 

 

SCM Client

SCM Proxy

 

 

SCM

 

 

 

SCM

 

 

 

SCM

 

 

 

Collector

 

 

 

Collector

 

 

 

Collector

SCM Client

 

 

 

 

 

 

SCMSCM

 

Windows Registry

Collector

 

Collector

 

 

Configuration

Router

 

 

File

 

 

 

 

 

Executable

Firewall

 

 

Data Collection

 

 

Components

 

Figure 3-4 IBM Tivoli Security Compliance Manager logical component architecture

Figure 3-4shows:

Administration components Consist of a graphical user interface and a command line interface (CLI). Used to manage the Security Compliance Manager components.

Data collection component Build a framework for collecting security-relevant configuration data from connected systems such as operating systems, middleware components, applications, firewalls, routers, and so on.

Compliance reporting

Deliver different kinds of configurable reports for

 

audit purposes and correcting deviations.

Chapter 3. Component structure 47

Page 65
Image 65
IBM Tivoli and Cisco manual Compliance reporting, Administration