IBM Tivoli and Cisco Network Card User Manual


 
Chapter 3. Component structure 47
Figure 3-4 depicts Security Compliance Manager’s high-level component
architecture, followed by a brief explanation.
Figure 3-4 IBM Tivoli Security Compliance Manager logical component architecture
Figure 3-4 shows:
Administration components Consist of a graphical user interface and a
command line interface (CLI). Used to manage
the Security Compliance Manager components.
Data collection component Build a framework for collecting security-relevant
configuration data from connected systems such
as operating systems, middleware components,
applications, firewalls, routers, and so on.
Compliance reporting Deliver different kinds of configurable reports for
audit purposes and correcting deviations.
Configuration
File
Executable
Firewall
Router
SCM
Operational
Report
SCM
Report
SCM
Server
SCM Proxy
SCM
Snapshots
SCM
Policies
SCM
Server
SCM
Database
Data Collection
Components
Compliance Report
Components
Administration
Components
Compliance Evaluation
Components
SCM
Admin GUI
SCM
Admin CLI
SCM Client
SCM Client
SCM
Collector
SCM
Collector
SCM
Collector
SCM
Collector
SCM
Collector
Windows Registry