← Return to Blog Home

Mainframe Security for Banking: How Financial Institutions Protect Core Banking Systems on IBM Z

Lindsay Kleuskens

February 12, 2026

How banks protect core banking data on IBM Z with tokenization, pervasive encryption, and agentless deployment, without modifying COBOL.

Mainframe security for banking protects the data flowing through IBM Z systems, which nearly all of the world's top 100 banks depend on for core operations. 

Mainframes support the vast majority of global card‑transaction volume, including a still large portion of credit‑card transactions.

The most critical threats, however, aren’t external breaches, but actually cleartext data exposure in DB2 databases and TN3270 terminal sessions, privileged access abuse through over-entitled Resource Access Control Facility (RACF) accounts, and invisible Customer Information Control System (CICS) transaction blind spots that enterprise monitoring platforms cannot detect. 

Banks that lead in mainframe security combine pervasive encryption and agentless tokenization to protect data at every point it is stored, accessed, and replicated, all without modifying legacy code or consuming additional mainframe processing capacity.

What is Mainframe Security for Banking?

Mainframe security for banking is not a subset of general enterprise security. It is a distinct discipline built on a fundamentally different platform, threat model, and regulatory landscape than anything in the distributed or cloud world.

IBM Z and z/OS are purpose-built for high-volume, low-latency transactional workloads

As a result, security controls must integrate with platform-native constructs – i.e., RACF, Access Control Facility 2 (ACF2), Top Secret (TSS), the System Authorization Facility (SAF), and System Management Facilities (SMF) records – without destabilizing the COBOL, PL/I, and Java applications that power daily banking operations.

The critical distinction: banking mainframes process regulated financial data – i.e., Primary Account Numbers (PANs), account balances, personally identifiable information (PII) – under multiple overlapping compliance regimes simultaneously. 

Likewise, Payment Card Industry Data Security Standard (PCI DSS), Sarbanes-Oxley Act (SOX), Federal Financial Institutions Examination Council (FFIEC) guidance, and General Data Protection Regulation (GDPR) all impose requirements on the same data flowing via the same systems.

This is why mainframe security for banking demands a hierarchy: 

  • First, data protection
  • Second, access control
  • Third, monitoring, 
  • Fourth, vulnerability management. 

Access controls protect the perimeter. Tokenization and encryption protect the data itself, so that even when perimeter controls fail, the exposed information is useless to attackers.

(See our guide for a deeper look at how mainframe security software works across enterprise environments.)

Why Do Banks Still Rely on Mainframes for Core Banking?

Banks are not holding onto mainframes due to inertia; rather, they are investing in IBM Z because no alternative platform matches the combination of transaction throughput, reliability, and hardware-rooted security that core banking demands.

Many large enterprises still operate mainframes, with financial services representing the largest concentration. 

IBM reports that mainframes process over 30 billion transactions per day, with approximately 70% of all financial transactions touching IBM Z infrastructure at some point in the processing chain (IBM/theCUBE).

Capability IBM Z Mainframe Cloud / Distributed
Transaction throughput Thousands of TPS with sub-second response Variable; latency-sensitive under load
Uptime SLA 99.999% with HyperSwap failover 99.95%–99.99% typical
Hardware security Crypto Express HSMs, CPACF acceleration, Secure Execution Software-based encryption, shared HSM pools
Regulatory readiness Mature SMF audit trails, RACF logging, built-in compliance evidence Shared responsibility model; customer configures controls
Data integrity Decimal arithmetic for 100% financial calculation accuracy Floating-point rounding risks for financial operations

75% or more of the more than 2,500 global IT executives surveyed by the IBM Institute for Business Value rate mainframes as equal to or better than cloud computing in total cost of ownership. More than 70% of banking corporate data still resides on the mainframe.

The question for banking CISOs is not whether to keep the mainframe. It is about securing the data on it while connecting it to everything else.

What are the Biggest Mainframe Security Threats Facing Banks?

Banking mainframes face a distinct threat landscape compared to distributed environments. 

The high value of the data they process – e.g., account balances, PANs, transaction histories – combined with the unique characteristics of the IBM Z platform, creates attack surfaces that general-purpose security tools do not address.

The average cost of a data breach now stands at $4.88 million, according to IBM's 2024 Cost of a Data Breach Report. Financial services firms face costs above this average.

Privileged Access Abuse

RACF administrators and system programmers hold root-level access to mainframe datasets, transaction definitions, and security configurations. 

A rogue or compromised admin can modify transaction records, disable audit logging, or access customer financial data across every application on the system.

Operational reality: most mainframe audit findings are less about sophisticated external attacks and more about over-entitlement, shared service accounts, and "temporary" elevated access that becomes permanent.

CICS Transaction Blind Spots

CICS processes millions of real-time banking transactions – e.g., fund transfers, balance inquiries, card authorizations – but requires mainframe-specific collectors/parsers and normalization (often via SMF pipelines). 

Fraudulent card authorizations and unauthorized fund transfers can pass through CICS without triggering a single alert in your enterprise security operations center.

Cleartext Data Exposure

This is the leading threat to mainframe security. Sensitive information – e.g., PANs, Social Security numbers, account balances – is frequently stored in cleartext in DB2 tables, Virtual Storage Access Method (VSAM) files, batch job outputs, and TN3270 terminal sessions.

TN3270 streams data directly to user screens using a protocol designed decades before modern data loss prevention existed. DB2 databases often store customer records without field-level encryption or tokenization. 

When this data replicates to downstream systems for analytics or fraud detection, it crosses trust boundaries in cleartext.

A financial services organization addressed this by deploying agentless dynamic masking on TN3270 sessions and tokenization on DB2 replication flows, eliminating cleartext exposure without modifying a single line of legacy code.

Harvest Now, Decrypt Later

Attackers are collecting encrypted banking data today and storing it for future decryption when quantum computers can break current cryptographic algorithms. Credit card data has a 3–5 year value window. Mortgage data has a lifespan of 15–30 years.

Non-Production Data Sprawl

Production data cloned to User Acceptance Testing (UAT), quality assurance (QA), and training environments represents a major unaddressed banking threat. 

These environments carry broader access permissions, fewer patches, and less monitoring, but they contain the same real customer data as production.

Banks run continuous release cycles for mobile banking, core system upgrades, and regulatory reporting changes. Every UAT environment is a copy of production with real PANs and PII. 

A global financial services organization with banking operations across 11 countries discovered that its previous test data management solution routinely broke downstream systems when it randomized data without preserving format dependencies.

How Do Banks Secure IBM Z Mainframes? 

Effective mainframe security for banking is not a single product. It is a layered architecture where each control addresses a specific threat, and the most important layer is the one closest to the data.

Security Layer What It Does Threat Addressed Key Technologies
Data-centric protection Tokenizes and masks sensitive fields so data is useless if stolen Cleartext exposure, breach impact, non-prod sprawl Agentless tokenization, dynamic masking, format-preserving tokens
Access control & identity Authenticates users, enforces least privilege Privileged access abuse, insider threats RACF, ACF2, TSS, MFA, SAF
Pervasive encryptio Encrypts data at rest and in transit at hardware speed Data interception, breach exposure IBM Crypto Express, AES-256, CP Assist for Cryptographic Functions (CPACF)
Real-time fraud detection AI-powered anomaly detection on live transactions Fraudulent card authorizations IBM Telum processor, on-chip inferencing
SIEM integration Correlates mainframe events with enterprise security Cross-platform attacks, CICS blind spots SMF record collection, mainframe-to-SIEM connectors
Quantum-safe cryptography Protects against future quantum decryption Harvest now, decrypt later NIST PQC algorithms (ML-KEM, ML-DSA), IBM z17
Confidential computing Isolates workloads in hardware trusted execution environments Insider threats, admin abuse IBM Secure Execution for Linux on Z

Note the table order. Data-centric protection sits at the top because it is the last line of defence. If access controls fail, if encryption keys are compromised, but if a malicious insider bypasses monitoring, tokenized data remains useless to the attacker.

For a detailed comparison of mainframe security tools, see our companion guide.

What Regulatory Frameworks Drive Mainframe Security in Banking?

Banking compliance is not a single mandate; rather, it is a stack of overlapping requirements that all converge on the same mainframe data. 

Your CISO must demonstrate that the same DB2 table meets PCI DSS, SOX, FFIEC, GDPR, and potentially the Digital Operational Resilience Act (DORA) simultaneously.

Regulation Key Requirement Mainframe Implication
PCI DSS v4.0 Render stored PANs unreadable (Req. 3); encrypt in transit (Req. 4); restrict access (Req. 7) Tokenize PANs in DB2; mask on TN3270 screens; protect non-prod test data containing card data
SOX Section 404 Internal controls over financial reporting; segregation of duties Audit trails for batch jobs affecting the general ledger; RACF access reviews with documented evidence
FFIEC Guidance Encryption in financial services; examiner access to documented controls Pervasive encryption across datasets; documented RACF/ESM configurations for examiner review
GDPR / DORA Data protection by design; operational resilience Tokenize EU customer data on mainframe; demonstrate recovery and resilience of mainframe workloads
NY DFS 23 NYCRR 500 Encrypt nonpublic information at rest and in transit Pervasive encryption for data at rest; tokenization for fields in DB2 that transit to non-mainframe systems
GLBA Safeguards Rule Protect customer financial information Comprehensive access control and data protection across all mainframe channels, including TN3270

SOX compliance expenses range from $181,300 for smaller institutions to over $2 million for large banks (Protiviti). These costs are driven largely by the manual effort required to produce audit evidence from mainframe environments.

Operational reality: a simple auditor request can trigger weeks of mainframe team effort when data is spread across DB2 tables, VSAM files, batch outputs, and non-production copies. 

Automated data discovery and classification tools that maintain a continuous inventory of sensitive data convert this from a fire drill into a standing report.

How Are Banks Modernizing Mainframe Security Without Disruption?

The central tension in banking mainframe modernization is that the systems you most need to secure are the ones you least afford to disrupt. Ripping out and replacing infrastructure that processes trillions in daily transactions is not viable.

Modernize in Place

Banks are refactoring COBOL alongside Java rather than replacing it. 

Atruvia AG, which supports over 800 cooperative banks in Germany with nearly 100 billion annual transactions running on IBM Z, modernized 85% of core banking transactions by writing RESTful services in Java alongside existing COBOL, improving workload performance 3X without a platform migration.

Hybrid Cloud Integration

The 2025 BMC Mainframe Survey found that among financial services organizations prioritizing cloud technologies, nearly half (47%) are connecting the mainframe to cloud-based workloads. 

Banks are not choosing between mainframes and the cloud; instead, they are connecting both through API gateways and modern integration patterns.

The security challenge: every connection point between mainframe and cloud is a trust boundary crossing. Data protected within the z/OS perimeter must remain protected as it flows to analytics platforms, SaaS applications, and mobile banking APIs. 

See our guide on mainframe-to-cloud data pipeline security for additional guidance on migrating or connecting mainframe data to other environments.

Agentless Data Protection

This is where the conventional approach breaks down – and where banks most need a different model. Most mainframe security tools require installing software agents directly on z/OS. 

For a production banking mainframe carrying $10.4 trillion in annual card transactions, this introduces three unacceptable risks: 

  • Operational instability from new software on a platform optimized over decades
  • Scarce COBOL developer time consumed by code modifications, 
  • Increased Million Instructions Per Second (MIPS) consumption that directly raises IBM licensing costs.

A financial services organization solved this by implementing DataStealth's agentless platform to secure IBM DB2 databases and TN3270 terminal sessions without installing a single agent on the mainframe. The results:

  • Zero COBOL changes. No modifications to legacy application code.
  • Minimal MIPS impact. No additional mainframe processing consumption.
  • DB2 tokenization. Sensitive data in IBM DB2 databases was replaced with irreversible tokens.
  • TN3270 dynamic masking. Role-based masking was applied to legacy terminal sessions in real time.
  • Downstream protection. Data was secured as it was replicated from the mainframe to the downstream systems.
  • Unified visibility. Single platform covering both database replication and terminal access channels.

This works because protection occurs in network traffic, not on the mainframe itself. 

The mainframe continues processing transactions exactly as before. The platform operates inline, communicating with the mainframe using its native protocols, i.e., no agents, no code changes, no performance impact.

Best Practices: Securing Core Banking Systems on IBM Z

1. Enforce Zero Trust on the Mainframe

Treat every mainframe session as untrusted. 

Apply least-privilege access through RACF or your External Security Manager (ESM), require multi-factor authentication (MFA) for all privileged accounts, and continuously verify every access request. 

Zero trust on the mainframe means microsegmenting Logical Partition (LPAR) workloads and eliminating shared service accounts that bypass individual accountability.

2. Integrate Mainframe Events into Enterprise SIEM

Stop treating the mainframe as a security island. 

Feed SMF records, RACF events, CICS transaction logs, and DB2 access logs into your enterprise SIEM. Your security operations center needs visibility into the same platform that processes your most valuable data.

Products like Precisely Ironstream and BMC AMI Security provide the mainframe-to-SIEM connectors.

3. Tokenize Sensitive Data at the Source

Do not rely on encryption alone. Encryption is reversible; if keys are compromised, data is exposed.

Tokenization replaces PANs, account numbers, and PII with irreversible tokens that have no mathematical relationship to the original values. Even if your cloud analytics environment is breached, tokenized data is useless to attackers.

Format-preserving tokens pass legacy business logic rules (Luhn checks, field-length validation), ensuring existing COBOL workflows continue without modification. 

Mainframe systems that store only tokens can significantly reduce PCI scope, dramatically reducing your audit surface.

4. Automate Compliance Evidence Collection

Manual audit preparation consumes weeks of mainframe team effort every cycle. 

Deploy automated data discovery and data classification tools that maintain a continuous inventory of sensitive data across DB2 tables, VSAM files, and batch outputs. 

This converts SOX, PCI DSS, and FFIEC audit evidence from a periodic fire drill into a continuous compliance posture.

5. Protect Non-Production Environments

Your UAT and QA environments contain the same customer data as production, but with broader access, fewer patches, and less monitoring. This is a recognized breach vector that most banking mainframe security programs underaddress.

A global financial services organization replaced a legacy test data management solution that routinely broke downstream systems by randomizing data without accounting for format dependencies. 

DataStealth's platform preserved referential integrity, geographic accuracy, and downstream functional behaviour while removing real PII from every non-production environment. 

The solution automatically adapted to production schema changes without manual intervention, eliminating the fragile per-team workarounds that had consumed engineering resources.

Banking-Specific Mainframe Security Use Cases

Each banking operation has different data sensitivity, regulatory exposure, and access patterns. A comprehensive approach applies the right protection based on context, not a one-size-fits-all policy.

Banking Use Case Data at Risk Primary Regulation Recommended Control
Core ledger (GL, account balances) Account numbers, balances, transaction history SOX, GLBA Tokenize in DB2; RACF access control; SMF audit trails
Card processing (authorization, settlement) PANs, CVV, cardholder name PCI DSS v4.0 Tokenize PANs at source; mask on TN3270 teller screens
Cross-border payments (SWIFT, correspondent banking) Beneficiary PII, account routing numbers GDPR, DORA, data residency Encrypt in transit; tokenize before crossing jurisdictional boundaries
AML/KYC workflows Customer identity, transaction patterns, suspicious activity reports BSA/AML, FFIEC Dynamic masking for analyst access; tokenize in non-prod analytical environments

Protecting Your Core Banking Mainframe

Banking mainframes are under simultaneous pressure from regulatory changes, evolving threats, and modernization demands. 

Data-centric protection – i.e., tokenization and dynamic masking deployed without agents – addresses all three at once. It neutralizes cleartext exposure, reduces PCI and SOX audit scope, and enables secure hybrid cloud integration without touching legacy code.

See how a financial services organization secured its legacy mainframe data without agents or code changes. Or see how a global insurer protects non-production environments across 11 countries without breaking downstream systems. 

Schedule a demo to see how DataStealth protects mainframe data across banking environments.

Frequently Asked Questions


Why are mainframes still critical for banking security?

Mainframes remain critical for banking because they process the majority of global financial transactions with unmatched reliability and hardware-rooted security. IBM Z provides hardware-accelerated encryption through CPACF, integrated access controls through RACF, and AI-powered fraud detection through the Telum processor. Ninety-two of the top 100 banks run core operations on IBM mainframes (Forrester 2024).

What is the biggest security risk for banking mainframes?

The biggest risk is cleartext data exposure. Sensitive fields – e.g., PANs, account balances, PII – frequently exist unprotected in DB2 tables, VSAM files, batch outputs, and TN3270 sessions. Access controls determine who can reach the data, but they do not protect the data itself if those controls fail. Tokenization addresses this by making the data intrinsically useless to attackers.

How does tokenization protect banking data on mainframes?

Tokenization replaces sensitive data fields with non-sensitive tokens that have no mathematical relationship to the original values. The mapping exists only in a secure vault. On mainframes, agentless tokenization protects data in DB2 databases and TN3270 sessions without modifying COBOL code, consuming MIPS, or installing agents on z/OS.

What is pervasive encryption on IBM Z?

Pervasive encryption on IBM Z enables banks to encrypt data at rest, in transit, and in use using hardware-accelerated cryptographic functions built into the mainframe processor via CPACF. It applies encryption broadly across datasets and network connections without application code changes. The IBM z17 extends this with quantum-safe algorithms standardized by NIST.

Can banks secure mainframes without installing agents or modifying legacy code?

Yes. Agentless data protection platforms operate in the network traffic flow – i.e., intercepting data as it moves to and from the mainframe. A financial services organization used this approach to tokenize DB2 databases and apply dynamic masking to TN3270 sessions with zero agents installed, zero COBOL changes, and zero MIPS impact on mainframe processing.

How does PCI DSS v4.0 affect mainframe security in banking?

PCI DSS v4.0 requires banks to render stored PANs unreadable (Requirement 3), encrypt cardholder data in transit (Requirement 4), and restrict access on a need-to-know basis (Requirement 7). For mainframes, this means PANs in DB2 tables and VSAM files must be tokenized or encrypted, and access to those resources must be logged and auditable.

How do banks protect test data in non-production environments?

Banks deploy test data management platforms that tokenize or mask production data before it reaches UAT, QA, and training environments. The critical requirement is preserving referential integrity – e.g., geographic accuracy, format consistency, and relational dependencies – so downstream applications function normally. A global insurer replaced a broken legacy solution with a platform that automatically adapts to schema changes without manual intervention.

What is the harvest now, decrypt later threat to banking?

Harvest now, decrypt later describes adversaries collecting encrypted data today for future decryption when quantum computers reach sufficient capability. Mortgage data with a 15–30 year lifespan and long-term account records are at the highest risk. Banks should begin planning for quantum-safe cryptography now, using NIST-standardized algorithms supported on IBM z17.

About the Author:

Lindsay Kleuskens

Lindsay Kleuskens is a data security specialist helping enterprises reduce risk and simplify compliance. At DataStealth, she supports large organizations in protecting sensitive data by default, without interrupting user workflows. Her work focuses on PCI DSS scope reduction, preventing client-side attacks, and enabling secure third-party integrations without the security risk. Lindsay regularly shares practical insights on modern data protection challenges and helps organizations navigate evolving compliance standards with confidence.