Book description
This IBM® Redbooks® publication is a comprehensive guide that covers cloud security considerations for IBM Power Systems™. The first objectives of this book are to examine how Power Systems can fit into the current and developing cloud computing landscape and to outline the proven Cloud Computing Reference Architecture (CCRA) that IBM employs in building private and hybrid cloud environments.
We then look more closely at the underlying technology and hone
in on the security aspects for the following subsystems:
IBM Hardware Management Console
IBM PowerVM®
IBM PowerKVM
IBM PowerVC
IBM Cloud Manager with OpenStack
This publication is geared toward professionals who are involved in
security design and implementation regarding planning and deploying
cloud infrastructures using IBM Power Systems.
Table of contents
- Front cover
- Notices
- IBM Redbooks promotions
- Preface
- Part 1 Business context and architecture considerations
- Chapter 1. Business context
- Chapter 2. Cloud security reference architecture
- Part 2 Power cloud components
- Chapter 3. IBM Hardware Management Console security
-
Chapter 4. IBM PowerVM security
- 4.1 IBM PowerVM overview
- 4.2 Isolation requirements for logical partitions
- 4.3 IBM Power processors
- 4.4 POWER Hypervisor
- 4.5 Memory isolation
- 4.6 I/O isolation
- 4.7 Logical partitions (LPARs)
- 4.8 Virtualization of I/O devices
- 4.9 IBM PowerVM security management with PowerSC
- 4.10 Secure Logical Partition Mobility
- Chapter 5. IBM PowerKVM security
- Chapter 6. IBM PowerVC security
-
Chapter 7. IBM Cloud Manager with OpenStack security
- 7.1 Introducing IBM Cloud Manager with OpenStack
- 7.2 Identity
-
7.3 Access
- 7.3.1 Access to provisioned virtual machines
- 7.3.2 Updating the default security policy
- 7.3.3 Generating and uploading SSH keys
- 7.3.4 Configuring SSL communication with self-service portal
- 7.3.5 Configuring SSL for OpenStack Dashboard
- 7.3.6 Network Time Protocol
- 7.3.7 Session timeout and lockout
- 7.3.8 TCP/IP ports used by IBM Cloud Manager with OpenStack
- 7.4 Patch management
- 7.5 Audit and logging
- 7.6 Image management
- 7.7 REST API security
- 7.8 Conclusion
- Part 3 Appendixes
- Appendix A. Troubleshooting SSL and TLS handshake
- Related publications
- Back cover
-
IBM System x Reference Architecture for Hadoop: IBM InfoSphere BigInsights Reference Architecture
- Introduction
- Business problem and business value
- Reference architecture use
- Requirements
- InfoSphere BigInsights predefined configuration
- InfoSphere BigInsights HBase predefined configuration
- Deployment considerations
- Customizing the predefined configurations
- Predefined configuration bill of materials
- References
- The team who wrote this paper
- Now you can become a published author, too!
- Stay connected to IBM Redbooks
- Notices
Product information
- Title: Cloud Security Guidelines for IBM Power Systems
- Author(s):
- Release date: January 2015
- Publisher(s): IBM Redbooks
- ISBN: None
You might also like
book
Cloud Security Guidelines for IBM Power Systems
This IBM® Redbooks® publication is a comprehensive guide that covers cloud security considerations for IBM Power …
book
Securing Data on Threat Detection by Using IBM Spectrum Scale and IBM QRadar: An Enhanced Cyber Resiliency Solution
Having appropriate storage for hosting business-critical data and advanced Security Information and Event Management (SIEM) software …
book
IBM eServer Certification Study Guide - pSeries AIX System Administration
This redbook is designed as a study guide for professionals wishing to prepare for the certification …
book
IBM Power Systems HMC Implementation and Usage Guide
The IBM® Hardware Management Console (HMC) provides to systems administrators a tool for planning, deploying, and …