Book description
IBM® PowerSC provides a security and compliance solution that is optimized for virtualized environments on IBM Power Systems™ servers, running IBM PowerVM® and IBM AIX®. Security control and compliance are some of the key components that are needed to defend the virtualized data center and cloud infrastructure against ever evolving new threats. The IBM business-driven approach to enterprise security used in conjunction with solutions such as PowerSC makes IBM the premier security vendor in the market today.
This IBM Redbooks® deliverable helps IT and Security managers, architects, and consultants to strengthen their security and compliance posture in a virtualized environment running IBM PowerVM.
Table of contents
- Front cover
- Notices
- Preface
- Part 1 Business drivers and solution overview
-
Part 2 Technical concepts and deployment guidelines
- Chapter 3. Security and Compliance Automation
- Chapter 4. Real Time Compliance
-
Chapter 5. Trusted Logging
- 5.1 Component architecture
- 5.2 Deployment considerations
- 5.3 Detailed implementation
- 5.4 Installation
-
5.5 Working with Trusted Logging
- 5.5.1 Changing the local virtual log repository file system
- 5.5.2 Creating a virtual log on a single Virtual I/O Server
- 5.5.3 Accessing virtual log data on the Virtual I/O Server
- 5.5.4 Configuring shared storage pools
- 5.5.5 Demonstrating multipath failover
- 5.5.6 Configuring AIX auditing to use a virtual log
- 5.5.7 Configuring syslog to use a virtual log
- 5.5.8 The backup of Trusted Logging data on the Virtual I/O Server
- 5.5.9 Deleting virtual logs and virtual log target devices
- 5.6 Troubleshooting
- 5.7 Conclusion
-
Chapter 6. Trusted Network Connect and Patch Management
- 6.1 Component architecture
- 6.2 Detailed implementation
- 6.3 Deployment considerations
- 6.4 Installation
-
6.5 Working with Trusted Network Connect and Patch Management
- 6.5.1 Managing patch management repositories
- 6.5.2 Starting verification for the Trusted Network Connect client
- 6.5.3 Viewing the Trusted Network Connect server logs
- 6.5.4 Creating policies for the Trusted Network Connect client
- 6.5.5 Viewing the verification results of the Trusted Network Connect
- 6.5.6 Importing Trusted Network Connect certificates
- 6.5.7 Updating the Trusted Network Connect client
- 6.5.8 Verifying the update logs
- 6.6 Troubleshooting
- 6.7 Conclusion
- Chapter 7. Trusted Boot
- Chapter 8. Trusted Firewall
-
Chapter 9. Trusted Surveyor
- 9.1 Component architecture
- 9.2 Detailed implementation
- 9.3 Installation
-
9.4 Working with Trusted Surveyor
- 9.4.1 Logging on to Trusted Surveyor
- 9.4.2 Creating a domain
- 9.4.3 Viewing a domain
- 9.4.4 Changing the properties of a domain
- 9.4.5 Removing a domain
- 9.4.6 Viewing a snapshot
- 9.4.7 Saving a snapshot
- 9.4.8 Comparing snapshots
- 9.4.9 Removing a snapshot
- 9.4.10 Creating a probe
- 9.4.11 Viewing a probe
- 9.4.12 Changing the properties of a probe
- 9.4.13 Automatically deploying a public key for a probe
- 9.4.14 Manually deploying a public key for a probe
- 9.4.15 Generating a report
- 9.4.16 Using the CLI
- 9.5 Troubleshooting
- 9.6 Conclusion
- Appendix A. Trusted Firewall addendum
- Related publications
- Back cover
Product information
- Title: Managing Security and Compliance in Cloud or Virtualized Data Centers Using IBM PowerSC
- Author(s):
- Release date: January 2013
- Publisher(s): IBM Redbooks
- ISBN: None
You might also like
book
Simplify Management of IT Security and Compliance with IBM PowerSC in Cloud and Virtualized Environments
This IBM® Redbooks® publication provides a security and compliance solution that is optimized for virtualized environments …
book
IBM eServer Certification Study Guide - pSeries AIX System Administration
This redbook is designed as a study guide for professionals wishing to prepare for the certification …
book
IBM PowerHA SystemMirror Standard Edition 7.1.1 for AIX Update
This IBM® Redbooks® publication helps you install, tailor, and configure the new IBM PowerHA® SystemMirror® for …
book
Deploying Microsoft® Forefront® Unified Access Gateway 2010
Plan, design, and deploy Forefront United Access (UAG) with insights straight from the Forefront team at …