Book description
LinuxONE is a hardware system designed to support and exploit the Linux operating system based on the value of its unique underlying architecture. LinuxONE can be used within a private and multi-cloud environment to support a range of workloads and service a variety of needs.
On LinuxONE, security is built into both the hardware and software.
This IBM® Redpaper publication gives a broad understanding of how to leverage the various security features that exploit and complement the LinuxONE hardware security features, such as these:
- Hardware accelerated encryption of data, delivered with near-zero overhead by the on-chip Central Processor Assist for Cryptographic Function (CPACF) and a dedicated Crypto Express adapter.
- Virtualization and industry leading isolation capabilities with PR/SM, EAL 5+ LPARs, DPM, KVM, and IBM z/VM®.
- The IBM Secure Service Container technology, which provides workload isolation, restricted administrator access, and tamper protection against internal threats, including from systems administrators.
- Other technologies that exploit LinuxONE security capabilities and deeper dives into practical use cases for these technologies.
This IBM Redpaper publication was written for IT executives, architects, specialists, security administrators, and others who consider security when using LinuxONE.
Table of contents
- Front cover
- Notices
- Preface
- Chapter 1. Introduction
- Chapter 2. Core Security Technologies on LinuxONE
- Chapter 3. Exploiters of Security on LinuxONE
- Chapter 4. Use cases
- Chapter 5. IBM Blockchain Platform with IBM LinuxONE
- Appendix A. Summary and Reference Guide
- Back cover
Product information
- Title: Maximizing Security with LinuxONE
- Author(s):
- Release date: October 2019
- Publisher(s): IBM Redbooks
- ISBN: 9780738458137
You might also like
book
Enhanced Cyber Security with IBM Spectrum Scale and IBM QRadar
Having appropriate storage for hosting business-critical data and advanced Security Information and Event Management software for …
book
Trusted Computing Platforms: TCPA Technology in Context
TCPA: Building computing platforms upon a solid foundation of trust. As businesses stake their very existence …
book
Scale up for Linux on LinuxONE
This book was written by IBM® IT specialists who have experience implementing Linux solutions on IBM …
book
IBM QRadar Version 7.3 Planning and Installation Guide
Abstract With the advances of technology and the reoccurrence of data leaks, cyber security is a …