Book description
As workloads are being offloaded to IBM® z Systems™ based cloud environments, it is important to ensure that these workloads and environments are secure.
This IBM Redbooks® publication describes the necessary steps to secure your environment for all of the components that are involved in a z Systems cloud infrastructure that uses IBM z/VM® and Linux on z Systems.
The audience for this book is IT architects and those planning to use z Systems for their cloud environments.
Table of contents
- Front cover
- Notices
- IBM Redbooks promotions
- Preface
- Chapter 1. Introduction to security on IBM z Systems
- Chapter 2. IBM z/VM hypervisor
-
Chapter 3. IBM Resource Access Control Facility Security Server for IBM z/VM
- 3.1 RACF z/VM concepts
- 3.2 Activating and configuring RACF
-
3.3 RACF management processes
- 3.3.1 DirMaint changes to work with RACF
- 3.3.2 RACF authorization concepts
- 3.3.3 Adding virtual machines and resources to the system and the RACF database
- 3.3.4 Securing your minidisks with RACF
- 3.3.5 Securing guest LANs and virtual switches with RACF
- 3.3.6 Labeled security and mandatory access control
- 3.3.7 Backing up the RACF database
- 3.3.8 RACF recovery options
- Chapter 4. Security Policy Management on IBM z/VM
- Chapter 5. Securing a Cloud on IBM z/VM environment
- Chapter 6. IBM z/VM and enterprise security
- Related publications
- Back cover
Product information
- Title: Securing Your Cloud: IBM z/VM Security for IBM z Systems and LinuxONE
- Author(s):
- Release date: October 2016
- Publisher(s): IBM Redbooks
- ISBN: 9780738442020
You might also like
book
CompTIA A+ Complete Review Guide: Exams 220-901 and 220-902, 3rd Edition
Complete, objective-by-objective review for the A+ exam The CompTIA A+ Complete Review Guide, 3 is your …
book
A Guide to Kernel Exploitation
A Guide to Kernel Exploitation: Attacking the Core discusses the theoretical techniques and approaches needed to …
book
Mastering GitLab 12
An expert guide to helping you use DevOps techniques with the latest GitLab version to optimize …
book
Gray Hat Hacking The Ethical Hacker's Handbook, Fifth Edition, 5th Edition
Cutting-edge techniques for finding and fixing critical security flaws Fortify your network and avert digital catastrophe …