O'Reilly logo

Securing Your Cloud: IBM z/VM Security for IBM z Systems and LinuxONE by Willian Rampazzo, Klaus Mueller, Klaus Egeler, Vic Cross, Edi Lopes Alves, Lydia Parziale

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

IBM z/VM hypervisor
This chapter describes the security aspects of z/VM facilities. It introduces how the z/VM hypervisor can provide basic security in its virtualization environment on IBM z Systems and how it can be improved with the installation of an external security manager (ESM), such as IBM Resource Access Control Facility (RACF).
Protecting information from unintended use is one key element of a secure IT environment. Basically, there are two different methods to ensure privacy of information:
Access control
Encryption methods
Access ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required