Best practices
In this chapter we provide a collection of best practices for securing System z when running a Linux environment, highlighting its unique features and also illustrating how taking advantage of such features can simplify system management.
The best practices to manage IT security are already well documented by several sources. The practices can certainly be used to also secure Linux on System z. However, several unique technologies that this platform leverages should be considered when you define the security policies. These technologies ...
Get Security for Linux on System z now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.