Linux on System z security
This chapter provides a collection of preferred practices for securing System z when you are running a Linux environment. This chapter highlights its unique features and also illustrates how taking advantage of such features can simplify system management.
The preferred practices to manage IT security are documented by several sources. These practices can be used to secure Linux on System z. However, several unique technologies that this platform uses should be considered when you define the security policies. These technologies ...