IBM z/VM security
This chapter describes z/VM base protection and some software tools and hardware features that complement this environment. This chapter examines the security controls and features that are available to the z/VM operating system. It offers suggestions about what settings are most related to security and integrity.
Because z/VM is simultaneously a hypervisor and an operating system, its security considerations are different from a traditional operating system such as z/OS.
Protection against attempts to breach the security of ...