Book description
This IBM® Redbooks® publication provides a security and compliance solution that is optimized for virtualized environments on IBM Power Systems™ servers, running IBM PowerVM® and IBM AIX®. Security control and compliance are some of the key components that are needed to defend the virtualized data center and cloud infrastructure against ever evolving new threats. The IBM business-driven approach to enterprise security that is used with solutions, such as IBM PowerSC™, makes IBM the premier security vendor in the market today.
The book explores, tests, and documents scenarios using IBM PowerSC that leverage IBM Power Systems servers architecture and software solutions from IBM to help defend the virtualized data center and cloud infrastructure against ever evolving new threats.
This publication helps IT and Security managers, architects, and consultants to strengthen their security and compliance posture in a virtualized environment running IBM PowerVM.
Table of contents
- Front cover
- Notices
- Preface
- Chapter 1. IT security and Compliance Management
- Chapter 2. IBM PowerSC GUI Server
- Chapter 3. Compliance automation
-
Chapter 4. Real-Time File Integrity Monitoring
- 4.1 PowerSC Real-Time Compliance
-
4.2 AIX Trusted Execution
- 4.2.1 Components of Trusted Execution
- 4.2.2 Trusted Execution modes
- 4.2.3 Trusted Execution integration with PowerSC GUI
- 4.2.4 System integrity check with PowerSC GUI
- 4.2.5 Online Check with PowerSC GUI
- 4.2.6 TSD customization with PowerSC GUI
- 4.2.7 Best practice to enable TE in online mode
- 4.2.8 Updating an application that is integrated with TE
- 4.3 Linux auditd
- 4.4 FIM reporting with PowerSC GUI
-
Chapter 5. PowerSC Trusted Network Connect and Patch Management v1.2.0.0
- 5.1 Introduction
- 5.2 Component architecture
- 5.3 Simplifying management of security and compliance by using TNC
- 5.4 Deployment considerations
- 5.5 Installing TNCPM
-
5.6 Working with Trusted Network Connect and Patch Management
- 5.6.1 Verifying the Trusted Network Connect Client
- 5.6.2 Viewing the Trusted Network Connect Server logs
- 5.6.3 Viewing the verification results of the TTNCCs
- 5.6.4 Updating the Trusted Network Connect Client
- 5.6.5 Updating and verifying by using PowerSC GUI 1.2.0.0
- 5.6.6 New TNC functions provided in PowerSC GUI 1.2.0.1
- 5.6.7 Update logs
- 5.7 Troubleshooting
-
Chapter 6. Trusted Logging
- 6.1 Component architecture
- 6.2 Deployment considerations
- 6.3 Detailed implementation
- 6.4 Installation
-
6.5 Working with Trusted Logging
- 6.5.1 Changing the local virtual log repository file system
- 6.5.2 Creating a virtual log on a single Virtual I/O Server
- 6.5.3 Accessing virtual log data on the Virtual I/O Server
- 6.5.4 Configuring shared storage pools
- 6.5.5 Demonstrating multipath failover
- 6.5.6 Configuring AIX auditing to use a virtual log
- 6.5.7 Configuring syslog to use a virtual log
- 6.5.8 Backing up Trusted Logging data on the Virtual I/O Server
- 6.5.9 Deleting virtual logs and virtual log target devices
- 6.6 Troubleshooting
- 6.7 Conclusion
- Chapter 7. Trusted Boot
- Chapter 8. Trusted Firewall
- Appendix A. Trusted Firewall addendum
- Related publications
- Back cover
Product information
- Title: Simplify Management of IT Security and Compliance with IBM PowerSC in Cloud and Virtualized Environments
- Author(s):
- Release date: September 2019
- Publisher(s): IBM Redbooks
- ISBN: 9780738457970
You might also like
book
EU General Data Protection Regulation (GDPR) – An implementation and compliance guide, fourth edition
This bestselling guide is the ideal companion for anyone carrying out a GDPR (General Data Protection …
book
Learning SQL, 3rd Edition
As data floods into your company, you need to put it to work right away—and SQL …
book
Networking Fundamentals
Become well-versed with basic networking concepts such as routing, switching, and subnetting, and prepare for the …
scenario
MySQL Sandbox
Practice SQL queries on a MySQL server and the Sakila database. MySQL sandbox for working with …