Security considerations
Modern computing systems must be operated in ways that provide protection from various security risks. z/VM provides several controls and facilities that can be used to enhance the security protection of the Linux systems it hosts.
In this chapter, we discuss security considerations for your z/VM environment that help to make it a more secure place for Linux systems to run.
This chapter includes the following topics:
Get The Virtualization Cookbook for IBM Z Volume 1: IBM z/VM 7.2 now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.