Skip to main content

Security for Linux on System z: Securing Your Network

Web Doc

thumbnail 

Published on 22 February 2013

  1. View in HTML

Share this page:   

IBM Form #: TIPS0981


Authors: Lydia Parziale, Jonathan Barney, Vic Cross, William Johnston, Eduardo Kienetz, Eric Marins, Nilesh Patel and Sri Venkatesen

    menu icon

    Abstract

    The best practices to manage IT security are already documented by several sources. The practices can certainly be used to also secure Linux on System z. However, when you define the security policies, consider several unique technologies that this platform uses. These technologies can potentially harden the overall security by providing centralized management capabilities and reducing the number of control checks compared to a server farm that is based on physically distributed servers. This web document describes the best practices for securing your network. It was written as as part of IBM Redbooks publication Security for Linux on System z, SG24-7728.

    Contents

     

    Special Notices

    The material included in this document is in DRAFT form and is provided 'as is' without warranty of any kind. IBM is not responsible for the accuracy or completeness of the material, and may update the document at any time. The final, published document may not include any, or all, of the material included herein. Client assumes all risks associated with Client's use of this document.