This IBM® Redbooks® publication documents the strength and value of the IBM security strategy with System z® hardware and software. In an age of increasing security consciousness, IBM System z provides the capabilities to address the needs of today's business security challenges. This publication explores how System z hardware is designed to provide integrity, process isolation, and cryptographic capability to help address security requirements. We highlight the features of IBM z/OS® and other operating systems, which offer a variety of customizable security elements within the framework of the Security Server and Communication Server components. We discuss z/OS and other operating systems and additional software that leverage the building blocks of System z hardware to provide solutions to business security needs.
This publication's intended audience is technical architects, planners, and managers who are interested in exploring how the security design and features of System z, the z/OS operating system, and associated software address current issues such as data encryption, authentication, authorization, network security, auditing, ease of security administration, and monitoring.
Table of contents
Part 1. Direction and architecture
Chapter 1. Introduction: Why we are writing these books
Chapter 2. Foundation of a holistic security architecture
Chapter 3. Mainframe security architecture in the enterprise
Chapter 4. Hardware components
Chapter 5. Software components
Chapter 6. Security solutions for System z
Part 2. Guiding principles for System z security
Chapter 7. Organizing for security
Chapter 8. System z hardware
Chapter 9. z/OS security
Chapter 10. z/VM security
Chapter 11. Linux on System z security
These pages are Web versions of IBM Redbooks- and Redpapers-in-progress. They are published here for those who need the information now and may contain spelling, layout and grammatical errors.
This material has not been submitted to any formal IBM test and is published AS IS. It has not been the subject of rigorous review. Your feedback is welcomed to improve the usefulness of the material to others.
IBM assumes no responsibility for its accuracy or completeness. The use of this information or the implementation of any of these techniques is a customer responsibility and depends upon the customer's ability to evaluate and integrate them into the customer's operational environment.