As more and more workloads are being offloaded to IBM z Systems™ based cloud environments, it has become of paramount importance to ensure that these workloads, and environments, are secure from top to bottom and front to back.
This IBM® Redbooks® publication takes the reader through the steps necessary to secure your environment from the hardware level through all of the components involved in a z Systems cloud infrastructure using IBM z/VM® and Linux on IBM z™ systems.
Table of contents
Chapter 1. Chapter 1 - Introduction to z Security
Chapter 2. z/VM Hypervisor
Chapter 3. RACF Security Server for z/VM
Chapter 4. Security Policy Management on z/VM
Chapter 5. Securing a Cloud on z/VM
Chapter 6. z/VM and Enterprise Security
These pages are Web versions of IBM Redbooks- and Redpapers-in-progress. They are published here for those who need the information now and may contain spelling, layout and grammatical errors.
This material has not been submitted to any formal IBM test and is published AS IS. It has not been the subject of rigorous review. Your feedback is welcomed to improve the usefulness of the material to others.
IBM assumes no responsibility for its accuracy or completeness. The use of this information or the implementation of any of these techniques is a customer responsibility and depends upon the customer's ability to evaluate and integrate them into the customer's operational environment.