As workloads are being offloaded to IBM® z Systems™ based cloud environments, it is important to ensure that these workloads and environments are secure.
This IBM Redbooks® publication describes the necessary steps to secure your environment for all of the components that are involved in a z Systems cloud infrastructure that uses IBM z/VM® and Linux on z Systems.
The audience for this book is IT architects and those planning to use z Systems for their cloud environments.
Related Blog Posts
Table of contents
Chapter 1. Introduction to security on IBM z Systems
Chapter 2. IBM z/VM hypervisor
Chapter 3. IBM Resource Access Control Facility Security Server for IBM z/VM
Chapter 4. Security Policy Management on IBM z/VM
Chapter 5. Securing a Cloud on IBM z/VM environment
Chapter 6. IBM z/VM and enterprise security