The cloud is a part of the business technological landscape. As more workloads are being offloaded to IBM Z® based cloud environments, you must ensure that these workloads and environments are secure.
In the ever-evolving landscape of IT, innovation and adaptability are paramount. Cloud computing, virtualization, big data analytics, artificial intelligence, and cybersecurity are a few of the many trends shaping the way businesses operate and interact with their customers. The need for insightful, practical, and up-to-date resources is critical.
This IBM Redbooks® publication describes the necessary steps to secure your environment for all components that are involved in an IBM Z cloud infrastructure that uses IBM z/VM® and Linux on IBM Z.
The audience for this book is IT architects, security consultants, and those clients that plan to use IBM Z for their cloud environments.
Chapter 1. Introducing security on IBM Z
Chapter 2. IBM z/VM hypervisor
Chapter 3. IBM Resource Access Control Facility Security Server for IBM z/VM
Chapter 4. Security policy management on IBM z/VM
Chapter 5. Securing a cloud in the IBM z/VM environment
Chapter 6. IBM z/VM and enterprise security
Chapter 7. Linux on IBM Z security