Skip to main content

Security for Linux on System z: Securing Your Network

Web Doc

thumbnail 

Published on 22 February 2013

  1. View in HTML

Share this page:   

IBM Form #: TIPS0981


Authors: Lydia Parziale, Jonathan Barney, Vic Cross, William Johnston, Eduardo Kienetz, Eric Marins, Nilesh Patel and Sri Venkatesen

menu icon

Abstract

The best practices to manage IT security are already documented by several sources. The practices can certainly be used to also secure Linux on System z. However, when you define the security policies, consider several unique technologies that this platform uses. These technologies can potentially harden the overall security by providing centralized management capabilities and reducing the number of control checks compared to a server farm that is based on physically distributed servers. This web document describes the best practices for securing your network. It was written as as part of IBM Redbooks publication Security for Linux on System z, SG24-7728.

Contents

Securing the network
The first step to set up your virtual environment in a secure fashion is to take care of the items in the following list. Your company most likely has specific requirements, in terms of information security, and these requirements must be considered when you build your own check list. This high-level list can be easily adapted and used for most environments.

 

Special Notices

The material included in this document is in DRAFT form and is provided 'as is' without warranty of any kind. IBM is not responsible for the accuracy or completeness of the material, and may update the document at any time. The final, published document may not include any, or all, of the material included herein. Client assumes all risks associated with Client's use of this document.