Skip to main content

Securing Your Cloud: Assessing z/VM and Linux on IBM Z Security

A draft IBM Redbooks publication


Last updated on 21 December 2023

  1. .PDF (2.8 MB)

Share this page:   

IBM Form #: SG24-8353-01

Authors: Lydia Parziale, Brian Hugenbruch, Shrirang Kulkarni, Zdravka Oysolova, Mark Wilson and Karen Reed

    menu icon


    The cloud has become an integral part of the business technological landscape. As more and more workloads are being offloaded to IBM® Z based cloud environments, it is important to ensure that these workloads and environments are secure.

    In the ever-evolving landscape of information technology, innovation and adaptability are paramount. Cloud computing, virtualization, big data analytics, artificial intelligence and cybersecurity are just a few of the many trends shaping the way businesses operate and interact with their customers.

    The need for insightful, practical and up-to-date resources has never been more critical.

    This IBM Redbooks® publication describes the necessary steps to secure your environment for all of the components that are involved in an IBM Z® cloud infrastructure that uses IBM z/VM® and Linux on IBM Z.

    The audience for this book is IT architects, security consultants and those planning to use IBM Z for their cloud environments.

    Table of Contents

    Chapter 1. Introduction to security on IBM Z

    Chapter 2. IBM z/VM hypervisor

    Chapter 3. IBM Resource Access Control Facility Security Server for IBM z/VM

    Chapter 4. Security policy management on IBM z/VM

    Chapter 5. Securing a Cloud in the IBM z/VM environment

    Chapter 6. IBM z/VM and enterprise security

    Chapter 7. Linux on IBM Z security


    Special Notices

    The material included in this document is in DRAFT form and is provided 'as is' without warranty of any kind. IBM is not responsible for the accuracy or completeness of the material, and may update the document at any time. The final, published document may not include any, or all, of the material included herein. Client assumes all risks associated with Client's use of this document.