Securing Your Cloud: IBM Security for LinuxONEAs workloads are being offloaded to IBM® LinuxONE based cloud environments, it is important to ensure that these workloads and environments are secure. This IBM Redbooks® publication describes the necessary steps to secure your environment from the hardware level through all of the components that are involved in a LinuxONE cloud infrastructure that use Linux and IBM z/VM®. The audience for this book is IT architects, IT Specialists, and those users who plan to use LinuxONE for their cloud environments. |
What people are saying - Write a review
We haven't found any reviews in the usual places.
Common terms and phrases
active administrator allows application attribute audit authentication authorization cluster command communication complete components compute configuration connections containers copy create cryptographic customers default defined definitions deployed described device DirMaint disk Domain enabled encryption ensure Enter enterprise entry environment Example EXEC exit Figure functions GRANT guest hardware helps IBM Cloud Private IBM LinuxONE implement important includes infrastructure installation integration Kubernetes Linux LOGON machines microservices minidisk modify node Note OpenStack operating option organization output password perform PERMIT platform possible profiles programs protected provides RACF database RACFVM Ready records request RPIDIRCT Secure Service server shared shown in Example shows single SMAPI SPECIFIED statement updated user ID utility virtual VSWITCH workloads xCAT z/VM