Book description
This IBM® Redbooks® publication is a comprehensive guide that covers cloud security considerations for IBM Power Systems™. The first objectives of this book are to examine how Power Systems can fit into the current and developing cloud computing landscape and to outline the proven Cloud Computing Reference Architecture (CCRA) that IBM employs in building private and hybrid cloud environments.
The book then looks more closely at the underlying technology
and hones in on the security aspects for the following
subsystems:
IBM Hardware Management Console
IBM PowerVM
IBM PowerKVM
IBM PowerVC
IBM Cloud Manager with OpenStack
IBM Bluemix
This publication is for professionals who are involved in security
design with regard to planning and deploying cloud infrastructures
using IBM Power Systems.
Table of contents
- Front cover
- Notices
- IBM Redbooks promotions
- Preface
- Part 1 Business context and architecture considerations
- Chapter 1. Business context
- Chapter 2. Cloud security reference architecture
- Part 2 Power cloud components
- Chapter 3. IBM Hardware Management Console (HMC) security
-
Chapter 4. IBM PowerVM security
- 4.1 IBM PowerVM overview
- 4.2 Isolation requirements for logical partitions
- 4.3 Domains of IBM Power processor cores
- 4.4 Processor core access modes
- 4.5 POWER Hypervisor
- 4.6 Memory isolation
- 4.7 I/O isolation
- 4.8 Logical partitions (LPARs)
- 4.9 Virtualization of I/O devices
- 4.10 Security of DLPAR operations
- 4.11 IBM PowerVM security management with PowerSC
- 4.12 Secure Logical Partition Mobility
- 4.13 PowerVM NovaLink
- 4.14 Conclusion
- Chapter 5. IBM PowerKVM security
- Chapter 6. IBM PowerVC security
-
Chapter 7. IBM Cloud Manager with OpenStack security
- 7.1 Introducing IBM Cloud Manager with OpenStack
- 7.2 Identity
-
7.3 Access
- 7.3.1 Access to provisioned virtual machines
- 7.3.2 Updating the default security policy
- 7.3.3 Generating and uploading SSH keys
- 7.3.4 Configuring SSL communication with self-service portal
- 7.3.5 Configuring SSL for OpenStack Dashboard
- 7.3.6 Network Time Protocol (NTP)
- 7.3.7 Session timeout and lockout
- 7.3.8 TCP/IP ports used by IBM Cloud Manager with OpenStack
- 7.4 Patch management
- 7.5 Audit and logging
- 7.6 Image management
- 7.7 REST API security
- 7.8 Conclusion
- Chapter 8. IBM Bluemix secure gateway
- Part 3 Appendixes
- Appendix A. Troubleshooting SSL and TLS handshake
- Appendix B. VMware vRealize Automation for Power Systems
- Related publications
- Back cover
Product information
- Title: Cloud Security Guidelines for IBM Power Systems
- Author(s):
- Release date: March 2016
- Publisher(s): IBM Redbooks
- ISBN: 9780738441429
You might also like
book
Cloud Security Guidelines for IBM Power Systems
This IBM® Redbooks® publication is a comprehensive guide that covers cloud security considerations for IBM Power …
book
CCSP Self-Study: Securing Cisco IOS Networks (SECUR)
Cisco authorized self-study book for CCSP 642-501 foundation learning Identify the lineup of Cisco Systems network …
book
Troubleshooting Virtual Private Networks
Master advanced troubleshooting techniques for IPSec, MPLS Layer-3, MPLS Layer-2 (AToM), L2TPv3, L2TPv2, PPTP, and L2F …
book
UNIX® Shells by Example, Third Edition
Five UNIX shells, three essential utilities, one indispensable resource! Learn UNIX shell programming the easy way, …