Security Policy Management on IBM z/VM
Most organizations have a security policy that typically states the rules for controlling access to data. There also are statements for data ownership and there are rules about granting the least access that is necessary for each role.
However, there might be few instructions about the practical scenario of implementation. There might be little mention of any of the IT platforms that are involved. Thus, there might be little or no link between that policy and the security procedures that must exist.
Organizations ...

Get Securing Your Cloud: IBM z/VM Security for IBM z Systems and LinuxONE now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.