O'Reilly logo

Security for Linux on System z by Sri Venkatesen, Nilesh Patel, Eric Marins, Eduardo Kienetz, William Johnston, Vic Cross, Jonathan Barney, Lydia Parziale

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Best practices
In this chapter we provide a collection of best practices for securing System z when running a Linux environment, highlighting its unique features and also illustrating how taking advantage of such features can simplify system management.
The best practices to manage IT security are already well documented by several sources. The practices can certainly be used to also secure Linux on System z. However, several unique technologies that this platform leverages should be considered when you define the security policies. These technologies ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required