Linux on System z security
This chapter provides a collection of preferred practices for securing System z when you are running a Linux environment. This chapter highlights its unique features and also illustrates how taking advantage of such features can simplify system management.
The preferred practices to manage IT security are documented by several sources. These practices can be used to secure Linux on System z. However, several unique technologies that this platform uses should be considered when you define the security policies. These technologies ...

Get Security on the IBM Mainframe: Volume 1 A Holistic Approach to Reduce Risk and Improve Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.