Securing Your Cloud: IBM Security for LinuxONE

Securing Your Cloud: IBM Security for LinuxONE PDF Author: Lydia Parziale
Publisher: IBM Redbooks
ISBN: 0738457949
Category : Computers
Languages : en
Pages : 274

Get Book Here

Book Description
As workloads are being offloaded to IBM® LinuxONE based cloud environments, it is important to ensure that these workloads and environments are secure. This IBM Redbooks® publication describes the necessary steps to secure your environment from the hardware level through all of the components that are involved in a LinuxONE cloud infrastructure that use Linux and IBM z/VM®. The audience for this book is IT architects, IT Specialists, and those users who plan to use LinuxONE for their cloud environments.

Securing Your Cloud: IBM Security for LinuxONE

Securing Your Cloud: IBM Security for LinuxONE PDF Author: Lydia Parziale
Publisher: IBM Redbooks
ISBN: 0738457949
Category : Computers
Languages : en
Pages : 274

Get Book Here

Book Description
As workloads are being offloaded to IBM® LinuxONE based cloud environments, it is important to ensure that these workloads and environments are secure. This IBM Redbooks® publication describes the necessary steps to secure your environment from the hardware level through all of the components that are involved in a LinuxONE cloud infrastructure that use Linux and IBM z/VM®. The audience for this book is IT architects, IT Specialists, and those users who plan to use LinuxONE for their cloud environments.

Maximizing Security with LinuxONE

Maximizing Security with LinuxONE PDF Author: Lydia Parziale
Publisher: IBM Redbooks
ISBN: 0738458988
Category : Computers
Languages : en
Pages : 80

Get Book Here

Book Description
LinuxONE® is a hardware system that is designed to support and use the Linux operating system based on the value of its unique underlying architecture. LinuxONE can be used within a private and multi-cloud environment to support a range of workloads and service various needs. On LinuxONE, security is built into the hardware and software. This IBM® Redpaper® publication gives a broad understanding of how to use the various security features that make the most of and complement the LinuxONE hardware security features, including the following examples: Hardware accelerated encryption of data, which is delivered with near-zero overhead by the on-chip Central Processor Assist for Cryptographic Function (CPACF) and a dedicated Crypto Express adapter. Virtualization and industry-leading isolation capabilities with PR/SM, EAL 5+ LPARs, DPM, KVM, and IBM z/VM®. The IBM Secure Service Container technology, which provides workload isolation, restricted administrator access, and tamper protection against internal threats, including from systems administrators. Other technologies that use LinuxONE security capabilities and practical use cases for these technologies. This publication was written for IT executives, architects, specialists, security administrators, and others who consider security for LinuxONE.

Securing Your Cloud: IBM z/VM Security for IBM z Systems and LinuxONE

Securing Your Cloud: IBM z/VM Security for IBM z Systems and LinuxONE PDF Author: Lydia Parziale
Publisher: IBM Redbooks
ISBN: 073844202X
Category : Computers
Languages : en
Pages : 196

Get Book Here

Book Description
As workloads are being offloaded to IBM® z SystemsTM based cloud environments, it is important to ensure that these workloads and environments are secure. This IBM Redbooks® publication describes the necessary steps to secure your environment for all of the components that are involved in a z Systems cloud infrastructure that uses IBM z/VM® and Linux on z Systems. The audience for this book is IT architects and those planning to use z Systems for their cloud environments.

Scale up for Linux on LinuxONE

Scale up for Linux on LinuxONE PDF Author: Lydia Parziale
Publisher: IBM Redbooks
ISBN: 0738457906
Category : Computers
Languages : en
Pages : 78

Get Book Here

Book Description
This book was written by IBM® IT specialists who have experience implementing Linux solutions on IBM LinuxONETM (LinuxONE). The contents of this book follow the guidelines from Linux regarding LinuxONE installations. The preferred practices that are described in this book are gathered from the experiences of those specialists in hundreds of projects at IBM and customer environments. This IBM Redbooks® publication provides you with the information needed in making a decision on scaling architecture when implementing Linux on LinuxONE. This book has the following goals: To inform you about x86 sprawl problems To inform you that x86 Vertical Scale out architectures are problematic going forward To provide solutions to x86 server sprawl problems To inform you about the LinuxONE solution for each x86 server sprawl problem To provide virtualization and security options for LinuxOne The scaling up and scaling out architectures enable you to scale the capacity of an existing system to accommodate sporadic application demands or application workloads. This provides some freedom to operate in the environment. However, if this activity is performed without correct planning and the correct architecture choice, it leads to server sprawl where your environment houses more servers than it should based on its current and predicted requirements. This can potentially cause your enterprise to both waste resources and increase costs. Although scaling out on x86 systems is a common form of growth because of inexpensive x86 systems, the scale out can easily become a problem in terms of total cost of ownership (TCO) when the environment starts to increase the number of physical servers and the resources needed to maintain them. LinuxONE servers solve the sprawl problem caused by the scaling out of x86 servers, and are an excellent choice for cloud, mobile, big data, blockchain, analytics, and other workloads that require a robust and flexible environment. This publication describes the advantages and disadvantages of the LinuxONE scaling option. The audience for this publication consists of the following groups: Customers, IBM Business Partners, IT architects and IT Specialists planning and installing Linux on LinuxONE System administrators managing the Linux Systems

Temenos on IBM LinuxONE Best Practices Guide

Temenos on IBM LinuxONE Best Practices Guide PDF Author: Deana Coble
Publisher: IBM Redbooks
ISBN: 0738458457
Category : Computers
Languages : en
Pages : 130

Get Book Here

Book Description
The world's most successful banks run on IBM®, and increasingly IBM LinuxONE. Temenos, the global leader in banking software, has worked alongside IBM for many years on banking deployments of all sizes. This book marks an important milestone in that partnership. Temenos on IBM LinuxONE Best Practices Guide shows financial organizations how they can combine the power and flexibility of the Temenos solution with the IBM platform that is purpose built for the digital revolution.

IBM Spectrum Scale Security

IBM Spectrum Scale Security PDF Author: Felipe Knop
Publisher: IBM Redbooks
ISBN: 0738457167
Category : Computers
Languages : en
Pages : 116

Get Book Here

Book Description
Storage systems must provide reliable and convenient data access to all authorized users while simultaneously preventing threats coming from outside or even inside the enterprise. Security threats come in many forms, from unauthorized access to data, data tampering, denial of service, and obtaining privileged access to systems. According to the Storage Network Industry Association (SNIA), data security in the context of storage systems is responsible for safeguarding the data against theft, prevention of unauthorized disclosure of data, prevention of data tampering, and accidental corruption. This process ensures accountability, authenticity, business continuity, and regulatory compliance. Security for storage systems can be classified as follows: Data storage (data at rest, which includes data durability and immutability) Access to data Movement of data (data in flight) Management of data IBM® Spectrum Scale is a software-defined storage system for high performance, large-scale workloads on-premises or in the cloud. IBM SpectrumTM Scale addresses all four aspects of security by securing data at rest (protecting data at rest with snapshots, and backups and immutability features) and securing data in flight (providing secure management of data, and secure access to data by using authentication and authorization across multiple supported access protocols). These protocols include POSIX, NFS, SMB, Hadoop, and Object (REST). For automated data management, it is equipped with powerful information lifecycle management (ILM) tools that can help administer unstructured data by providing the correct security for the correct data. This IBM RedpaperTM publication details the various aspects of security in IBM Spectrum ScaleTM, including the following items: Security of data in transit Security of data at rest Authentication Authorization Hadoop security Immutability Secure administration Audit logging Security for transparent cloud tiering (TCT) Security for OpenStack drivers Unless stated otherwise, the functions that are mentioned in this paper are available in IBM Spectrum Scale V4.2.1 or later releases.

Oracle on LinuxONE

Oracle on LinuxONE PDF Author: Susan Adamovich
Publisher: IBM Redbooks
ISBN: 0738457957
Category : Computers
Languages : en
Pages : 146

Get Book Here

Book Description
Oracle Database 12c running on Linux is available for deployment on IBM® LinuxONE. The enterprise-grade Linux on LinuxONE solution is designed to add value to Oracle Database solutions, including the new functions that are introduced in Oracle Database 12c. In this IBM Redbooks® publication, we explore the IBM and Oracle Alliance and describe how Oracle Database benefits from LinuxONE. We then explain how to set up Linux guests to install Oracle Database 12c. We also describe how to use the Oracle Enterprise Manager Cloud Control Agent to manage Oracle Database 12c Release 1. Additionally, we discuss encryption for Oracle using Oracle Transparent Data Encryption (TDE) on Oracle 12c Release 2. We also describe a successful consolidation project from sizing to migration, performance management topics, and high availability. Finally, we end with a chapter about surrounding Oracle with Open Source software. The audience for this publication includes database consultants, installers, administrators, and system programmers. This publication is not meant to replace Oracle documentation, but to supplement it with our experiences while installing and using Oracle products.

IBM z/OS Mainframe Security and Audit Management Using the IBM Security zSecure Suite

IBM z/OS Mainframe Security and Audit Management Using the IBM Security zSecure Suite PDF Author: Axel Buecker
Publisher: IBM Redbooks
ISBN: 0738435880
Category : Computers
Languages : en
Pages : 494

Get Book Here

Book Description
Every organization has a core set of mission-critical data that must be protected. Security lapses and failures are not simply disruptions—they can be catastrophic events, and the consequences can be felt across the entire organization. As a result, security administrators face serious challenges in protecting the company's sensitive data. IT staff are challenged to provide detailed audit and controls documentation at a time when they are already facing increasing demands on their time, due to events such as mergers, reorganizations, and other changes. Many organizations do not have enough experienced mainframe security administrators to meet these objectives, and expanding employee skillsets with low-level mainframe security technologies can be time-consuming. The IBM® Security zSecure suite consists of multiple components designed to help you administer your mainframe security server, monitor for threats, audit usage and configurations, and enforce policy compliance. Administration, provisioning, and management components can significantly reduce administration, contributing to improved productivity, faster response time, and reduced training time needed for new administrators. This IBM Redbooks® publication is a valuable resource for security officers, administrators, and architects who wish to better understand their mainframe security solutions.

Scale up for Linux on IBM Z

Scale up for Linux on IBM Z PDF Author: Lydia Parziale
Publisher: IBM Redbooks
ISBN: 073845656X
Category : Computers
Languages : en
Pages : 78

Get Book Here

Book Description
This book was written by IBM® IT specialists who have experience implementing IBM Z® solutions, especially Linux on IBM LinuxONETM (LinuxONE) or IBM Z servers. Therefore, the content of this book follows the guidelines from Linux and IBM z/VM® regarding LinuxONE and IBM Z installations. The preferred practices described in this book are gathered from the experiences of those specialists in hundreds of projects at IBM and customer environments. This publication provides you with all of the information that you need to decide the best scaling architecture when implementing Linux on IBM Z or LinuxONE. This book has the following goals: To inform you about x86 sprawl problems To inform you that x86 Vertical Scale out architectures are problematic going forward To provide solutions to x86 server sprawl problems To inform you about the LinuxONE and IBM Z differentiation for each x86 server sprawl problem To provide virtulization and security options for LinuxOne and IBM Z The scaling up and scaling out architectures enable you to scale the capacity of an existing system to attend a sporadic application demand or an application workload. This gives you some freedom to operate in the environment. However, if this activity is performed without correct planning and the correct architecture choice, it leads to a server sprawl situation where your environment houses more servers than it should based on its current and predicted requirements. Although scaling out on x86 systems is a common form of scaling because of their popularity, the x86 systems were originally designed as cheap computers. Unfortunately, the scale out on x86 can easily become a problem in terms of total cost of ownership (TCO) when the environment starts to increase in terms of number of physical servers. The LinuxONE and IBM Z servers solve the sprawl problem caused by the scaling out of x86 servers, and are an excellent choice for cloud, mobile, big data, blockchain, analytics, and other workloads that require a robust and flexible environment. This publication describes the advantages and disadvantages of the scaling options. The audience of this publication consists of the following groups: Customers, IBM Business Partners, and IBM consultants planning and installing Linux on IBM Z, IBM Z family or x86 platform System administrators administering the Linux Systems If you are a customer considering LinuxONE and IBM Z family as a platform for your applications (analytics, blockchain, cloud, or other) or a pre-sales person, read those publications.

Security in Development: The IBM Secure Engineering Framework

Security in Development: The IBM Secure Engineering Framework PDF Author: Warren Grunbok
Publisher: IBM Redbooks
ISBN: 0738457175
Category : Computers
Languages : en
Pages : 32

Get Book Here

Book Description
IBM® has long been recognized as a leading provider of hardware, software, and services that are of the highest quality, reliability, function, and integrity. IBM products and services are used around the world by people and organizations with mission-critical demands for high performance, high stress tolerance, high availability, and high security. As a testament to this long-standing attention at IBM, demonstration of this attention to security can be traced back to the Integrity Statement for IBM mainframe software, which was originally published in 1973: IBM's long-term commitment to System Integrity is unique in the industry, and forms the basis of MVS (now IBM z/OS) industry leadership in system security. IBM MVS (now IBM z/OS) is designed to help you protect your system, data, transactions, and applications from accidental or malicious modification. This is one of the many reasons IBM 360 (now IBM Z) remains the industry's premier data server for mission-critical workloads. This commitment continues to apply to IBM's mainframe systems and is reiterated at the Server RACF General User's Guide web page. The IT market transformed in 40-plus years, and so have product development and information security practices. The IBM commitment to continuously improving product security remains a constant differentiator for the company. In this IBM RedguideTM publication, we describe secure engineering practices for software products. We offer a description of an end-to-end approach to product development and delivery, with security considered. IBM is producing this IBM Redguide publication in the hope that interested parties (clients, other IT companies, academics, and others) can find these practices to be a useful example of the type of security practices that are increasingly a must-have for developing products and applications that run in the world's digital infrastructure. We also hope this publication can enrich our continued collaboration with others in the industry, standards bodies, government, and elsewhere, as we seek to learn and continuously refine our approach.