Maximizing Security with LinuxONE Maximizing Security with LinuxONE

Maximizing Security with LinuxONE

Lydia Parziale and Others

Publisher Description

LinuxONE® is a hardware system that is designed to support and use the Linux operating system based on the value of its unique underlying architecture. LinuxONE can be used within a private and multi-cloud environment to support a range of workloads and service various needs.

On LinuxONE, security is built into the hardware and software.

This IBM® Redpaper® publication gives a broad understanding of how to use the various security features that make the most of and complement the LinuxONE hardware security features, including the following examples:

Hardware accelerated encryption of data, which is delivered with near-zero overhead by the on-chip Central Processor Assist for Cryptographic Function (CPACF) and a dedicated Crypto Express adapter.
Virtualization and industry-leading isolation capabilities with PR/SM, EAL 5+ LPARs, DPM, KVM, and IBM z/VM®.
The IBM Secure Service Container technology, which provides workload isolation, restricted administrator access, and tamper protection against internal threats, including from systems administrators.
Other technologies that use LinuxONE security capabilities and practical use cases for these technologies.

This publication was written for IT executives, architects, specialists, security administrators, and others who consider security for LinuxONE.

GENRE
Computers & Internet
RELEASED
2020
August 10
LANGUAGE
EN
English
LENGTH
65
Pages
PUBLISHER
IBM Redbooks
SELLER
International Business Machines Corp
SIZE
1.4
MB

More Books Like This

Security and Linux on z Systems Security and Linux on z Systems
2018
Getting Started with Linux on Z Encryption for Data At-Rest Getting Started with Linux on Z Encryption for Data At-Rest
2019
Demystifying Internet of Things Security Demystifying Internet of Things Security
2019
Security Guide for IBM i V6.1 Security Guide for IBM i V6.1
2009
End to End Security with z Systems End to End Security with z Systems
2015
IBM Spectrum Scale Security IBM Spectrum Scale Security
2017

More Books by Lydia Parziale, Leticia Alexander, Yongkook Kim, Rushir Patel & Narjisse Zaki

Experiences with Oracle® 10gR2 Solutions on Linux for IBM System z Experiences with Oracle® 10gR2 Solutions on Linux for IBM System z
2007
ABCs of IBM z/OS System Programming Volume 1 ABCs of IBM z/OS System Programming Volume 1
2018
Getting Started with Docker Enterprise Edition on IBM Z Getting Started with Docker Enterprise Edition on IBM Z
2019
Securing Your Cloud: IBM Security for LinuxONE Securing Your Cloud: IBM Security for LinuxONE
2019
The Virtualization Cookbook for IBM z Systems Volume 2: Red Hat Enterprise Linux 7.1 Servers The Virtualization Cookbook for IBM z Systems Volume 2: Red Hat Enterprise Linux 7.1 Servers
2016
Getting started with z/OS Container Extensions and Docker Getting started with z/OS Container Extensions and Docker
2021

Customers Also Bought

Getting Started with Linux on Z Encryption for Data At-Rest Getting Started with Linux on Z Encryption for Data At-Rest
2019
Best practices and Getting Started Guide for Oracle on IBM LinuxONE Best practices and Getting Started Guide for Oracle on IBM LinuxONE
2020
Database Partitioning, Table Partitioning, and MDC for DB2 9 Database Partitioning, Table Partitioning, and MDC for DB2 9
2007
DB2 Workload Manager for Linux, UNIX, and Windows DB2 Workload Manager for Linux, UNIX, and Windows
2008
Step-by-Step Guide to Bodhi Linux Step-by-Step Guide to Bodhi Linux
2014
Up and Running with DB2 on Linux Up and Running with DB2 on Linux
2008