ibm-information-center/dist/eclipse/plugins/i5OS.ic.rzamv_5.4.0.1/rzamvplansyslvlsec.htm

92 lines
6.7 KiB
HTML
Raw Permalink Normal View History

2024-04-02 14:02:31 +00:00
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE html
PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html lang="en-us" xml:lang="en-us">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<meta name="security" content="public" />
<meta name="Robots" content="index,follow" />
<meta http-equiv="PICS-Label" content='(PICS-1.1 "http://www.icra.org/ratingsv02.html" l gen true r (cz 1 lz 1 nz 1 oz 1 vz 1) "http://www.rsac.org/ratingsv01.html" l gen true r (n 0 s 0 v 0 l 0) "http://www.classify.org/safesurf/" l gen true r (SS~~000 1))' />
<meta name="DC.Type" content="concept" />
<meta name="DC.Title" content="Plan system security" />
<meta name="abstract" content="System security entails controlling user access and their privileges, maintaining information integrity, monitoring processes and access, auditing system functions, and providing backup and recovery of security related information." />
<meta name="description" content="System security entails controlling user access and their privileges, maintaining information integrity, monitoring processes and access, auditing system functions, and providing backup and recovery of security related information." />
<meta name="DC.Relation" scheme="URI" content="rzamvplansecstrat.htm" />
<meta name="DC.Relation" scheme="URI" content="rzamvgensecsysval.htm" />
<meta name="DC.Relation" scheme="URI" content="rzamvpwdsysval.htm" />
<meta name="DC.Relation" scheme="URI" content="rzamvauditsysval.htm" />
<meta name="DC.Relation" scheme="URI" content="rzamvrestoresysvalplan.htm" />
<meta name="DC.Relation" scheme="URI" content="rzamvsysvalworksheet.htm" />
<meta name="DC.Relation" scheme="URI" content="rzamvsecurityinternet.htm" />
<meta name="DC.Relation" scheme="URI" content="rzamvplanlpar.htm" />
<meta name="DC.Relation" scheme="URI" content="rzamvplanopsconsole.htm" />
<meta name="DC.Relation" scheme="URI" content="rzamvseclvlterm.htm" />
<meta name="copyright" content="(C) Copyright IBM Corporation 2006" />
<meta name="DC.Rights.Owner" content="(C) Copyright IBM Corporation 2006" />
<meta name="DC.Format" content="XHTML" />
<meta name="DC.Identifier" content="plansyslvlsec" />
<meta name="DC.Language" content="en-us" />
<!-- All rights reserved. Licensed Materials Property of IBM -->
<!-- US Government Users Restricted Rights -->
<!-- Use, duplication or disclosure restricted by -->
<!-- GSA ADP Schedule Contract with IBM Corp. -->
<link rel="stylesheet" type="text/css" href="./ibmdita.css" />
<link rel="stylesheet" type="text/css" href="./ic.css" />
<title>Plan system security</title>
</head>
<body id="plansyslvlsec"><a name="plansyslvlsec"><!-- --></a>
<!-- Java sync-link --><script language="Javascript" src="../rzahg/synch.js" type="text/javascript"></script>
<h1 class="topictitle1">Plan system security</h1>
<div><p>System security entails controlling user access and their privileges,
maintaining information integrity, monitoring processes and access, auditing
system functions, and providing backup and recovery of security related information.</p>
<p>On the i5/OS™,
system security is integrated into the operating system through use of system
values. System values control how a given function will perform based on how
the value is defined. Security system values are categorized based on the
functions that they perform. For example, security system values can manage
the level of security on your system and signon and password controls. </p>
<p>Using security system values require that a user or administrator have
the appropriate authority to change and update these values. In some cases,
the authorities for these security values are different. For each security
system value described in these sections the necessary authority is provided. </p>
<p>Security system values can be set through the i5/OS character-based interface or through iSeries™ Navigator,
a graphical user interface which provides easy management of most i5/OS functions.
This information provides names of system values for both iSeries Navigator
and its equivalent in the character-based interface.</p>
<p>In addition this topic provides descriptions of these security system values,
recommendations for common installations, and a form to record your system
value decisions.</p>
<p>To complete system security planning, review these topics on security-related
system values and record your choices on the <a href="rzamvsysvalworksheet.htm">System Value Selection</a> form. See the following
topics regarding security related system values:</p>
</div>
<div>
<ul class="ullinks">
<li class="ulchildlink"><strong><a href="rzamvgensecsysval.htm">General security system values</a></strong><br />
General security system values provide the cornerstone for your security policy.</li>
<li class="ulchildlink"><strong><a href="rzamvpwdsysval.htm">Password system values</a></strong><br />
In addition to setting signon system values, you also need to decide rules regarding users passwords</li>
<li class="ulchildlink"><strong><a href="rzamvauditsysval.htm">Audit system values</a></strong><br />
This topic describes the auditing system values in detail.</li>
<li class="ulchildlink"><strong><a href="rzamvrestoresysvalplan.htm">Security-related restore system values</a></strong><br />
Restoring programs to your system represents a security exposure.</li>
<li class="ulchildlink"><strong><a href="rzamvsysvalworksheet.htm">System values selection worksheet</a></strong><br />
This topic introduces the System Values Selection worksheet.</li>
<li class="ulchildlink"><strong><a href="rzamvsecurityinternet.htm">Security considerations for internet browsers</a></strong><br />
Use this information to learn about common security threats from using Internet browsers.</li>
<li class="ulchildlink"><strong><a href="rzamvplanlpar.htm">Plan LPAR security</a></strong><br />
Use this information to plan security for logical partitions (LPARs) on your servers.</li>
<li class="ulchildlink"><strong><a href="rzamvplanopsconsole.htm">Plan operations console security</a></strong><br />
Operations Console allows you to use your PC to access and control your system. It is important to include Operations Console in your overall security plan.</li>
</ul>
<div class="familylinks">
<div class="parentlink"><strong>Parent topic:</strong> <a href="rzamvplansecstrat.htm" title="This topic describes various aspects of planning a security strategy.">Plan your security strategy</a></div>
</div>
<div class="relconcepts"><strong>Related concepts</strong><br />
<div><a href="rzamvseclvlterm.htm" title="Security on your system is arranged in a series of levels, with each level offering a greater degree of security and protection of your data than the previous level.">Security levels</a></div>
</div>
</div>
</body>
</html>