ibm-information-center/dist/eclipse/plugins/i5OS.ic.rzamv_5.4.0.1/rzamvplansec.htm

91 lines
6.9 KiB
HTML
Raw Normal View History

2024-04-02 14:02:31 +00:00
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE html
PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html lang="en-us" xml:lang="en-us">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<meta name="security" content="public" />
<meta name="Robots" content="index,follow" />
<meta http-equiv="PICS-Label" content='(PICS-1.1 "http://www.icra.org/ratingsv02.html" l gen true r (cz 1 lz 1 nz 1 oz 1 vz 1) "http://www.rsac.org/ratingsv01.html" l gen true r (n 0 s 0 v 0 l 0) "http://www.classify.org/safesurf/" l gen true r (SS~~000 1))' />
<meta name="DC.Type" content="concept" />
<meta name="DC.Title" content="Plan and set up system security" />
<meta name="abstract" content="This topic collection provides you with detailed information about planning, setting up, and using your system security. This topic collection combines the information formerly in the Basic system security and planning topic collection and in the Tips and Tools for Securing Your iSeries manual." />
<meta name="description" content="This topic collection provides you with detailed information about planning, setting up, and using your system security. This topic collection combines the information formerly in the Basic system security and planning topic collection and in the Tips and Tools for Securing Your iSeries manual." />
<meta name="DC.Relation" scheme="URI" content="rzamvwhatnew.htm" />
<meta name="DC.Relation" scheme="URI" content="rzamvprint.htm" />
<meta name="DC.Relation" scheme="URI" content="rzamvfaq.htm" />
<meta name="DC.Relation" scheme="URI" content="rzamvconcepts.htm" />
<meta name="DC.Relation" scheme="URI" content="rzamvesecplanner.htm" />
<meta name="DC.Relation" scheme="URI" content="rzamvplansecstrat.htm" />
<meta name="DC.Relation" scheme="URI" content="rzamvimplementsecstrat.htm" />
<meta name="DC.Relation" scheme="URI" content="rzamvmanagesec.htm" />
<meta name="DC.Relation" scheme="URI" content="rzamvmonitorsec.htm" />
<meta name="DC.Relation" scheme="URI" content="rzamvrelated.htm" />
<meta name="copyright" content="(C) Copyright IBM Corporation 2006" />
<meta name="DC.Rights.Owner" content="(C) Copyright IBM Corporation 2006" />
<meta name="DC.Format" content="XHTML" />
<meta name="DC.Identifier" content="plansec" />
<meta name="DC.Language" content="en-us" />
<!-- All rights reserved. Licensed Materials Property of IBM -->
<!-- US Government Users Restricted Rights -->
<!-- Use, duplication or disclosure restricted by -->
<!-- GSA ADP Schedule Contract with IBM Corp. -->
<link rel="stylesheet" type="text/css" href="./ibmdita.css" />
<link rel="stylesheet" type="text/css" href="./ic.css" />
<title>Plan and set up system security</title>
</head>
<body id="plansec"><a name="plansec"><!-- --></a>
<!-- Java sync-link --><script language="Javascript" src="../rzahg/synch.js" type="text/javascript"></script>
<h1 class="topictitle1">Plan and set up system security</h1>
<div><p>This topic collection provides you with detailed information about
planning, setting up, and using your system security. This topic collection
combines the information formerly in the Basic system security and planning
topic collection and in the <em>Tips and Tools for Securing Your iSeries™</em> manual.</p>
<p>Determining your company's system security is one of the most basic and
most important decisions that you will make during the course of building
your security plan. With system security you need to balance the need to safeguard
your valuable information and the need of users to access that information
to successfully make your company thrive. To strike this balance you must
understand the specific needs and goals of your company's current direction
but also be aware of future needs. Your security plan must protect your resources
but also must be flexible enough to grow as your company grows. </p>
<p>Several tools exist that can aid you in creating, configuring, and managing
your system-level security on your server. It is important to note that security
does not end with protecting the server and managing access to assets that
are stored on the system. A complete security implementation needs to cover
not only system level security, but also network level security and transaction
level security. This topic focuses on system-level security.</p>
<p>Use this information to develop a personalized plan that fits your company's
specific system security needs. After you complete the planning phase of your
system security, you can set up system security by using the instructions
provided in this information. </p>
</div>
<div>
<ul class="ullinks">
<li class="ulchildlink"><strong><a href="rzamvwhatnew.htm">What's new for V5R4</a></strong><br />
Plan and set up system security provides information on how to effectively and systematically plan and configure system-level security.</li>
<li class="ulchildlink"><strong><a href="rzamvprint.htm">Printable PDF</a></strong><br />
Use this to view and print a PDF of this information.</li>
<li class="ulchildlink"><strong><a href="rzamvfaq.htm">Frequently asked questions</a></strong><br />
These are common questions about setting up and using system security.</li>
<li class="ulchildlink"><strong><a href="rzamvconcepts.htm">Concepts</a></strong><br />
To effectively create a security policy and plan security measures for your system, you need to understand the following security concepts, some of which are general concepts and some of which are specific to the hardware type.</li>
<li class="ulchildlink"><strong><a href="rzamvesecplanner.htm">eServer Security Planner</a></strong><br />
This information describes the eServer™ Security Planner and explains
its value.</li>
<li class="ulchildlink"><strong><a href="rzamvplansecstrat.htm">Plan your security strategy</a></strong><br />
This topic describes various aspects of planning a security strategy.</li>
<li class="ulchildlink"><strong><a href="rzamvimplementsecstrat.htm">Implement your security strategy</a></strong><br />
This topic describes the tasks for implementing your security strategy, explains why they are important, and provides links to the implementation topics.</li>
<li class="ulchildlink"><strong><a href="rzamvmanagesec.htm">Manage security</a></strong><br />
Once you've planned and implemented your security strategy, there remains the task of managing the security of your system.</li>
<li class="ulchildlink"><strong><a href="rzamvmonitorsec.htm">Monitor security</a></strong><br />
This set of topics discuss various techniques for monitoring and auditing security on your system.</li>
<li class="ulchildlink"><strong><a href="rzamvrelated.htm">Related information for security planning</a></strong><br />
Listed here are the product manuals and IBM<sup>®</sup> Redbooks™ (in PDF format), Web sites,
and information center topics that relate to the Plan and set up system security
topic. You can view or print any of the PDFs.</li>
</ul>
</div>
</body>
</html>