ibm-information-center/dist/eclipse/plugins/i5OS.ic.rzamv_5.4.0.1/rzamvimplementsecstrat.htm

167 lines
10 KiB
HTML
Raw Normal View History

2024-04-02 14:02:31 +00:00
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE html
PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html lang="en-us" xml:lang="en-us">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<meta name="security" content="public" />
<meta name="Robots" content="index,follow" />
<meta http-equiv="PICS-Label" content='(PICS-1.1 "http://www.icra.org/ratingsv02.html" l gen true r (cz 1 lz 1 nz 1 oz 1 vz 1) "http://www.rsac.org/ratingsv01.html" l gen true r (n 0 s 0 v 0 l 0) "http://www.classify.org/safesurf/" l gen true r (SS~~000 1))' />
<meta name="DC.Type" content="concept" />
<meta name="DC.Title" content="Implement your security strategy" />
<meta name="abstract" content="This topic describes the tasks for implementing your security strategy, explains why they are important, and provides links to the implementation topics." />
<meta name="description" content="This topic describes the tasks for implementing your security strategy, explains why they are important, and provides links to the implementation topics." />
<meta name="DC.Relation" scheme="URI" content="rzamvplansec.htm" />
<meta name="DC.Relation" scheme="URI" content="rzamvsetuserenviron.htm" />
<meta name="DC.Relation" scheme="URI" content="rzamvsetsyslvlsec.htm" />
<meta name="DC.Relation" scheme="URI" content="rzamvsetusersec.htm" />
<meta name="DC.Relation" scheme="URI" content="rzamvsetrscsec.htm" />
<meta name="DC.Relation" scheme="URI" content="rzamvsetnetsec.htm" />
<meta name="DC.Relation" scheme="URI" content="rzamvtcpsetupsecurity.htm" />
<meta name="copyright" content="(C) Copyright IBM Corporation 2006" />
<meta name="DC.Rights.Owner" content="(C) Copyright IBM Corporation 2006" />
<meta name="DC.Format" content="XHTML" />
<meta name="DC.Identifier" content="implementsecstrat" />
<meta name="DC.Language" content="en-us" />
<!-- All rights reserved. Licensed Materials Property of IBM -->
<!-- US Government Users Restricted Rights -->
<!-- Use, duplication or disclosure restricted by -->
<!-- GSA ADP Schedule Contract with IBM Corp. -->
<link rel="stylesheet" type="text/css" href="./ibmdita.css" />
<link rel="stylesheet" type="text/css" href="./ic.css" />
<title>Implement your security strategy</title>
</head>
<body id="implementsecstrat"><a name="implementsecstrat"><!-- --></a>
<!-- Java sync-link --><script language="Javascript" src="../rzahg/synch.js" type="text/javascript"></script>
<h1 class="topictitle1">Implement your security strategy</h1>
<div><p>This topic describes the tasks for implementing your security strategy,
explains why they are important, and provides links to the implementation
topics.</p>
<p>This topic guides you through the tasks necessary to implement your security
strategy. If you are setting up a new system, you should complete these steps
in sequence. The system uses information from each step as you proceed to
the next step. Setting up basic system security involves defining your user
security, setting up system-level security, protecting your resources on the
system, and setting up network security. The tables below highlight each
of the steps you must configure to set up user and resource security.</p>
<p><strong>Before you begin</strong></p>
<div class="p">If you are installing a new system, do these things before you start setting
up security: <ol><li>Make sure your system unit and your devices are installed and working
properly. If you do not plan to use system naming for your devices, wait to
attach your workstations and printers until after you change the system value
that determines how devices are named (QDEVNAMING). Applying the new system
values tells you when to attach the devices.</li>
<li>Load any licensed programs you plan to use.</li>
</ol>
</div>
<div class="note"><span class="notetitle">Note:</span> You <em>must</em> complete all the steps to set up user security first,
before you begin setting up resource and network security.</div>
<div class="tablenoborder"><table cellpadding="4" cellspacing="0" summary="" width="100%" frame="hsides" border="1" rules="all"><caption>Table 1. Steps in setting up system security</caption><thead align="left"><tr><th valign="top" id="d0e39">Step</th>
<th valign="top" id="d0e41">What you do in this
step</th>
<th valign="top" id="d0e43">What worksheets you
use</th>
</tr>
</thead>
<tbody><tr><td valign="top" headers="d0e39 ">Set up your user environment.</td>
<td valign="top" headers="d0e41 ">Set up initial system values and
network attributes.</td>
<td valign="top" headers="d0e43 ">System values selection</td>
</tr>
<tr><td valign="top" headers="d0e39 ">Set up system-level security</td>
<td valign="top" headers="d0e41 ">Set up additional system values.</td>
<td valign="top" headers="d0e43 "><img src="eserver.gif" alt="e(logo) server" /> <a href="../icbase/secplanr/securwiz.htm" target="_blank">Security planner</a><br /><img src="www.gif" alt="Link outside Information Center." /><br /></td>
</tr>
</tbody>
</table>
</div>
<div class="tablenoborder"><table cellpadding="4" cellspacing="0" summary="" width="100%" frame="hsides" border="1" rules="all"><caption>Table 2. Steps in setting up resource security</caption><thead align="left"><tr><th valign="top" id="d0e77">Step</th>
<th valign="top" id="d0e79">What you do in this step</th>
<th valign="top" id="d0e81">What worksheets you
Uuse</th>
</tr>
</thead>
<tbody><tr><td valign="top" headers="d0e77 "><a href="rzamvsetownerpubauth.htm#setownerpubauth">Set
up ownership and public authority</a></td>
<td valign="top" headers="d0e79 ">Establish ownership and public
authority for libraries and objects.</td>
<td valign="top" headers="d0e81 ">Application installation</td>
</tr>
<tr><td valign="top" headers="d0e77 "><a href="rzamvcreateauthlist.htm#createauthlist">Create
an authorization list</a></td>
<td valign="top" headers="d0e79 ">Create authorization lists.</td>
<td valign="top" headers="d0e81 ">Authorization list</td>
</tr>
<tr><td valign="top" headers="d0e77 "><a href="rzamvsetauthobjlib.htm#setauthobjlib">Set
up specific authority for objects and libraries</a></td>
<td valign="top" headers="d0e79 ">Set up access to libraries and
individual objects.</td>
<td valign="top" headers="d0e81 ">Library description</td>
</tr>
<tr><td valign="top" headers="d0e77 "><a href="rzamvsecprintqueue.htm#secprintqueue">Secure
your printer output queue</a></td>
<td valign="top" headers="d0e79 ">Protect printer output by creating
output queues and assigning output.</td>
<td valign="top" headers="d0e81 ">Output queue and workstation security</td>
</tr>
<tr><td valign="top" headers="d0e77 "><a href="rzamvsecstation.htm#secstation">Secure
your workstations</a></td>
<td valign="top" headers="d0e79 ">Protect workstations.</td>
<td valign="top" headers="d0e81 ">Output queue and workstation security</td>
</tr>
</tbody>
</table>
</div>
<div class="tablenoborder"><table cellpadding="4" cellspacing="0" summary="" width="100%" frame="hsides" border="1" rules="all"><caption>Table 3. Steps in Setting Up
Network Security</caption><thead align="left"><tr><th valign="top" id="d0e133">Step</th>
<th valign="top" id="d0e135">What you do in this step</th>
<th valign="top" id="d0e137">What reference you
use</th>
</tr>
</thead>
<tbody><tr><td valign="top" headers="d0e133 "><a href="rzamvsavesecinfo.htm#savesecinfo">Save
security information</a></td>
<td valign="top" headers="d0e135 ">Save system values, group and
user profiles, job descriptions, and resource security information.</td>
<td valign="top" headers="d0e137 "><a href="../books/sc415304.pdf" target="_blank">Backup and Recovery book</a></td>
</tr>
<tr><td valign="top" headers="d0e133 "><a href="rzamvrestoresecinfo.htm#restoresecinfo">Restore
security information</a></td>
<td valign="top" headers="d0e135 ">Restore system values, user profiles,
objects, authority, programs, authorization lists, and the operating system.</td>
<td valign="top" headers="d0e137 "><a href="../books/sc415304.pdf" target="_blank">Backup and Recovery book</a></td>
</tr>
<tr><td valign="top" headers="d0e133 ">Set up network security</td>
<td valign="top" headers="d0e135 ">Set up network security for APPC,
and TCP/IP applications.</td>
<td valign="top" headers="d0e137 "><img src="eserver.gif" alt="e(logo) server" /> <a href="../icbase/secplanr/securwiz.htm" target="_blank">Security Planner</a><br /><img src="www.gif" alt="Link outside Information Center." /><br /> </td>
</tr>
</tbody>
</table>
</div>
</div>
<div>
<ul class="ullinks">
<li class="ulchildlink"><strong><a href="rzamvsetuserenviron.htm">Set up your user environment</a></strong><br />
This topic describes how to set up your user environment and sign on to the system.</li>
<li class="ulchildlink"><strong><a href="rzamvsetsyslvlsec.htm">Set up system security</a></strong><br />
This information guides you through the process of setting up your system level security.</li>
<li class="ulchildlink"><strong><a href="rzamvsetusersec.htm">Set up user security</a></strong><br />
Setting up user security involves installing application libraries, and setting up user groups and profiles.</li>
<li class="ulchildlink"><strong><a href="rzamvsetrscsec.htm">Implement resource security</a></strong><br />
This information helps you establish resource security for workstations and printers by setting ownership and public authority to objects, as well as specific authority to applications.</li>
<li class="ulchildlink"><strong><a href="rzamvsetnetsec.htm">Set up network security</a></strong><br />
The following topics provide security recommendations for TCP/IP protocols, such as FTP, BOOTP, and VPN; and for APPC.</li>
<li class="ulchildlink"><strong><a href="rzamvtcpsetupsecurity.htm">Set up TCP/IP security</a></strong><br />
The following information guides you through the process of setting up TCP/IP security.</li>
</ul>
<div class="familylinks">
<div class="parentlink"><strong>Parent topic:</strong> <a href="rzamvplansec.htm" title="This topic collection provides you with detailed information about planning, setting up, and using your system security. This topic collection combines the information formerly in the Basic system security and planning topic collection and in the Tips and Tools for Securing Your iSeries manual.">Plan and set up system security</a></div>
</div>
</div>
</body>
</html>