Implement your security strategy

This topic describes the tasks for implementing your security strategy, explains why they are important, and provides links to the implementation topics.

This topic guides you through the tasks necessary to implement your security strategy. If you are setting up a new system, you should complete these steps in sequence. The system uses information from each step as you proceed to the next step. Setting up basic system security involves defining your user security, setting up system-level security, protecting your resources on the system, and setting up network security. The tables below highlight each of the steps you must configure to set up user and resource security.

Before you begin

If you are installing a new system, do these things before you start setting up security:
  1. Make sure your system unit and your devices are installed and working properly. If you do not plan to use system naming for your devices, wait to attach your workstations and printers until after you change the system value that determines how devices are named (QDEVNAMING). Applying the new system values tells you when to attach the devices.
  2. Load any licensed programs you plan to use.
Note: You must complete all the steps to set up user security first, before you begin setting up resource and network security.
Table 1. Steps in setting up system security
Step What you do in this step What worksheets you use
Set up your user environment. Set up initial system values and network attributes. System values selection
Set up system-level security Set up additional system values. e(logo) server Security planner
Link outside Information Center.
Table 2. Steps in setting up resource security
Step What you do in this step What worksheets you Uuse
Set up ownership and public authority Establish ownership and public authority for libraries and objects. Application installation
Create an authorization list Create authorization lists. Authorization list
Set up specific authority for objects and libraries Set up access to libraries and individual objects. Library description
Secure your printer output queue Protect printer output by creating output queues and assigning output. Output queue and workstation security
Secure your workstations Protect workstations. Output queue and workstation security
Table 3. Steps in Setting Up Network Security
Step What you do in this step What reference you use
Save security information Save system values, group and user profiles, job descriptions, and resource security information. Backup and Recovery book
Restore security information Restore system values, user profiles, objects, authority, programs, authorization lists, and the operating system. Backup and Recovery book
Set up network security Set up network security for APPC, and TCP/IP applications. e(logo) server Security Planner
Link outside Information Center.