This topic describes the tasks for implementing your security strategy, explains why they are important, and provides links to the implementation topics.
This topic guides you through the tasks necessary to implement your security strategy. If you are setting up a new system, you should complete these steps in sequence. The system uses information from each step as you proceed to the next step. Setting up basic system security involves defining your user security, setting up system-level security, protecting your resources on the system, and setting up network security. The tables below highlight each of the steps you must configure to set up user and resource security.
Before you begin
Step | What you do in this step | What worksheets you use |
---|---|---|
Set up your user environment. | Set up initial system values and network attributes. | System values selection |
Set up system-level security | Set up additional system values. | Security planner |
Step | What you do in this step | What worksheets you Uuse |
---|---|---|
Set up ownership and public authority | Establish ownership and public authority for libraries and objects. | Application installation |
Create an authorization list | Create authorization lists. | Authorization list |
Set up specific authority for objects and libraries | Set up access to libraries and individual objects. | Library description |
Secure your printer output queue | Protect printer output by creating output queues and assigning output. | Output queue and workstation security |
Secure your workstations | Protect workstations. | Output queue and workstation security |
Step | What you do in this step | What reference you use |
---|---|---|
Save security information | Save system values, group and user profiles, job descriptions, and resource security information. | Backup and Recovery book |
Restore security information | Restore system values, user profiles, objects, authority, programs, authorization lists, and the operating system. | Backup and Recovery book |
Set up network security | Set up network security for APPC, and TCP/IP applications. | Security Planner |