ibm-information-center/dist/eclipse/plugins/i5OS.ic.rzamv_5.4.0.1/rzamvesecplanner.htm

65 lines
4.2 KiB
HTML

<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE html
PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html lang="en-us" xml:lang="en-us">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<meta name="security" content="public" />
<meta name="Robots" content="index,follow" />
<meta http-equiv="PICS-Label" content='(PICS-1.1 "http://www.icra.org/ratingsv02.html" l gen true r (cz 1 lz 1 nz 1 oz 1 vz 1) "http://www.rsac.org/ratingsv01.html" l gen true r (n 0 s 0 v 0 l 0) "http://www.classify.org/safesurf/" l gen true r (SS~~000 1))' />
<meta name="DC.Type" content="concept" />
<meta name="DC.Title" content="eServer Security Planner" />
<meta name="abstract" content="This information describes the eServer Security Planner and explains its value." />
<meta name="description" content="This information describes the eServer Security Planner and explains its value." />
<meta name="DC.Relation" scheme="URI" content="rzamvplansec.htm" />
<meta name="copyright" content="(C) Copyright IBM Corporation 2006" />
<meta name="DC.Rights.Owner" content="(C) Copyright IBM Corporation 2006" />
<meta name="DC.Format" content="XHTML" />
<meta name="DC.Identifier" content="esecplanner" />
<meta name="DC.Language" content="en-us" />
<!-- All rights reserved. Licensed Materials Property of IBM -->
<!-- US Government Users Restricted Rights -->
<!-- Use, duplication or disclosure restricted by -->
<!-- GSA ADP Schedule Contract with IBM Corp. -->
<link rel="stylesheet" type="text/css" href="./ibmdita.css" />
<link rel="stylesheet" type="text/css" href="./ic.css" />
<title>eServer Security
Planner</title>
</head>
<body id="esecplanner"><a name="esecplanner"><!-- --></a>
<!-- Java sync-link --><script language="Javascript" src="../rzahg/synch.js" type="text/javascript"></script>
<h1 class="topictitle1">eServer Security
Planner</h1>
<div><p>This information describes the eServer™ Security Planner and explains
its value.</p>
<p>You can use the IBM<sup>®</sup> <a href="../icbase/secplanr/securwiz.htm" target="_blank">eServer Security
Planner</a> to help you plan a basic security policy for each of the operating
systems that IBM servers
support, including, AIX<sup>®</sup>, Linux<sup>®</sup>, i5/OS™, Microsoft<sup>®</sup> Windows<sup>®</sup> 2000, and z/OS<sup>®</sup>. The planner
asks you a series of questions about your business environment and your security
goals. Based on your answers, the planner provides you with a list of recommendations
for setting password rules, resource access rules, logging and auditing rules,
and other OS specific security settings.</p>
<p>The planner cannot perform the configurations it suggests. Instead, the
planner provides you with information and checklists to guide you as you plan
and implement security on your IBM servers. In some cases, the planner
also provides a program with commands you can run to apply the policy recommendations.
The Security Planner now provides network security recommendations for each
OS. Learn the basic concepts of designing network security including: network
architecture, firewall and other network security technologies, TCP/IP security,
and intrusion detection.</p>
<p>You need to run the planner once for each group of servers in your e-business
environment that have similar security characteristics and requirements. Each
usage produces a baseline security policy specific to your needs. For example,
suppose that you need a very secure environment for your mission critical
production system, but can tolerate more risk for your company's internal
development system. Here, you would complete the planner twice, once for each
system, because they each require a different level of security.</p>
</div>
<div>
<div class="familylinks">
<div class="parentlink"><strong>Parent topic:</strong> <a href="rzamvplansec.htm" title="This topic collection provides you with detailed information about planning, setting up, and using your system security. This topic collection combines the information formerly in the Basic system security and planning topic collection and in the Tips and Tools for Securing Your iSeries manual.">Plan and set up system security</a></div>
</div>
</div>
</body>
</html>