167 lines
10 KiB
HTML
167 lines
10 KiB
HTML
<?xml version="1.0" encoding="UTF-8"?>
|
|
<!DOCTYPE html
|
|
PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
|
|
<html lang="en-us" xml:lang="en-us">
|
|
<head>
|
|
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
|
|
<meta name="security" content="public" />
|
|
<meta name="Robots" content="index,follow" />
|
|
<meta http-equiv="PICS-Label" content='(PICS-1.1 "http://www.icra.org/ratingsv02.html" l gen true r (cz 1 lz 1 nz 1 oz 1 vz 1) "http://www.rsac.org/ratingsv01.html" l gen true r (n 0 s 0 v 0 l 0) "http://www.classify.org/safesurf/" l gen true r (SS~~000 1))' />
|
|
<meta name="DC.Type" content="concept" />
|
|
<meta name="DC.Title" content="Implement your security strategy" />
|
|
<meta name="abstract" content="This topic describes the tasks for implementing your security strategy, explains why they are important, and provides links to the implementation topics." />
|
|
<meta name="description" content="This topic describes the tasks for implementing your security strategy, explains why they are important, and provides links to the implementation topics." />
|
|
<meta name="DC.Relation" scheme="URI" content="rzamvplansec.htm" />
|
|
<meta name="DC.Relation" scheme="URI" content="rzamvsetuserenviron.htm" />
|
|
<meta name="DC.Relation" scheme="URI" content="rzamvsetsyslvlsec.htm" />
|
|
<meta name="DC.Relation" scheme="URI" content="rzamvsetusersec.htm" />
|
|
<meta name="DC.Relation" scheme="URI" content="rzamvsetrscsec.htm" />
|
|
<meta name="DC.Relation" scheme="URI" content="rzamvsetnetsec.htm" />
|
|
<meta name="DC.Relation" scheme="URI" content="rzamvtcpsetupsecurity.htm" />
|
|
<meta name="copyright" content="(C) Copyright IBM Corporation 2006" />
|
|
<meta name="DC.Rights.Owner" content="(C) Copyright IBM Corporation 2006" />
|
|
<meta name="DC.Format" content="XHTML" />
|
|
<meta name="DC.Identifier" content="implementsecstrat" />
|
|
<meta name="DC.Language" content="en-us" />
|
|
<!-- All rights reserved. Licensed Materials Property of IBM -->
|
|
<!-- US Government Users Restricted Rights -->
|
|
<!-- Use, duplication or disclosure restricted by -->
|
|
<!-- GSA ADP Schedule Contract with IBM Corp. -->
|
|
<link rel="stylesheet" type="text/css" href="./ibmdita.css" />
|
|
<link rel="stylesheet" type="text/css" href="./ic.css" />
|
|
<title>Implement your security strategy</title>
|
|
</head>
|
|
<body id="implementsecstrat"><a name="implementsecstrat"><!-- --></a>
|
|
<!-- Java sync-link --><script language="Javascript" src="../rzahg/synch.js" type="text/javascript"></script>
|
|
<h1 class="topictitle1">Implement your security strategy</h1>
|
|
<div><p>This topic describes the tasks for implementing your security strategy,
|
|
explains why they are important, and provides links to the implementation
|
|
topics.</p>
|
|
<p>This topic guides you through the tasks necessary to implement your security
|
|
strategy. If you are setting up a new system, you should complete these steps
|
|
in sequence. The system uses information from each step as you proceed to
|
|
the next step. Setting up basic system security involves defining your user
|
|
security, setting up system-level security, protecting your resources on the
|
|
system, and setting up network security. The tables below highlight each
|
|
of the steps you must configure to set up user and resource security.</p>
|
|
<p><strong>Before you begin</strong></p>
|
|
<div class="p">If you are installing a new system, do these things before you start setting
|
|
up security: <ol><li>Make sure your system unit and your devices are installed and working
|
|
properly. If you do not plan to use system naming for your devices, wait to
|
|
attach your workstations and printers until after you change the system value
|
|
that determines how devices are named (QDEVNAMING). Applying the new system
|
|
values tells you when to attach the devices.</li>
|
|
<li>Load any licensed programs you plan to use.</li>
|
|
</ol>
|
|
</div>
|
|
<div class="note"><span class="notetitle">Note:</span> You <em>must</em> complete all the steps to set up user security first,
|
|
before you begin setting up resource and network security.</div>
|
|
|
|
<div class="tablenoborder"><table cellpadding="4" cellspacing="0" summary="" width="100%" frame="hsides" border="1" rules="all"><caption>Table 1. Steps in setting up system security</caption><thead align="left"><tr><th valign="top" id="d0e39">Step</th>
|
|
<th valign="top" id="d0e41">What you do in this
|
|
step</th>
|
|
<th valign="top" id="d0e43">What worksheets you
|
|
use</th>
|
|
</tr>
|
|
</thead>
|
|
<tbody><tr><td valign="top" headers="d0e39 ">Set up your user environment.</td>
|
|
<td valign="top" headers="d0e41 ">Set up initial system values and
|
|
network attributes.</td>
|
|
<td valign="top" headers="d0e43 ">System values selection</td>
|
|
</tr>
|
|
<tr><td valign="top" headers="d0e39 ">Set up system-level security</td>
|
|
<td valign="top" headers="d0e41 ">Set up additional system values.</td>
|
|
<td valign="top" headers="d0e43 "><img src="eserver.gif" alt="e(logo) server" /> <a href="../icbase/secplanr/securwiz.htm" target="_blank">Security planner</a><br /><img src="www.gif" alt="Link outside Information Center." /><br /></td>
|
|
</tr>
|
|
</tbody>
|
|
</table>
|
|
</div>
|
|
|
|
<div class="tablenoborder"><table cellpadding="4" cellspacing="0" summary="" width="100%" frame="hsides" border="1" rules="all"><caption>Table 2. Steps in setting up resource security</caption><thead align="left"><tr><th valign="top" id="d0e77">Step</th>
|
|
<th valign="top" id="d0e79">What you do in this step</th>
|
|
<th valign="top" id="d0e81">What worksheets you
|
|
Uuse</th>
|
|
</tr>
|
|
</thead>
|
|
<tbody><tr><td valign="top" headers="d0e77 "><a href="rzamvsetownerpubauth.htm#setownerpubauth">Set
|
|
up ownership and public authority</a></td>
|
|
<td valign="top" headers="d0e79 ">Establish ownership and public
|
|
authority for libraries and objects.</td>
|
|
<td valign="top" headers="d0e81 ">Application installation</td>
|
|
</tr>
|
|
<tr><td valign="top" headers="d0e77 "><a href="rzamvcreateauthlist.htm#createauthlist">Create
|
|
an authorization list</a></td>
|
|
<td valign="top" headers="d0e79 ">Create authorization lists.</td>
|
|
<td valign="top" headers="d0e81 ">Authorization list</td>
|
|
</tr>
|
|
<tr><td valign="top" headers="d0e77 "><a href="rzamvsetauthobjlib.htm#setauthobjlib">Set
|
|
up specific authority for objects and libraries</a></td>
|
|
<td valign="top" headers="d0e79 ">Set up access to libraries and
|
|
individual objects.</td>
|
|
<td valign="top" headers="d0e81 ">Library description</td>
|
|
</tr>
|
|
<tr><td valign="top" headers="d0e77 "><a href="rzamvsecprintqueue.htm#secprintqueue">Secure
|
|
your printer output queue</a></td>
|
|
<td valign="top" headers="d0e79 ">Protect printer output by creating
|
|
output queues and assigning output.</td>
|
|
<td valign="top" headers="d0e81 ">Output queue and workstation security</td>
|
|
</tr>
|
|
<tr><td valign="top" headers="d0e77 "><a href="rzamvsecstation.htm#secstation">Secure
|
|
your workstations</a></td>
|
|
<td valign="top" headers="d0e79 ">Protect workstations.</td>
|
|
<td valign="top" headers="d0e81 ">Output queue and workstation security</td>
|
|
</tr>
|
|
</tbody>
|
|
</table>
|
|
</div>
|
|
|
|
<div class="tablenoborder"><table cellpadding="4" cellspacing="0" summary="" width="100%" frame="hsides" border="1" rules="all"><caption>Table 3. Steps in Setting Up
|
|
Network Security</caption><thead align="left"><tr><th valign="top" id="d0e133">Step</th>
|
|
<th valign="top" id="d0e135">What you do in this step</th>
|
|
<th valign="top" id="d0e137">What reference you
|
|
use</th>
|
|
</tr>
|
|
</thead>
|
|
<tbody><tr><td valign="top" headers="d0e133 "><a href="rzamvsavesecinfo.htm#savesecinfo">Save
|
|
security information</a></td>
|
|
<td valign="top" headers="d0e135 ">Save system values, group and
|
|
user profiles, job descriptions, and resource security information.</td>
|
|
<td valign="top" headers="d0e137 "><a href="../books/sc415304.pdf" target="_blank">Backup and Recovery book</a></td>
|
|
</tr>
|
|
<tr><td valign="top" headers="d0e133 "><a href="rzamvrestoresecinfo.htm#restoresecinfo">Restore
|
|
security information</a></td>
|
|
<td valign="top" headers="d0e135 ">Restore system values, user profiles,
|
|
objects, authority, programs, authorization lists, and the operating system.</td>
|
|
<td valign="top" headers="d0e137 "><a href="../books/sc415304.pdf" target="_blank">Backup and Recovery book</a></td>
|
|
</tr>
|
|
<tr><td valign="top" headers="d0e133 ">Set up network security</td>
|
|
<td valign="top" headers="d0e135 ">Set up network security for APPC,
|
|
and TCP/IP applications.</td>
|
|
<td valign="top" headers="d0e137 "><img src="eserver.gif" alt="e(logo) server" /> <a href="../icbase/secplanr/securwiz.htm" target="_blank">Security Planner</a><br /><img src="www.gif" alt="Link outside Information Center." /><br /> </td>
|
|
</tr>
|
|
</tbody>
|
|
</table>
|
|
</div>
|
|
</div>
|
|
<div>
|
|
<ul class="ullinks">
|
|
<li class="ulchildlink"><strong><a href="rzamvsetuserenviron.htm">Set up your user environment</a></strong><br />
|
|
This topic describes how to set up your user environment and sign on to the system.</li>
|
|
<li class="ulchildlink"><strong><a href="rzamvsetsyslvlsec.htm">Set up system security</a></strong><br />
|
|
This information guides you through the process of setting up your system level security.</li>
|
|
<li class="ulchildlink"><strong><a href="rzamvsetusersec.htm">Set up user security</a></strong><br />
|
|
Setting up user security involves installing application libraries, and setting up user groups and profiles.</li>
|
|
<li class="ulchildlink"><strong><a href="rzamvsetrscsec.htm">Implement resource security</a></strong><br />
|
|
This information helps you establish resource security for workstations and printers by setting ownership and public authority to objects, as well as specific authority to applications.</li>
|
|
<li class="ulchildlink"><strong><a href="rzamvsetnetsec.htm">Set up network security</a></strong><br />
|
|
The following topics provide security recommendations for TCP/IP protocols, such as FTP, BOOTP, and VPN; and for APPC.</li>
|
|
<li class="ulchildlink"><strong><a href="rzamvtcpsetupsecurity.htm">Set up TCP/IP security</a></strong><br />
|
|
The following information guides you through the process of setting up TCP/IP security.</li>
|
|
</ul>
|
|
|
|
<div class="familylinks">
|
|
<div class="parentlink"><strong>Parent topic:</strong> <a href="rzamvplansec.htm" title="This topic collection provides you with detailed information about planning, setting up, and using your system security. This topic collection combines the information formerly in the Basic system security and planning topic collection and in the Tips and Tools for Securing Your iSeries manual.">Plan and set up system security</a></div>
|
|
</div>
|
|
</div>
|
|
</body>
|
|
</html> |