92 lines
6.7 KiB
HTML
92 lines
6.7 KiB
HTML
<?xml version="1.0" encoding="UTF-8"?>
|
|
<!DOCTYPE html
|
|
PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
|
|
<html lang="en-us" xml:lang="en-us">
|
|
<head>
|
|
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
|
|
<meta name="security" content="public" />
|
|
<meta name="Robots" content="index,follow" />
|
|
<meta http-equiv="PICS-Label" content='(PICS-1.1 "http://www.icra.org/ratingsv02.html" l gen true r (cz 1 lz 1 nz 1 oz 1 vz 1) "http://www.rsac.org/ratingsv01.html" l gen true r (n 0 s 0 v 0 l 0) "http://www.classify.org/safesurf/" l gen true r (SS~~000 1))' />
|
|
<meta name="DC.Type" content="concept" />
|
|
<meta name="DC.Title" content="Plan system security" />
|
|
<meta name="abstract" content="System security entails controlling user access and their privileges, maintaining information integrity, monitoring processes and access, auditing system functions, and providing backup and recovery of security related information." />
|
|
<meta name="description" content="System security entails controlling user access and their privileges, maintaining information integrity, monitoring processes and access, auditing system functions, and providing backup and recovery of security related information." />
|
|
<meta name="DC.Relation" scheme="URI" content="rzamvplansecstrat.htm" />
|
|
<meta name="DC.Relation" scheme="URI" content="rzamvgensecsysval.htm" />
|
|
<meta name="DC.Relation" scheme="URI" content="rzamvpwdsysval.htm" />
|
|
<meta name="DC.Relation" scheme="URI" content="rzamvauditsysval.htm" />
|
|
<meta name="DC.Relation" scheme="URI" content="rzamvrestoresysvalplan.htm" />
|
|
<meta name="DC.Relation" scheme="URI" content="rzamvsysvalworksheet.htm" />
|
|
<meta name="DC.Relation" scheme="URI" content="rzamvsecurityinternet.htm" />
|
|
<meta name="DC.Relation" scheme="URI" content="rzamvplanlpar.htm" />
|
|
<meta name="DC.Relation" scheme="URI" content="rzamvplanopsconsole.htm" />
|
|
<meta name="DC.Relation" scheme="URI" content="rzamvseclvlterm.htm" />
|
|
<meta name="copyright" content="(C) Copyright IBM Corporation 2006" />
|
|
<meta name="DC.Rights.Owner" content="(C) Copyright IBM Corporation 2006" />
|
|
<meta name="DC.Format" content="XHTML" />
|
|
<meta name="DC.Identifier" content="plansyslvlsec" />
|
|
<meta name="DC.Language" content="en-us" />
|
|
<!-- All rights reserved. Licensed Materials Property of IBM -->
|
|
<!-- US Government Users Restricted Rights -->
|
|
<!-- Use, duplication or disclosure restricted by -->
|
|
<!-- GSA ADP Schedule Contract with IBM Corp. -->
|
|
<link rel="stylesheet" type="text/css" href="./ibmdita.css" />
|
|
<link rel="stylesheet" type="text/css" href="./ic.css" />
|
|
<title>Plan system security</title>
|
|
</head>
|
|
<body id="plansyslvlsec"><a name="plansyslvlsec"><!-- --></a>
|
|
<!-- Java sync-link --><script language="Javascript" src="../rzahg/synch.js" type="text/javascript"></script>
|
|
<h1 class="topictitle1">Plan system security</h1>
|
|
<div><p>System security entails controlling user access and their privileges,
|
|
maintaining information integrity, monitoring processes and access, auditing
|
|
system functions, and providing backup and recovery of security related information.</p>
|
|
<p>On the i5/OS™,
|
|
system security is integrated into the operating system through use of system
|
|
values. System values control how a given function will perform based on how
|
|
the value is defined. Security system values are categorized based on the
|
|
functions that they perform. For example, security system values can manage
|
|
the level of security on your system and signon and password controls. </p>
|
|
<p>Using security system values require that a user or administrator have
|
|
the appropriate authority to change and update these values. In some cases,
|
|
the authorities for these security values are different. For each security
|
|
system value described in these sections the necessary authority is provided. </p>
|
|
<p>Security system values can be set through the i5/OS character-based interface or through iSeries™ Navigator,
|
|
a graphical user interface which provides easy management of most i5/OS functions.
|
|
This information provides names of system values for both iSeries Navigator
|
|
and its equivalent in the character-based interface.</p>
|
|
<p>In addition this topic provides descriptions of these security system values,
|
|
recommendations for common installations, and a form to record your system
|
|
value decisions.</p>
|
|
<p>To complete system security planning, review these topics on security-related
|
|
system values and record your choices on the <a href="rzamvsysvalworksheet.htm">System Value Selection</a> form. See the following
|
|
topics regarding security related system values:</p>
|
|
</div>
|
|
<div>
|
|
<ul class="ullinks">
|
|
<li class="ulchildlink"><strong><a href="rzamvgensecsysval.htm">General security system values</a></strong><br />
|
|
General security system values provide the cornerstone for your security policy.</li>
|
|
<li class="ulchildlink"><strong><a href="rzamvpwdsysval.htm">Password system values</a></strong><br />
|
|
In addition to setting signon system values, you also need to decide rules regarding users passwords</li>
|
|
<li class="ulchildlink"><strong><a href="rzamvauditsysval.htm">Audit system values</a></strong><br />
|
|
This topic describes the auditing system values in detail.</li>
|
|
<li class="ulchildlink"><strong><a href="rzamvrestoresysvalplan.htm">Security-related restore system values</a></strong><br />
|
|
Restoring programs to your system represents a security exposure.</li>
|
|
<li class="ulchildlink"><strong><a href="rzamvsysvalworksheet.htm">System values selection worksheet</a></strong><br />
|
|
This topic introduces the System Values Selection worksheet.</li>
|
|
<li class="ulchildlink"><strong><a href="rzamvsecurityinternet.htm">Security considerations for internet browsers</a></strong><br />
|
|
Use this information to learn about common security threats from using Internet browsers.</li>
|
|
<li class="ulchildlink"><strong><a href="rzamvplanlpar.htm">Plan LPAR security</a></strong><br />
|
|
Use this information to plan security for logical partitions (LPARs) on your servers.</li>
|
|
<li class="ulchildlink"><strong><a href="rzamvplanopsconsole.htm">Plan operations console security</a></strong><br />
|
|
Operations Console allows you to use your PC to access and control your system. It is important to include Operations Console in your overall security plan.</li>
|
|
</ul>
|
|
|
|
<div class="familylinks">
|
|
<div class="parentlink"><strong>Parent topic:</strong> <a href="rzamvplansecstrat.htm" title="This topic describes various aspects of planning a security strategy.">Plan your security strategy</a></div>
|
|
</div>
|
|
<div class="relconcepts"><strong>Related concepts</strong><br />
|
|
<div><a href="rzamvseclvlterm.htm" title="Security on your system is arranged in a series of levels, with each level offering a greater degree of security and protection of your data than the previous level.">Security levels</a></div>
|
|
</div>
|
|
</div>
|
|
</body>
|
|
</html> |