Security Zones on IBM System z: Defining and Enforcing Multiple Security Zones

Many customers wanting to do Linux server consolidation and deployment to IBM System z experience challenges in balancing the security of a physical "Air gap" with the low cost of consolidation on a single box: it goes against their instincts and training. Being able to understand the security implications, capabilities, advantages, and risks of virtual server consolidation helps to lower or remove barriers to growth and the decision to say "Yes" to System z. This paper describes the architecture of traditional network security zones (Internet, DMZ, application, data, and maintenance) that can be securely manifested on System z through the application of best practices for System z hardware management and z/VM virtual network configuration.

Provided by: IBM Topic: Date Added: Feb 2011 Format: PDF

Find By Topic