Security Zones on IBM System z: Defining and Enforcing Multiple Security Zones

Provided by: IBM
Format: PDF
Many customers wanting to do Linux server consolidation and deployment to IBM System z experience challenges in balancing the security of a physical "Air gap" with the low cost of consolidation on a single box: it goes against their instincts and training. Being able to understand the security implications, capabilities, advantages, and risks of virtual server consolidation helps to lower or remove barriers to growth and the decision to say "Yes" to System z. This paper describes the architecture of traditional network security zones (Internet, DMZ, application, data, and maintenance) that can be securely manifested on System z through the application of best practices for System z hardware management and z/VM virtual network configuration.

Find By Topic