GitHubContribute in GitHub: Edit online

Security best practices for z/OS virtual server instances

To secure your z/OS virtual server instance and identify any security vulnerabilities, you must refer to the following security information and industry standard security reports.

Products and services in the z/OS stock images are periodically reviewed and updated. IBM continues to follow the standard security guidance and provides differentiating technologies in security and data privacy, focusing on but not limited to the following areas:

  • Security patch management
  • Firmware currency
  • Setup of suggested products and services
  • Configuration of hardware and software (operating systems, middleware, third-party applications, open source, and network cards)
  • Integration and monitoring of software, hardware, and end-points
  • Cybersecurity:
    • Least access privilege
    • Separation of duties
    • Defense-in-depth
    • Authentication strength
    • End-to-end encryption

Make sure that you follow the security best practices for your z/OS virtual server instance: