Security overview
This section provides the security recommendations and guidelines for IBM PEM. The intended audience is System Administrators.
The topics in this section details the security issues and features such as authentication, authorization, and access control policies that helps you create a reasonably secure implementation of the service components.
Important: The topics covered in this section addresses only security issues pertaining
to IBM PEM.
The issues relating to vulnerabilities of your operating system and other software and hardware components are not covered in this section. To secure your operating system, contact your software vendor or product information to determine the appropriate measures that you must take.