Requirements for Installing and Customizing z/VM and RACF
This chapter describes the security requirements to keep in mind while installing or customizing z/VM® and RACF. Use the options and restrictions described in this chapter to configure z/VM and RACF to be compliant with the requirements of the Common Criteria protection profiles under use. If you want to operate your system in labeled security mode (LSM), additional information is provided. Note that the LSM specific information in this chapter is clearly marked. If this is not appropriate for your system, you may skip these items