Abstract for z/VM Secure Configuration Guide

This document describes the steps necessary to configure your z/VM installation to conform with the requirements of the Common Criteria.

Intended Audience: This document is designed for administrators responsible for establishing and maintaining security policies on a z/VM system.

Accessing the Certified Version of This Document: The formally certified version of this document, SC24-6230-05, is controlled and maintained on IBM Resource Link (sign in). This site uses HTTPS to assure transmission of its contents.

The document is available in the z/VM Knowledge Center at the following: IBM Knowledge Center - z/VM.

Before downloading the PDF version of this document, please verify the validity of the certificate being used to secure your web connection. The mechanism for validating a certificate will vary depending upon the web browser being used to download the document – for example, by clicking on the padlock icon in Microsoft Internet Explorer, then choosing More Information and Security to view the contents of the certificate, or by selecting Tools > Page Info > Security > View Certificate in Mozilla Firefox.

The certificate should indicate an Organization of International Business Machines Corporation, with a Common Name (CN) of *.ibm.com.

If you are unable to locate a certificate, or cannot find a valid or correct certificate, you may not be viewing the appropriate level of guidance. Please refer to on-site help information or contact IBM Support with any comments or questions.