Abstract for z/VM Secure Configuration Guide
This document describes the steps necessary to configure your z/VM installation to conform with the requirements of the Common Criteria.
Intended Audience: This document is designed for administrators responsible for establishing and maintaining security policies on a z/VM system.
Accessing the Certified Version of This Document: The formally certified version of this document, SC24-6230-05, is controlled and maintained on IBM Resource Link (sign in). This site uses HTTPS to assure transmission of its contents.
The document is available in the z/VM Knowledge Center at the following: IBM Knowledge Center - z/VM.
Before downloading the PDF version of this document, please verify
the validity of the certificate being used to secure your web connection.
The mechanism for validating a certificate will vary depending upon
the web browser being used to download the document – for example,
by clicking on the padlock icon in Microsoft Internet Explorer, then
choosing More Information
and Security
to view the contents
of the certificate, or by selecting Tools > Page Info > Security >
View Certificate in Mozilla Firefox.
The certificate should indicate an Organization of International
Business Machines Corporation
, with a Common Name (CN) of *.ibm.com
.
If you are unable to locate a certificate, or cannot find a valid or correct certificate, you may not be viewing the appropriate level of guidance. Please refer to on-site help information or contact IBM Support with any comments or questions.