PSF for z/OS: Security Guide
Previous topic | Next topic | Contents | Index | Contact z/OS | Library | PDF


Introducing Trusted Computing Base Components

PSF for z/OS: Security Guide
S550-0434-03

Introducing Trusted Computing Base Components

A trusted computing base consists of components that together enforce a unified security policy over a computer environment. Components of a trusted computing base include hardware and software. PSF is a software component used in conjunction with hardware and other software components to provide a trusted computing base. Figure 4 illustrates a sample trusted computing base.

Figure 4. Typical Components of a Trusted Computing Base. Your installation might have different components installed.
This figure shows a graphic of a trusted processor with access control software in the center of the figure. Surrounding the processor, with lines drawn from the processor to each one, are graphics representing trusted spooling software, trusted resources, trusted consoles, trusted communications software connecting users, and trusted printers with trusted printer-driver software (PSF).

Go to the previous page Go to the next page




Copyright IBM Corporation 1990, 2014