Last Updated: 29 January 2026
z/VM Security and Integrity
Publications, Presentations, and Resources
Here are the latest publications regarding z/VM Security and Integrity. They are arranged by category, in reverse chronological order. This list will be updated on a rolling basis; if there are articles, papers, presentations, books, or categories missing from this list, please contact Brian Hugenbruch (bwhugen@us.ibm.com).
General Security Information
- PDF: z/VM V7.4 Secure Configuration Guide -- for configuration of z/VM to the NIAP VPP 1.1 requirements of z/VM's Common Criteria evaluation target (2026)
- SHA256 Hash value: 4c40462158e4851255ce1380ca1b31c52bce2e506451d5993c3c373ad3b8ee52
- ZIP: z/VM V7.4 Common Criteria EAL4+ Collection Kit -- contains all documentation analyzed as part of the EAL4+ security evaluation of z/VM V7.4 (2025). More information can be found at: https://www.ibm.com/support/pages/zvm/library/pdfzip.html
- SHA256 Hash value: 28046eb946dfec6cedcfe50bd9efae61d3271741d5e4329d70a0e3bd7acb07cf
- PDF: z/VM V7.4 Secure Configuration Guide -- for configuration of z/VM to the EAL4+ requirements of z/VM's Common Criteria evaluation target (2025)
- SHA256 Hash value: 6af44ab35625ebaaa4066e8e02b2b556ae7a65bfbde47098c70a2f0f47ae6ee8
- PDF: z/VM V7.4 Secure Configuration Guide for configuration of z/VM to the Common Criteria evaluation standard (2021)
- SHA256 Hash value: 6090b1fe0b3fee9a570f3c68ee0e434073f12972795e154c9fc0d5ddc053d1c7
- RedBook: Securing Your Cloud: IBM Security for LinuxONE (2018)
- RedBook: Security for Linux on IBM System Z (2013)
- PDF: The Value of z/VM: z/VM Security and Integrity (2005)
IBM Z Hardware Cryptography
- Presentation: Getting Started with IBM Z Crypto Virtualization (2019)
- Presentation: Pervasive Encryption for z/VM and Linux on Z (2018, Presentation by Brian Hugenbruch)
Using the z/VM TLS/SSL Server
- Web: z/VM TCP/IP Webpage: SSL Configuration How To's
- Presentation: Junior Woodchuck's Guide to TLS on z/VM (presentation by Brian Hugenbruch)
- Presentation: Securing z/VM Connectivity (presentation by Brian Hugenbruch)
Using RACF for z/VM
- YouTube: "Preparing your z/VM System for Multi-Factor Authentication" (2020, Live at the VM Workshop)
- Paper: "Validating and Repairing RACF Database Integrity on z/VM"
- Presentation: Junior Woodchuck's Guide to RACF Database Repair (2017)