The following information is provided to help you ensure
a secure operating environment for your BladeCenter® products.
As you evaluate the security requirements of your BladeCenter environment, be sure to consider
that unsecured systems-management tools can damage hardware and software.
It is extremely important that you understand all security risks in
your system environment and what you can do to minimize these risks.
Important: You are responsible for the evaluation,
selection, and implementation of security features, administrative
procedures, and appropriate controls for your system environment.
The Best
Practices for BladeCenter Security (PDF) document, based partly
on the industry security standards outlined in COBIT and ISO 27002, describes general methods
that you can use to help secure your systems-management hardware.
Note: The purpose of the Best Practices for BladeCenter Security document
is to help you achieve the best possible level of security with the
capabilities of your hardware. Implementing the security features
described in the document does not secure your environment
completely.
The following resources provide additional information:
- IBM® Security Solutions
- Introducing the IBM Security Framework and IBM Security Blueprint to Realize Business-Driven Security (IBM Redbook)
- IBM Security Technology Outlook
For more information about security features in IBM BladeCenter hardware,
go to BladeCenter
chassis or BladeCenter
blade servers in this Information Center; then, click the link
for your BladeCenter chassis or blade server.
For more information about the advanced management module, see
the Advanced management module topic.
No comments:
Post a Comment