You are on page 1of 2

03/01/2024, 17:10 Planning and setting up system security - IBM Documentation

Planning and setting up system


security
Last Updated: 2021-03-08

This topic collection provides you with detailed information about planning, setting up, and using your
system security. This topic collection combines the information formerly in the Basic system security
and planning topic collection and in the Tips and Tools for Securing Your iSeries manual.

Determining your company's system security is one of the most basic and most important decisions
that you will make during the course of building your security plan. With system security you need to
balance the need to safeguard your valuable information and the need of users to access that
information to successfully make your company thrive. To strike this balance you must understand
the specific needs and goals of your company's current direction but also be aware of future needs.
Your security plan must protect your resources but also must be flexible enough to grow as your
company grows.

Several tools exist that can aid you in creating, configuring, and managing your system-level security
on your server. It is important to note that security does not end with protecting the server and
managing access to assets that are stored on the system. A complete security implementation needs
to include not only system level security, but also network level security and transaction level
security. This topic focuses on system-level security.

Use this information to develop a personalized plan that fits your company's specific system security
needs. After you complete the planning phase of your system security, you can set up system security
by using the instructions provided in this information.

– What's new for IBM i 7.1


Read about new or significantly changed information for the Planning and setting up system
security topic collection.
– PDF file for Planning and setting up system security
You can view and print a PDF file of this information.
– Frequently asked questions
There are common questions about setting up and using system security.
– Concepts
To effectively create a security policy and plan security measures for your system, you need to
understand the following security concepts, some of which are general concepts and some of
which are specific to the hardware type.
– eServer Security Planner
The planner asks you a series of questions about your business environment and your security
goals. Based on your answers, the planner provides you with a list of recommendations for setting
password rules, resource access rules, logging and auditing rules, and other OS specific security
settings.
https://www.ibm.com/docs/en/i/7.1?topic=security-planning-setting-up-system 1/2
03/01/2024, 17:10 Planning and setting up system security - IBM Documentation

– Planning your security strategy


A security strategy provides a systematic approach to all the planning tasks that are necessary for
implementing your company's security policy.
– Implementing your security strategy
This topic describes the tasks for implementing your security strategy, explains why they are
important, and provides links to the implementation topics.
– Managing security
Once you've planned and implemented your security strategy, there remains the task of managing
the security of your system.
– Monitoring security
There is more than one technique available for monitoring and auditing security on your system.
Consider the information presented here when choosing the best technique or combination of
techniques for your system.
– Related information for Planning and setting up system security
Listed here are the product manuals and IBM® Redbooks® (in PDF format), Web sites, and
information center topics that relate to the Plan and set up system security topic. You can view or
print any of the PDFs.

https://www.ibm.com/docs/en/i/7.1?topic=security-planning-setting-up-system 2/2

You might also like