Implementing your security strategy

 

This topic describes the tasks for implementing your security strategy, explains why they are important, and provides links to the implementation topics.

This topic guides you through the tasks necessary to implement your security strategy. If you are setting up a new system, you should complete these steps in sequence. The system uses information from each step as you proceed to the next step. Setting up basic system security involves defining your user security, setting up system-level security, protecting your resources on the system, and setting up network security. The tables below highlight each of the steps configure to set up user and resource security.

Before you begin

If you are installing a new system, do these things before you start setting up security:

  1. Make sure your system unit and your devices are installed and working properly. If you do not plan to use system naming for your devices, wait to attach your workstations and printers until after you change the system value that determines how devices are named (QDEVNAMING). Applying the new system values tells you when to attach the devices.

  2. Load any licensed programs you plan to use.

You must complete all the steps to set up user security first, before you begin setting up resource and network security.

Table 1. Steps in setting up system security
Step What you do in this step What worksheets you use
Set up your user environment. Set up initial system values and network attributes. System values selection
Set up system-level security Set up additional system values. IBM® eServer™ Security planner

Table 2. Steps in setting up resource security
Step What you do in this step What worksheets you Uuse
Setting up ownership and public authority Establish ownership and public authority for libraries and objects. Application installation
Creating an authorization list Create authorization lists. Authorization list
Setting up specific authority for objects and libraries Set up access to libraries and individual objects. Library description
Securing your printer output queue Protect printer output by creating output queues and assigning output. Output queue and workstation security
Securing your workstations Protect workstations. Output queue and workstation security

Table 3. Steps in Setting Up Network Security
Step What you do in this step What reference you use
Saving security information Save system values, group and user profiles, job descriptions, and resource security information. Backup and Recovery book
Restoring security information Restore system values, user profiles, objects, authority, programs, authorization lists, and the operating system. Backup and Recovery book
Set up network security Set up network security for APPC, and TCP/IP applications. IBM eServer Security Planner

 

Parent topic:

Planning and setting up system security