This topic describes the tasks for implementing your security strategy, explains why they are important, and provides links to the implementation topics.
This topic guides you through the tasks necessary to implement your security strategy. If you are setting up a new system, you should complete these steps in sequence. The system uses information from each step as you proceed to the next step. Setting up basic system security involves defining your user security, setting up system-level security, protecting your resources on the system, and setting up network security. The tables below highlight each of the steps configure to set up user and resource security.
Before you begin
If you are installing a new system, do these things before you start setting up security:
You must complete all the steps to set up user security first, before you begin setting up resource and network security.
Step | What you do in this step | What worksheets you use |
---|---|---|
Set up your user environment. | Set up initial system values and network attributes. | System values selection |
Set up system-level security | Set up additional system values. | IBM® eServer™ Security planner |
Step | What you do in this step | What worksheets you Uuse |
---|---|---|
Setting up ownership and public authority | Establish ownership and public authority for libraries and objects. | Application installation |
Creating an authorization list | Create authorization lists. | Authorization list |
Setting up specific authority for objects and libraries | Set up access to libraries and individual objects. | Library description |
Securing your printer output queue | Protect printer output by creating output queues and assigning output. | Output queue and workstation security |
Securing your workstations | Protect workstations. | Output queue and workstation security |
Step | What you do in this step | What reference you use |
---|---|---|
Saving security information | Save system values, group and user profiles, job descriptions, and resource security information. | Backup and Recovery book |
Restoring security information | Restore system values, user profiles, objects, authority, programs, authorization lists, and the operating system. | Backup and Recovery book |
Set up network security | Set up network security for APPC, and TCP/IP applications. | IBM eServer Security Planner |