|
|
|
|
LEADER |
00000cam a22000007i 4500 |
001 |
OR_on1304902887 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu|||unuuu |
008 |
220322s2022 xx o 000 0 eng d |
040 |
|
|
|a ORMDA
|b eng
|e rda
|e pn
|c ORMDA
|d ORMDA
|d OCLCO
|d OCLCF
|d OCLCO
|d OCLCQ
|
020 |
|
|
|a 9780738460437
|q (electronic bk.)
|
020 |
|
|
|a 0738460435
|q (electronic bk.)
|
029 |
1 |
|
|a AU@
|b 000071520653
|
035 |
|
|
|a (OCoLC)1304902887
|
037 |
|
|
|a 9780738460437
|b O'Reilly Media
|
050 |
|
4 |
|a TK5105.86
|
082 |
0 |
4 |
|a 004.6/87
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Scales, Bill,
|e author.
|
245 |
1 |
0 |
|a IBM Spectrum Virtualize, IBM FlashSystem, and IBM SAN volume controller security feature checklist /
|c Bill Scales, Barry Whyte, James Whitaker.
|
250 |
|
|
|a [First edition].
|
264 |
|
1 |
|a [Place of publication not identified] :
|b IBM Redbooks,
|c 2022.
|
300 |
|
|
|a 1 online resource (16 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a IBM Redbooks
|
520 |
|
|
|a IBM Spectrum® Virtualize based storage systems are secure storage platforms that implement various security-related features, in terms of system-level access controls and data-level security features. This document outlines the available security features and options of IBM Spectrum Virtualize based storage systems. It is not intended as a "how to" or best practice document. Instead, it is a checklist of features that can be reviewed by a user security team to aid in the definition of a policy to be followed when implementing IBM FlashSystem®, IBM SAN Volume Controller, and IBM Spectrum Virtualize for Public Cloud. The topics that are discussed in this paper can be broadly split into two categories: System security This type of security encompasses the first three lines of defense that prevent unauthorized access to the system, protect the logical configuration of the storage system, and restrict what actions users can perform. It also ensures visibility and reporting of system level events that can be used by a Security Information and Event Management (SIEM) solution, such as IBM QRadar®. Data security This type of security encompasses the fourth line of defense. It protects the data that is stored on the system against theft, loss, or attack. These data security features include, but are not limited to, encryption of data at rest (EDAR) or IBM Safeguarded Copy (SGC). This document is correct as of IBM Spectrum Virtualize version 8.5.0.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Storage area networks (Computer networks)
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Virtual storage (Computer science)
|
650 |
|
0 |
|a Information storage and retrieval systems.
|
650 |
|
0 |
|a IBM computers.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
2 |
|a Information Systems
|
650 |
|
6 |
|a Réseaux de stockage (Informatique)
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Ordinateurs
|x Mémoires virtuelles.
|
650 |
|
6 |
|a Systèmes d'information.
|
650 |
|
6 |
|a IBM (Ordinateurs)
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
650 |
|
7 |
|a IBM computers.
|2 fast
|0 (OCoLC)fst00966300
|
650 |
|
7 |
|a Information storage and retrieval systems.
|2 fast
|0 (OCoLC)fst00972781
|
650 |
|
7 |
|a Storage area networks (Computer networks)
|2 fast
|0 (OCoLC)fst01133978
|
650 |
|
7 |
|a Virtual storage (Computer science)
|2 fast
|0 (OCoLC)fst01167705
|
700 |
1 |
|
|a Whyte, Barry,
|e author.
|
700 |
1 |
|
|a Whitaker, James,
|e author.
|
830 |
|
0 |
|a IBM redbooks.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780738460437/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|