 |
 |
 |
 |
| Tivoli Security Management Design Guide, SG24-5101-00 |
 |
 |
 |
|
The first Security Management redbook, Managing Access from Desktop to Datacenter: Introducing TME 10 Security Management, SG24-2021, described the product and was aimed at helping the reader become familiar with the product features. However, an effective implementation of Tivoli Security Management involves defining appropriate access control to significant resources. Even if you are familiar with the Security product and its capabilities, determining what to protect and how to define appropriate access can be a difficult task. The defining document for a Tivoli Security Management installation should be a company's security policy. But in situations where the policy is incomplete or does not exist, how do we go about putting one together?
This publication provides a methodology for designing Tivoli Security Management Installations. Starting from the high-level, organizational viewpoint we show how to define what needs protecting, and how to implement the right levels of protection management.
As there is no book that describes the design of a security management implementation up to now, our aim was to publish this document quickly to help people in the field.
We welcome your comments (see "Comments Welcome" on page xii as we intend to revise this publication in the future. This edition concentrates on Windows NT, and UNIX platforms. Watch for further Redbooks on other platforms, including OS/390, in the upcoming book tentatively titled Managing the OS/390 Security Server with Tivoli.
|
 |
|
 |
|
SK2T-2849-09
|
|
SK2T-8044-05
|
|
|
Publish date
|
|
1998-08-03
|
|
|
Lead author
|
|
Richard Hawes
|
|
|
Other authors
|
Guenther Mayerhoffer Thomas Schuster
|
|
|
ISBN number
|
|
0738400270
|
|
|
Number of pages
|
|
152
|
|
|
 |