v
The
hardware
and
any
networks
used
to
connect
the
hardware
must
be
physically
secure.
Access
to
I/O
devices
must
be
restricted
to
authorized
personnel.
The
hardware
system
console
must
be
physically
protected
from
access
other
than
by
authorized
system
administrators.
v
The
Hardware
Management
Console
User
Interface
Style
selection
must
specify
″
Classic
Style
″
.
v
The
remote
support
facility
must
be
disabled.
v
Devices
should
be
configured
so
that
no
device
is
accessible
by
more
than
one
partition
(although
they
may
be
accessible
by
more
than
one
channel
path).
v
Each
I/O
(physical)
control
unit
should
be
allocated
to
a
single
partition
in
the
current
configuration.
v
The
Security
Administrator
should
not
reconfigure
a
channel
path
unless
all
attached
devices
and
control
units
are
attached
to
that
path
only.
v
The
Security
Administrator
should
help
ensure
that
all
devices
and
control
units
on
a
reconfigurable
path
are
reset
before
the
path
is
allocated
to
another
partition.
v
No
channel
paths
should
be
shared
between
partitions.
v
The
amount
of
reserved
storage
for
a
partition
should
be
zero
to
eliminate
the
possibility
of
a
covert
channel.
v
Although
the
system
will
help
ensure
that
the
total
number
of
dedicated
and
shared
processors
are
not
over
allocated,
the
System
Administrator
should
make
sure
that
the
number
of
processors
dedicated
to
activated
partitions
is
less
than
the
total
number
available.
This
is
important
so
that
some
processors
are
available
for
partitions
that
do
not
have
dedicated
access.
v
Dynamic
I/O
Configuration
changes
should
be
disabled
(i.e.
Changes
require
a
power-on
reset).
v
I/O
Priority
Queuing
should
be
disabled.
v
Workload
Manager
should
be
disabled
so
that
CPU
and
I/O
resources
are
not
managed
across
partitions.
v
No
partition
should
be
configured
to
enable
hipersockets
(Internal
Queued
Direct
I/O).
v
Partitions
should
be
prevented
from
receiving
performance
data
from
resources
that
are
not
allocated
to
them
(no
partition
should
have
Global
Performance
Data
Control
Authority).
v
At
most
one
partition
should
have
I/O
Configuration
Control
Authority
(i.e.
No
more
than
one
partition
should
be
able
to
update
any
IOCDS).
v
The
Security
Administrator
should
help
ensure
that
write
access
is
disabled
for
each
IOCDS,
unless
that
IOCDS
is
to
be
updated
(the
current
IOCDS
should
not
be
updated).
v
The
Security
Administrator
should
verify
any
changed
IOCDS
after
a
power-on
reset
with
that
IOCDS,
before
any
partitions
have
been
activated
(the
Security
Administrator
may
determine
whether
the
IOCDS
has
been
changed
by
inspecting
the
date
of
the
IOCDS).
v
No
partition
should
have
Cross-partition
Control
Authority
(i.e.
No
partition
should
be
able
to
reset
or
deactivate
another
partition).
v
No
partition
should
have
coupling
facility
channels
which
would
allow
communication
to
a
Coupling
Facility
partition.
v
Replication
of
HMC
Customizable
Data
must
be
disabled.
Appendix
B.
Developing,
Building,
and
Delivering
a
Certified
System
B-3
Содержание Z9
Страница 1: ...System z9 Processor Resource Systems Manager Planning Guide SB10 7041 03...
Страница 2: ......
Страница 3: ...System z9 Processor Resource Systems Manager Planning Guide SB10 7041 03...
Страница 12: ...x PR SM Planning Guide...
Страница 18: ...xvi PR SM Planning Guide...
Страница 26: ...xxiv PR SM Planning Guide...
Страница 43: ...ZVSE ZVM Figure 1 1 Characteristics of Logical Partitions Chapter 1 Introduction to Logical Partitions 1 17...
Страница 54: ...1 28 PR SM Planning Guide...
Страница 126: ...2 72 PR SM Planning Guide...
Страница 195: ...Figure 3 23 Security Page Image Profile Chapter 3 Determining the Characteristics of Logical Partitions 3 69...
Страница 220: ...4 8 PR SM Planning Guide...
Страница 232: ...5 12 PR SM Planning Guide...
Страница 250: ...B 16 PR SM Planning Guide...
Страница 266: ...D 10 PR SM Planning Guide...
Страница 272: ...X 6 PR SM Planning Guide...
Страница 273: ......
Страница 274: ...Printed in USA SB10 7041 03...