IBM Power Systems™ servers and AIX® 6.1, IBM's latest version of a UNIX® operating system (OS), deliver dependable hardware and software security features. Effective system and network security policies depend not just on hardware components you can rely on, but also operating system technologies that serve as building blocks for the applications that control users' access.
With the advanced authentication, accountability, administration and encryption capabilities of the Power Systems platform and the AIX OS, you can set system-wide security policies that meet the needs of your organization along with controls that are configurable on a user-by-user basis.
AIX 6.1 includes new support for security including Role Based Access Control, Multi-level security, enhancements to the AIX Security Expert and many other features designed to improve the security of your AIX systems.
AIX 6.1 security: defense in depth
AIX 6.1 introduces multiple security enhancements to provide a variety of options for clients to secure their IT environment. Clients can achieve defense in depth protection for their IT environment by deploying most of these AIX security features.
Managing AIX security
From access control lists to auditing subsystems, Power Systems and AIX tools can help you manage your security facilities, whether you are protecting a single processor or a cross-platform network. Explore technical content that explains how.
Manage various users and groups and implement access and privilege controls against operating system resources.
Verify the identities of principals on physically insecure networks.
Effectively and securely administer your IT environment, including network infrastructure, servers, clients and pervasive devices.
RealSecure Server Sensor
Multi-layered prevention technology in IBM RealSecure Server Sensor for AIX guards against threats from internal and external attacks.
Applications and tools
Use the security features of Power Systems servers to establish operating procedures that address security requirements and exposures.
Ensure that access to protected information resources is properly granted.
Use cryptographic hardware solutions to enhance data-transmission protection and to secure highly sensitive cryptographic keys.
See additional materials covering security management for Power Systems servers and the AIX OS.
Receive the latest security notices, software fixes and maintenance release information, including installation tips, PTFs in error, high-impact advisories and microcode updates.
To report a security vulnerability please send an email to firstname.lastname@example.org. Please encrypt sensitive email using our PGP key. You can obtain the key by using a public key server or clicking here (TXT, 3KB). The PGP key has the following properties:
Key ID = 0x28BFAA12
Key fingerprint = 2A0A D33E 6E0A BAD6 F77B EC2C E1F9 9DF8 28BF AA12