IBM Power Systems™ servers and AIX® 6.1, IBM's latest version of a UNIX® operating system (OS), deliver dependable hardware and software security features. Effective system and network security policies depend not just on hardware components you can rely on, but also operating system technologies that serve as building blocks for the applications that control users' access.
With the advanced authentication, accountability, administration and encryption capabilities of the Power Systems platform and the AIX OS, you can set system-wide security policies that meet the needs of your organization along with controls that are configurable on a user-by-user basis.
AIX 6.1 includes new support for security including Role Based Access Control, Multi-level security, enhancements to the AIX Security Expert and many other features designed to improve the security of your AIX systems.
Receive the latest security notices, software fixes and maintenance release information, including installation tips, PTFs in error, high-impact advisories and microcode updates.
To report a security vulnerability please send an email to email@example.com. Please encrypt sensitive email using our PGP key. You can obtain the key by using a public key server or clicking here (TXT, 3KB) . The PGP key has the following properties:
Key ID = 0x28BFAA12
Key fingerprint = 2A0A D33E 6E0A BAD6 F77B EC2C E1F9 9DF8 28BF AA12
AIX Security Advisories and Interim Fixes Sign Verification
Security Vulnerability Advisories and Interim Fixes are signed. Each Advisory includes instructions on how-to sign verify the Advisory and any Interim Fixes associated with the Advisory. A public key is required to perform the Verification process. You can obtain the OpenSSL key by using a public key by clicking here (TXT, 1KB) .