IBM Power Systems™ servers and AIX® 6.1, IBM's latest version of a UNIX® operating system (OS), deliver dependable hardware and software security features. Effective system and network security policies depend not just on hardware components you can rely on, but also operating system technologies that serve as building blocks for the applications that control users' access.
With the advanced authentication, accountability, administration and encryption capabilities of the Power Systems platform and the AIX OS, you can set system-wide security policies that meet the needs of your organization along with controls that are configurable on a user-by-user basis.
AIX 6.1 includes new support for security including Role Based Access Control, Multi-level security, enhancements to the AIX Security Expert and many other features designed to improve the security of your AIX systems.
Managing AIX security
From access control lists to auditing subsystems, Power Systems and AIX tools can help you manage your security facilities, whether you are protecting a single processor or a cross-platform network. Explore technical content that explains how.
Manage various users and groups and implement access and privilege controls against operating system resources.
Verify the identities of principals on physically insecure networks.
Effectively and securely administer your IT environment, including network infrastructure, servers, clients and pervasive devices.
Use the security features of Power Systems servers to establish operating procedures that address security requirements and exposures.
Ensure that access to protected information resources is properly granted.
Use cryptographic hardware solutions to enhance data-transmission protection and to secure highly sensitive cryptographic keys.
See additional materials covering security management for Power Systems servers and the AIX OS.
Receive the latest security notices, software fixes and maintenance release information, including installation tips, PTFs in error, high-impact advisories and microcode updates.
To report a security vulnerability please send an email to email@example.com. Please encrypt sensitive email using our PGP key. You can obtain the key by using a public key server or clicking here (TXT, 3KB) . The PGP key has the following properties:
Key ID = 0x28BFAA12
Key fingerprint = 2A0A D33E 6E0A BAD6 F77B EC2C E1F9 9DF8 28BF AA12
AIX Security Advisories and Interim Fixes Sign Verification
Security Vulnerability Advisories and Interim Fixes are signed. Each Advisory includes instructions on how-to sign verify the Advisory and any Interim Fixes associated with the Advisory. A public key is required to perform the Verification process. You can obtain the OpenSSL key by using a public key by clicking here (TXT, 1KB) .