Although IBM POWER systems run several operating systems – AIX, Linux, and IBM i – AIX is the one that often gets short shrift in security discussions. IBM i has extremely robust intrinsic security, and Linux, although much less secure than either AIX or IBM i, has many more eyes watching for problems.
For many, hardening AIX is simply a matter of applying sensible general Unix security practices, such as closing unnecessary IP ports, carefully applying file permissions, and using strong password. But AIX has some significant corner cases where security can be breached if you're not careful.
In this quintet of AIX security articles, we cover these corner cases, as well as situations requiring higher-than-average security. Download this FREE ebook now