About cookies on this site Our websites require some cookies to function properly (required). In addition, other cookies may be used with your consent to analyze site usage, improve the user experience and for advertising. For more information, please review your options. By visiting our website, you agree to our processing of information as described in IBM’sprivacy statement. To provide a smooth navigation, your cookie preferences will be shared across the IBM web domains listed here.
Last Updated: 3 April 2025
z/VM Security and Integrity
Publications, Presentations, and Resources
Here are the latest publications regarding z/VM Security and Integrity. They are arranged by category, in reverse chronological order. This list will be updated on a rolling basis; if there are articles, papers, presentations, books, or categories missing from this list, please contact Brian Hugenbruch (bwhugen@us.ibm.com).
General Security Information
- ZIP: z/VM V7.4 Common Criteria EAL4+ Collection Kit -- contains all documentation analyzed as part of the EAL4+ security evaluation of z/VM V7.4 (2025). More information can be found at: https://www.vm.ibm.com/library/pdfzip.html
- SHA256 Hash value: 28046EB946DFEC6CEDCFE50BD9EFAE61D3271741D5E4329D70A0E3BD7ACB07CF
- PDF: z/VM V7.4 Secure Configuration Guide -- for configuration of z/VM to the EAL4+ requirements of z/VM's Common Criteria evaluation target (2025)
- SHA256 Hash value: 6af44ab35625ebaaa4066e8e02b2b556ae7a65bfbde47098c70a2f0f47ae6ee8
- RedBook: Securing Your Cloud: IBM Security for LinuxONE (2018)
- RedBook: Security for Linux on IBM System Z (2013)
- PDF: The Value of z/VM: z/VM Security and Integrity (2005)
IBM Z Hardware Cryptography
- Presentation: Getting Started with IBM Z Crypto Virtualization (2019)
- Presentation: Pervasive Encryption for z/VM and Linux on Z (2018, Presentation by Brian Hugenbruch)
Using the z/VM TLS/SSL Server
- Web: z/VM TCP/IP Webpage: SSL Configuration How To's
- Presentation: Junior Woodchuck's Guide to TLS on z/VM (presentation by Brian Hugenbruch)
- Presentation: Securing z/VM Connectivity (presentation by Brian Hugenbruch)
Using RACF for z/VM
- YouTube: "Preparing your z/VM System for Multi-Factor Authentication" (2020, Live at the VM Workshop)
- Paper: "Validating and Repairing RACF Database Integrity on z/VM"
- Presentation: Junior Woodchuck's Guide to RACF Database Repair (2017)