Security in Development: The IBM Secure Engineering Framework

Security in Development: The IBM Secure Engineering Framework
Author :
Publisher : IBM Redbooks
Total Pages : 32
Release :
ISBN-10 : 9780738457178
ISBN-13 : 0738457175
Rating : 4/5 (175 Downloads)

Book Synopsis Security in Development: The IBM Secure Engineering Framework by : Warren Grunbok

Download or read book Security in Development: The IBM Secure Engineering Framework written by Warren Grunbok and published by IBM Redbooks. This book was released on 2018-12-17 with total page 32 pages. Available in PDF, EPUB and Kindle. Book excerpt: IBM® has long been recognized as a leading provider of hardware, software, and services that are of the highest quality, reliability, function, and integrity. IBM products and services are used around the world by people and organizations with mission-critical demands for high performance, high stress tolerance, high availability, and high security. As a testament to this long-standing attention at IBM, demonstration of this attention to security can be traced back to the Integrity Statement for IBM mainframe software, which was originally published in 1973: IBM's long-term commitment to System Integrity is unique in the industry, and forms the basis of MVS (now IBM z/OS) industry leadership in system security. IBM MVS (now IBM z/OS) is designed to help you protect your system, data, transactions, and applications from accidental or malicious modification. This is one of the many reasons IBM 360 (now IBM Z) remains the industry's premier data server for mission-critical workloads. This commitment continues to apply to IBM's mainframe systems and is reiterated at the Server RACF General User's Guide web page. The IT market transformed in 40-plus years, and so have product development and information security practices. The IBM commitment to continuously improving product security remains a constant differentiator for the company. In this IBM RedguideTM publication, we describe secure engineering practices for software products. We offer a description of an end-to-end approach to product development and delivery, with security considered. IBM is producing this IBM Redguide publication in the hope that interested parties (clients, other IT companies, academics, and others) can find these practices to be a useful example of the type of security practices that are increasingly a must-have for developing products and applications that run in the world's digital infrastructure. We also hope this publication can enrich our continued collaboration with others in the industry, standards bodies, government, and elsewhere, as we seek to learn and continuously refine our approach.


Security in Development: The IBM Secure Engineering Framework Related Books

Security in Development: The IBM Secure Engineering Framework
Language: en
Pages: 32
Authors: Warren Grunbok
Categories: Computers
Type: BOOK - Published: 2018-12-17 - Publisher: IBM Redbooks

GET EBOOK

IBM® has long been recognized as a leading provider of hardware, software, and services that are of the highest quality, reliability, function, and integrity.
Security in Development
Language: en
Pages: 26
Authors: Warren Grunbok
Categories:
Type: BOOK - Published: 2018 - Publisher:

GET EBOOK

IBM® has long been recognized as a leading provider of hardware, software, and services that are of the highest quality, reliability, function, and integrity.
Using the IBM Security Framework and IBM Security Blueprint to Realize Business-Driven Security
Language: en
Pages: 240
Authors: Axel Buecker
Categories: Computers
Type: BOOK - Published: 2014-02-06 - Publisher: IBM Redbooks

GET EBOOK

Security is a major consideration in the way that business and information technology systems are designed, built, operated, and managed. The need to be able to
The Journey Continues: From Data Lake to Data-Driven Organization
Language: en
Pages: 30
Authors: Mandy Chessell
Categories: Computers
Type: BOOK - Published: 2018-02-19 - Publisher: IBM Redbooks

GET EBOOK

This IBM RedguideTM publication looks back on the key decisions that made the data lake successful and looks forward to the future. It proposes that the metadat
IBM Security Solutions Architecture for Network, Server and Endpoint
Language: en
Pages: 510
Authors: Axel Buecker
Categories: Computers
Type: BOOK - Published: 2011-02-17 - Publisher: IBM Redbooks

GET EBOOK

Threats come from a variety of sources. Insider threats, as well as malicious hackers, are not only difficult to detect and prevent, but many times the authors