RETIRED CONTENTPlease note that the content on this page is retired. This content is not maintained and may contain information or links that are out of date.
Modernization efforts have increased the attack surfaces as companies web-enable legacy applications, integrate with other platforms, and expand IBM i’s overall network presence.
Organizations need to apply the same attention to detail for IBM i security as they do for other platforms.
This template outlines the basic characteristics required in a Data Center Access Policy. It can be adopted as-is or be used as a guide towards the creation of a new document.