BladeCenter Security – Best Practices

The following information is provided to help you ensure a secure operating environment for your BladeCenter products.

As you evaluate the security requirements of your BladeCenter environment, be sure to consider that unsecured systems-management tools can damage hardware and software. It is extremely important that you understand all security risks in your system environment and what you can do to minimize these risks.

Important: You are responsible for the evaluation, selection, and implementation of security features, administrative procedures, and appropriate controls for your system environment.
The Best Practices for BladeCenter Security (PDF) document, based partly on the industry security standards outlined in COBIT and ISO 27002, describes general methods that you can use to help secure your systems-management hardware.
Note: The purpose of the Best Practices for BladeCenter Security document is to help you achieve the best possible level of security with the capabilities of your hardware. Implementing the security features described in the document does not secure your environment completely.

The following resources provide additional information:

For more information about security features in BladeCenter hardware, go to BladeCenter chassis or BladeCenter blade servers in this Information Center; then, click the link for your BladeCenter chassis or blade server.

For more information about the advanced management module, see the Advanced management module topic.