Previous Topic: Accessing Classified z/UNIX Files and DirectoriesNext Topic: Implementation Checklist


Implementing and Administering an Multilevel Secure System

This section contains the following topics:

Implementation Checklist

Determine Who Administers MLS

Determining What to Classify

Defining Security Levels

Defining Categories

Defining Security Labels

Activating Security Levels, Categories, and Security Labels

Assign Security Labels to Non-data set Resources

Assigning Security Labels to DB2 Resources

Assigning Security Labels to IPv6 Addresses

Assign Security Labels to Objects

Assigning Security Labels to UNIX Files and Directories

Assigning Security Labels to UNIX IPC Objects

Assigning Security Labels to Users

User SECLABELs

Establishing the MLS Environment

Monitoring MLS

Auditing MLS

Tracing SAF Requests