Introduction - 7.0

Assure Security Illumio Implementation Guide

Product type
Software
Portfolio
Integrate
Product family
Assure
Product
Assure Security > Assure Elevated Authority Manager (EAM)
Assure Security > Assure Encryption
Assure Security > Assure Secure File Transfer
Assure Security > Assure Monitoring and Reporting (AMR)
Assure Security > Assure Security Multi-Factor Authentication (MFA)
Assure Security > Assure DB2 Data Monitor (DB2MON)
Assure Security > Assure Security Risk Assessment (SRA)
Assure Security > Assure System Access Manager (SAM)
Assure Security > Assure Secure File Transfer with PGP
Version
7.0
ft:locale
en-US
Product name
Assure Security
ft:title
Assure Security Illumio Implementation Guide
Copyright
2025
First publish date
2025
ft:lastEdition
2025-06-03
ft:lastPublication
2025-06-03T12:57:58.093000
L1_Product_Gateway
Integrate
L2_Product_Segment
IBM Infrastructure
L3_Product_Brand
Precisely Assure
L4_Investment_Segment
IBM i Security
L5_Product_Group
IBM i Security - Assure
L6_Product_Name
Assure Security

Microsegmentation is often required or recommended by several cybersecurity compliance regulations to enhance network security and limit the impact of potential breaches.

While it may not always be explicitly stated, many regulations highlight the importance of network segmentation. Microsegmentation helps fulfill these standards by dividing the network into smaller, secure zones that limit access to sensitive data and systems.

Illumio is a Zero Trust segmentation platform that allows an organization to set granular segmentation policies to control communications and isolate high-value assets to stop breaches and ransomware from spreading.

For the IBM i, the communication between Illumio's software and Assure System Access Manager (SAM) provides yet another layer of security to protect against security breaches. This solution provides for monitoring and controlling the access to and from the IBM i. The integration enhances security by providing a centralized management platform and creating a comprehensive Zero Trust security architecture.

This solution has two major operations: importing the Illumio Access Control List (ACL) file, which defines network security policies into the IBM i system, and sending network traffic activity from the IBM i into the Illumio FlowLink.

The following information will assist in implementing and configuring this integration.

Note: Throughout this document, be aware of extra spaces in the example commands that result from copying and pasting into a 5250 emulation and remove them.