0%

This IBM® Redpaper Redbooks® publication provides a broad explanation of data protection through encryption and IBM Z® pervasive encryption with a focus on IBM z/OS® data set encryption. It describes how the various hardware and software components interact in a z/OS data set encryption environment.

In addition, this book concentrates on the planning and preparing of the environment and offers implementation, configuration, and operational examples that can be used in z/OS data set encryption environments.

This publication is intended for IT architects, system programmer, and security administrators who plan for, deploy, and manage security on the Z platform. The reader is expected to have a basic understanding of IBM Z security concepts.

Table of Contents

  1. Front cover
  2. Notices
  3. Preface
  4. Chapter 1. Protecting data in today’s IT environment
  5. Chapter 2. Identifying components and release levels
  6. Chapter 3. Planning for z/OS data set encryption
  7. Chapter 4. Preparing for z/OS data set encryption
  8. Chapter 5. Deploying z/OS data set encryption
  9. Chapter 6. Auditing z/OS data set encryption
  10. Chapter 7. Maintaining encrypted data sets
  11. Chapter 8. Maintaining the ICSF environment
  12. Chapter 9. Maintaining data set encryption keys with ICSF
  13. Chapter 10. IBM Enterprise Key Management Foundation Web Edition
  14. Appendix A. Troubleshooting
  15. Appendix B. Sample REXX scripts for creating DATA and CIPHER keys
  16. Related publications
  17. Back cover
18.116.21.232