0%

Book Description

This IBM® Redpaper™ publication explains the IBM DS8000 Safeguarded Copy functionality. With Safeguarded Copy, organizations have the ability to improve their cyber resiliency by frequently creating protected point-in-time backups of their critical data, with minimum impact and effective resource utilization.

The paper introduces Safeguarded Copy and discusses the need for logical corruption protection (LCP) and information about regulatory requirements. It presents the general concepts of LCP, and then explore various use cases for recovery.

The paper is intended for IT security architects, who plan and design an organization's cyber security strategy, as well as the infrastructure technical specialists who implement them.

Table of Contents

  1. Front cover
  2. Notices
    1. Trademarks
  3. Preface
    1. Authors
      1. Now you can become a published author, too
      2. Comments welcome
      3. Stay connected to IBM Redbooks
  4. Chapter 1. Safeguarded Copy introduction and concepts
    1. 1.1 The need to protect data
      1. 1.1.1 What is logical corruption?
      2. 1.1.2 Regulatory requirements
      3. 1.1.3 Use cases for data protection
      4. 1.1.4 Requirements for logical corruption protection
    2. 1.2 IBM DS8000 Safeguarded Copy
      1. 1.2.1 Previous IBM DS8000 logical corruption protection capabilities
      2. 1.2.2 Objectives for Safeguarded Copy
      3. 1.2.3 Safeguarded Copy basic operations
      4. 1.2.4 Managing backups
      5. 1.2.5 Safeguarded Backup Capacity
      6. 1.2.6 Safeguarded Copy recovery
      7. 1.2.7 Further considerations
  5. Chapter 2. Safeguarded Copy planning and considerations
    1. 2.1 Hardware and software prerequisites
    2. 2.2 Safeguarded Copy sizing considerations
      1. 2.2.1 Safeguarded Backup Capacity sizing
      2. 2.2.2 Recovery volumes capacity sizing
      3. 2.2.3 Performance considerations
    3. 2.3 Monitoring Safeguarded Copy
      1. 2.3.1 Using IBM CSM for Safeguarded Copy session monitoring
      2. 2.3.2 Safeguarded Copy capacity warning messages for z/OS
      3. 2.3.3 DS8000 DSCLI and GUI messages
    4. 2.4 Security considerations
    5. 2.5 DR, HA, and Safeguarded Copy topologies
      1. 2.5.1 Two-site DR and Safeguarded Copy topologies
      2. 2.5.2 Three-site and four-site DR and Safeguarded Copy topologies
    6. 2.6 Configuration changes considerations
      1. 2.6.1 Adding new copy sets
      2. 2.6.2 Removing copy sets
    7. 2.7 Safeguarded Copy considerations
  6. Chapter 3. Safeguarded Copy implementation and management
    1. 3.1 Implementation of a Safeguarded Copy environment
      1. 3.1.1 Configure the Safeguarded Backup Capacity
      2. 3.1.2 Create a Safeguarded Copy session with IBM Copy Services Manager
    2. 3.2 Management of a Safeguarded Copy environment
      1. 3.2.1 Verify and modify the Safeguarded Copy session properties
      2. 3.2.2 Create a Safeguarded Copy Backup
      3. 3.2.3 Expire a Safeguarded Copy Backup
      4. 3.2.4 Recover a Safeguarded Copy Backup
      5. 3.2.5 Other Copy Services Manager operations related to Safeguarded Copy
      6. 3.2.6 Other DSCLI / DSGUI operations related to Safeguarded Copy
  7. Related publications
    1. IBM Redbooks
    2. Other publications
    3. Online resources
    4. Help from IBM
  8. Back cover
18.225.149.32