Skip to main content

Getting Started with Linux on Z Encryption for Data At-Rest

An IBM Redbooks publication

thumbnail 

Published on 04 April 2019, updated 08 April 2019

  1. .EPUB (0.9 MB)
  2. .PDF (2.7 MB)

Apple BooksGoogle Play BooksRead in Google Books
Share this page:   

ISBN-10: 0738457469
ISBN-13: 9780738457468
IBM Form #: SG24-8436-00


Authors: Bill White, Megan Hampton, Benedikt Klotz, Guilherme Nogueira, Pat Oughton and Carlos Henrique Reimer

    menu icon

    Abstract

    This IBM® Redbooks® publication provides a general explanation of data protection through encryption and IBM Z® pervasive encryption with a focus on Linux on IBM Z encryption for data at-rest. It also describes how the various hardware and software components interact in a Linux on Z encryption environment for .

    In addition, this book concentrates on the planning and preparing of the environment. It offers implementation, configuration, and operational examples that can be used in Linux on Z volume encryption environments.

    This publication is intended for IT architects, system administrators, and security administrators who plan for, deploy, and manage security on the Z platform. The reader is expected to have a basic understanding of IBM Z security concepts.

    Table of Contents

    Chapter 1. Protecting sensitive data

    Chapter 2. Identifying components and release levels

    Chapter 3. Planning for Linux on Z data at-rest encryption

    Chapter 4. Preparing for Linux on Z data at-rest encryption

    Chapter 5. Deploying encrypted volumes for data at-rest

    Chapter 6. Auditing and monitoring the data at-rest environment

    Chapter 7. Maintaining encrypted volumes for data at-rest

    Chapter 8. Performing key management for data at-rest encryption

    Appendix A. Using protected keys for high-speed encryption

     

    Others who read this also read