Skip to main content

Centrally Managing Access to Self-Encrypting Drives in Lenovo System x Servers Using IBM Security Key Lifecycle Manager

An IBM Redbooks publication

thumbnail 

Published on 16 March 2015

  1. .EPUB (7.2 MB)
  2. .PDF (12.5 MB)

 Order hardcopy
Share this page:   

ISBN-10: 0738440493
ISBN-13: 9780738440491
IBM Form #: SG24-8247-00


Authors: Ryan Bradley, Ryan Bradley and Angelo Parisi

menu icon

Abstract

Data security is one of the paramount requirements for organizations of all sizes. Although many companies invested heavily in protection from network-based attacks and other threats, few effective safeguards are available to protect against potentially costly exposures of proprietary data that results from a hard disk drive being stolen, misplaced, retired, or redeployed.

Self-encrypting drives (SEDs) can satisfy this need by providing the ultimate in security for data-at-rest and can help reduce IT drive retirement costs in the data center. Self-encrypting drives are also an excellent choice if you must comply with government or industry regulations for data privacy and encryption.

To effectively manage a large deployment of SEDs in Lenovo® System x® servers, an organization must rely on a centralized key management solution. This IBM Redbooks® publication explains the technology behind SEDs and demonstrates how to deploy a key management solution that uses IBM Security Key Lifecycle Manager and properly setup your System x servers.

Table of Contents

Part 1. Technology and configuration

Chapter 1. Technology primer

Chapter 2. Supported systems and sample configuration

Part 2. Hands-on configuration

Chapter 3. IBM Security Key Lifecycle Manager setup

Chapter 4. Integrated Management Module configuration

Chapter 5. UEFI configuration

Chapter 6. Managing your System x server SED deployment

Appendix A. Local key management alternatives

Appendix B. Troubleshooting

Appendix C. Licenses and software

 

Others who read this also read