Skip to main content

Getting Started with z/OS Data Set Encryption

An IBM Redbooks publication

thumbnail 

Published on 23 March 2026

  1. .PDF (6.0 MB)

Google Play BooksRead in Google Books Order hardcopy
Share this page:   

ISBN-10: 0738462527
ISBN-13: 9780738462523
IBM Form #: SG24-8410-02


Authors: Bill White, Didier Andre, Cecilia Carranza Lewis and Kasper Lindberg

    menu icon

    Abstract

    This IBM® Redbooks® publication provides a broad explanation of data protection through encryption and IBM Z® pervasive encryption with a focus on IBM z/OS® data set encryption.

    It describes how the various hardware and software components interact in a z/OS data set encryption environment.

    In addition, this book concentrates on the planning and preparing of the environment and offers implementation, configuration, and operational examples that can be used in z/OS data set encryption environments.

    This publication is intended for IT managers, IT architects, system programmer, and security administrators who plan for, deploy, and manage security on the Z platform. The reader is expected to have a basic understanding of IBM Z security concepts.

    Table of Contents

    Chapter 1. Protecting data in today's IT environment

    Chapter 2. Identifying components and release levels

    Chapter 3. Planning for z/OS data set encryption

    Chapter 4. Preparing for z/OS data set encryption

    Chapter 5. Deploying z/OS data set encryption

    Chapter 6. Auditing z/OS data set encryption

    Chapter 7. Maintaining encrypted data sets

    Chapter 8. Maintaining the ICSF environment

    Chapter 9. Maintaining data set encryption keys with ICSF

    Chapter 10. IBM Unified Key Orchestrator

    Appendix A. Troubleshooting

    Appendix B. Sample REXX scripts for creating DATA and CIPHER keys