Skip to main content

Getting Started with z/OS Data Set Encryption

An IBM Redbooks publication

thumbnail 

Published on 10 December 2021

  1. .EPUB (3.9 MB)
  2. .PDF (4.7 MB)

Apple BooksGoogle Play BooksRead in Google Books
Share this page:   

ISBN-10: 0738460222
ISBN-13: 9780738460222
IBM Form #: SG24-8410-01


Authors: Bill White, Cecilia Carranza Lewis, Eysha Shirrine Powers, David Rossi, Eric Rossman, Andy Coulsonr, Jacky Doll, Brad Habbershow, Thomas Liu, Ryan McCarry, Philippe Richard, Romoaldo Santos, Isabel Arnold and Kasper Lindberg

Related video

0
    menu icon

    Abstract

    This IBM® Redpaper Redbooks® publication provides a broad explanation of data protection through encryption and IBM Z® pervasive encryption with a focus on IBM z/OS® data set encryption. It describes how the various hardware and software components interact in a z/OS data set encryption environment.

    In addition, this book concentrates on the planning and preparing of the environment and offers implementation, configuration, and operational examples that can be used in z/OS data set encryption environments.

    This publication is intended for IT architects, system programmer, and security administrators who plan for, deploy, and manage security on the Z platform. The reader is expected to have a basic understanding of IBM Z security concepts.

    Table of Contents

    Chapter 1. Protecting data in today's IT environment

    Chapter 2. Identifying components and release levels

    Chapter 3. Planning for z/OS data set encryption

    Chapter 4. Preparing for z/OS data set encryption

    Chapter 5. Deploying z/OS data set encryption

    Chapter 6. Auditing z/OS data set encryption

    Chapter 7. Maintaining encrypted data sets

    Chapter 8. Maintaining the ICSF environment

    Chapter 9. Maintaining data set encryption keys with ICSF

    Chapter 10. IBM Enterprise Key Management Foundation Web Edition

    Appendix A. Troubleshooting

    Appendix B. Sample REXX scripts for creating DATA and CIPHER keys

     

    Others who read this also read