This IBM Redbooks Redpaper discusses the configuration, implementation and use of encryption with IBM Storage Scale systems. It is intended to be used by technical professionals and anyone who wants to know more about encryption with IBM Storage Scale systems or anyone who is hands on with the software and devices.
Chapter 1. Introduction to Encryption in IBM Storage Scale
Chapter 2. IBM Security Guardium Key Lifecycle Manager installation and configuration
Chapter 3. IBM Storage Scale File System and encryption configuration
Chapter 4. GNR Encryption and Disk Hospital functionality
The material included in this document is in DRAFT form and is provided 'as is' without warranty of any kind. IBM is not responsible for the accuracy or completeness of the material, and may update the document at any time. The final, published document may not include any, or all, of the material included herein. Client assumes all risks associated with Client's use of this document.