This IBM® Redbooks® publication provides a broad explanation of data protection through encryption and IBM Z® pervasive encryption with a focus on IBM z/OS® data set encryption.
It describes how the various hardware and software components interact in a z/OS data set encryption environment.
In addition, this book concentrates on the planning and preparing of the environment and offers implementation, configuration, and operational examples that can be used in z/OS data set encryption environments.
This publication is intended for IT managers, IT architects, system programmer, and security administrators who plan for, deploy, and manage security on the Z platform. The reader is expected to have a basic understanding of IBM Z security concepts.
Chapter 1. Protecting data in today's IT environment
Chapter 2. Identifying components and release levels
Chapter 3. Planning for z/OS data set encryption
Chapter 4. Preparing for z/OS data set encryption
Chapter 5. Deploying z/OS data set encryption
Chapter 6. Auditing z/OS data set encryption
Chapter 7. Maintaining encrypted data sets
Chapter 8. Maintaining the ICSF environment
Chapter 9. Maintaining data set encryption keys with ICSF
Chapter 10. IBM Unified Key Orchestrator
Appendix A. Troubleshooting
Appendix B. Sample REXX scripts for creating DATA and CIPHER keys
The material included in this document is in DRAFT form and is provided 'as is' without warranty of any kind. IBM is not responsible for the accuracy or completeness of the material, and may update the document at any time. The final, published document may not include any, or all, of the material included herein. Client assumes all risks associated with Client's use of this document.