Skip to main content

Getting Started with z/OS Data Set Encryption

A draft IBM Redbooks publication

thumbnail 

Last updated on 16 January 2026

  1. .PDF (6.2 MB)

Share this page:   

IBM Form #: SG24-8410-02


Authors: Bill White, Didier Andre, Cecilia Carranza Lewis and Kasper Lindberg

    menu icon

    Abstract

    This IBM® Redbooks® publication provides a broad explanation of data protection through encryption and IBM Z® pervasive encryption with a focus on IBM z/OS® data set encryption.

    It describes how the various hardware and software components interact in a z/OS data set encryption environment.

    In addition, this book concentrates on the planning and preparing of the environment and offers implementation, configuration, and operational examples that can be used in z/OS data set encryption environments.

    This publication is intended for IT managers, IT architects, system programmer, and security administrators who plan for, deploy, and manage security on the Z platform. The reader is expected to have a basic understanding of IBM Z security concepts.

    Table of Contents

    Chapter 1. Protecting data in today's IT environment

    Chapter 2. Identifying components and release levels

    Chapter 3. Planning for z/OS data set encryption

    Chapter 4. Preparing for z/OS data set encryption

    Chapter 5. Deploying z/OS data set encryption

    Chapter 6. Auditing z/OS data set encryption

    Chapter 7. Maintaining encrypted data sets

    Chapter 8. Maintaining the ICSF environment

    Chapter 9. Maintaining data set encryption keys with ICSF

    Chapter 10. IBM Unified Key Orchestrator

    Appendix A. Troubleshooting

    Appendix B. Sample REXX scripts for creating DATA and CIPHER keys

     

    Special Notices

    The material included in this document is in DRAFT form and is provided 'as is' without warranty of any kind. IBM is not responsible for the accuracy or completeness of the material, and may update the document at any time. The final, published document may not include any, or all, of the material included herein. Client assumes all risks associated with Client's use of this document.