Getting Started with z/OS Data Set Encryption

A draft IBM Redbooks publication

Updated 28 April 2021

cover image

IBM Form #: SG24-8410-01

More options

Rate and comment

Authors: Octavian Lascu

z/OS Data Set Encryption

Abstract

This IBM® Redbooks® publication provides a broad explanation of data protection through encryption and IBM Z® pervasive encryption with a focus on IBM z/OS® data set encryption. It describes how the various hardware and software components interact in a z/OS data set encryption environment.
Updated capabilities and methods: Enhanced Data Set and key support; Using EKMF Web for managing Data Set Encryption.

In addition, this book concentrates on the planning and preparing of the environment and offers implementation, configuration, and operational examples that can be used in z/OS data set encryption environments.

This publication is intended for IT architects, system programmer, and security administrators who plan for, deploy, and manage security on the Z platform. The reader is expected to have a basic understanding of IBM Z security concepts.

Table of contents

Chapter 1. Protecting data in today's IT environment
Chapter 2. Identifying components and release levels
Chapter 3. Planning for z/OS data set encryption
Chapter 4. Preparing for z/OS data set encryption
Chapter 5. Deploying z/OS data set encryption
Chapter 6. Auditing z/OS data set encryption
Chapter 7. Maintaining encrypted data sets
Chapter 8. Maintaining the ICSF environment
Chapter 9. Maintaining data set encryption keys with ICSF
Chapter 10. IBM Enterprise Key Management Foundation Web Edition
Appendix A. Troubleshooting
Appendix B. Sample REXX scripts for creating DATA and CIPHER keys

These pages are Web versions of IBM Redbooks- and Redpapers-in-progress. They are published here for those who need the information now and may contain spelling, layout and grammatical errors. This material has not been submitted to any formal IBM test and is published AS IS. It has not been the subject of rigorous review. Your feedback is welcomed to improve the usefulness of the material to others.

Follow IBM Redbooks

Follow IBM Redbooks