Book description
This IBM® Redpaper Redbooks® publication provides a broad explanation of data protection through encryption and IBM Z® pervasive encryption with a focus on IBM z/OS® data set encryption. It describes how the various hardware and software components interact in a z/OS data set encryption environment.
In addition, this book concentrates on the planning and preparing of the environment and offers implementation, configuration, and operational examples that can be used in z/OS data set encryption environments.
This publication is intended for IT architects, system programmer, and security administrators who plan for, deploy, and manage security on the Z platform. The reader is expected to have a basic understanding of IBM Z security concepts.
Table of contents
- Front cover
- Notices
- Preface
-
Chapter 1. Protecting data in today’s IT environment
- 1.1 Which data
- 1.2 Why protect data
-
1.3 Standards and regulations overview
- 1.3.1 PCI Data Security Standards (PCI-DSS)
- 1.3.2 General Data Protection Regulation (GDPR)
- 1.3.3 California Consumer Privacy Act (CCPA)
- 1.3.4 The Sarbanes-Oxley Act of 2002 (SOX)
- 1.3.5 ISO/IEC 27001
- 1.3.6 Federal Information Security Modernization Act of 2014 (FISMA 2014)
- 1.3.7 Payment Card Industry (PCI) PTS HSM Security Requirements (PCI-HSM)
- 1.3.8 German Banking Industry Committee (GBIC)
- 1.3.9 Australian Payments Network (Auspaynet)
- 1.3.10 Common Criteria
- 1.3.11 FIPS PUB 140-3 (Security Requirements for Cryptographic Modules)
- 1.3.12 HIPAA/HITECH
- 1.3.13 eIDAS (electronic IDentification, Authentication and trust Services)
- 1.4 How to protect data
- 1.5 Pervasive encryption for IBM Z
- 1.6 Understanding z/OS data set encryption
- 1.7 How z/OS data set encryption works
- 1.8 Administrator’s perspective of z/OS data set encryption
- Chapter 2. Identifying components and release levels
-
Chapter 3. Planning for z/OS data set encryption
- 3.1 Creating an implementation plan
- 3.2 Data set administration considerations
- 3.3 Resource authorization considerations
- 3.4 ICSF administration considerations
-
3.5 Key management considerations
- 3.5.1 Understanding key management
- 3.5.2 Reviewing industry regulations
- 3.5.3 Choosing key algorithms and lengths
- 3.5.4 Determining key security
- 3.5.5 Choosing key officers
- 3.5.6 Using protected keys for high-speed encryption
- 3.5.7 Creating a key label naming convention
- 3.5.8 Deciding whether to archive or delete keys
- 3.5.9 Defining key rotation
- 3.5.10 Establishing cryptoperiods
- 3.5.11 Establishing a process for handling compromised operational keys
- 3.5.12 Establishing a process for handling compromised master keys
- 3.5.13 Choosing key management tools
- 3.5.14 Determining key availability needs
- 3.5.15 Creating backups of keys
- 3.5.16 Planning for disaster recovery
- 3.6 General considerations
- Chapter 4. Preparing for z/OS data set encryption
-
Chapter 5. Deploying z/OS data set encryption
- 5.1 Readiness checklists for deployment
- 5.2 Deploying z/OS data set encryption
- 5.3 Generating a secure 256-bit data set encryption key
- 5.4 Protecting data sets with secure keys
- 5.5 Encrypting a data set with a secure key
- 5.6 Verifying that the data set is encrypted
- 5.7 Granting access to encrypted data sets
- 5.8 Accessing encrypted data sets
- 5.9 Viewing the encrypted text
-
Chapter 6. Auditing z/OS data set encryption
- 6.1 Auditing encrypted sequential data sets and PDSEs
- 6.2 Auditing encrypted VSAM data sets
- 6.3 Auditing crypto hardware activity
- 6.4 Auditing security authorization attempts
- 6.5 Auditing crypto engine, service, and algorithm usage
- 6.6 Auditing key lifecycle transitions
- 6.7 Auditing key usage operations
- 6.8 Formatting SMF Type 82 records
- 6.9 Auditing Key management in EKMF
- Chapter 7. Maintaining encrypted data sets
- Chapter 8. Maintaining the ICSF environment
- Chapter 9. Maintaining data set encryption keys with ICSF
- Chapter 10. IBM Enterprise Key Management Foundation Web Edition
- Appendix A. Troubleshooting
- Appendix B. Sample REXX scripts for creating DATA and CIPHER keys
- Related publications
- Back cover
Product information
- Title: Getting Started with z/OS Data Set Encryption
- Author(s):
- Release date: December 2021
- Publisher(s): IBM Redbooks
- ISBN: 9780738460222
You might also like
book
Getting Started with z/OS Data Set Encryption
Abstract This IBM® Redbooks® publication provides a broad explanation of data protection through encryption and IBM …
book
Getting Started with IBM Hyper Protect Data Controller
IBM® Hyper Protect Data Controller is designed to provide privacy protection of your sensitive data and …
book
ABCs of z/OS System Programming Volume 10
The ABCs of IBM® z/OS® System Programming is an 13-volume collection that provides an introduction to …
article
Reinventing the Organization for GenAI and LLMs
Previous technology breakthroughs did not upend organizational structure, but generative AI and LLMs will. We now …