Skip to main content

Techdocs Library > White papers >

z/OSŪ data set encryption volume 2 : The keys process



Document Author:

Arnaud MANTE


Document ID:

WP102740


Doc. Organization:

Global Markets


Document Revised:

12/06/2017


Product(s) covered:

Crypto Coprocessor; DFSMS; IBM eServer zSeries; IBM System z; IBM Z; ICSF; MVS; z Systems; z14; zSeries; z/OS







Abstract: Data set encryption is really helpful for the security of your data!

But, to plan a key rotation, to manage which data will be encrypted, and the keys associated, you know to understand the process of encryption!

Which key will be used to encrypt the data? Which key will be encrypted by the master key?

This document will describe all the process.

dataset-encryption-volume2-v1.pdfdataset-encryption-volume2-v1.pdf



Classification:

Hardware; Software

Category:

Security




Platform(s):

IBM System z Family; IBM Z

S/W Pillar(s):

IBM System z Software

O/S:

MVS; z/OS

Keywords:

GDPR, ICSF, data set encryption, crypto, z14, security, CPACF

The Techdocs Library
Is this your first visit to Techdocs (the Technical Sales Library)?

Learn more


Techdocs QuickSearch

: