The Pervasive Encryption Information Goldmine
The IBM Z content solution for pervasive encryption is a goldmine of technical resources to help guide you along the journey.
By Jacky Doll and Cecilia Carranza Lewis07/25/2019
But where can you find information about the different pervasive encryption solutions? Where do you go to get started with pervasive encryption? Where can you go to learn about planning considerations and setup procedures? In this article, we take a step back, and show you where to find answers to all kinds of questions about pervasive encryption. The IBM Z content solution for pervasive encryption is a goldmine of technical resources to help guide you along the journey.
What Is Pervasive Encryption and Why Is it Important?At the core of every enterprise are business assets which, if lost or compromised, could cause irreparable damage. Core business data may be governed by regulatory requirements designed to protect data and safeguard privacy, with high penalties in the event of loss. Establishing a fortified perimeter around core business data using encryption is one of the most impactful ways to help protect data and prevent loss. IBM Z pervasive encryption provides a set of solutions which span hardware, software and middleware to help you protect data. Naturally, there is plenty of interest in what pervasive encryption has to offer, and many organizations have already signed on. Now, having a location with a consolidation of technical information related to pervasive encryption would be extremely beneficial.
Where Can You Learn How to Get Started With Pervasive Encryption?When you search the internet for pervasive encryption, you’ll find IBM’s “Pervasive Encryption on IBM Z” product page. This is where you can learn how to invest in data protection and about the hardware enhancements that make the z14 the cryptographic powerhouse. The product page can also transport you to a wealth of technical how-to resources on the pervasive encryption for IBM Z content solution.
The content solution is built into the product page, and if you’re ready to start implementing pervasive encryption, this is precisely the link you need. The most current technical resources available for pervasive encryption are organized into a single view to make searching for the information you need most productive. Anyone in your organization that is responsible for encryption may find useful information, including z/OS administrators (security, system, storage, network, DBA) as well as anyone who manages cryptographic keys.
Where Can You Learn About Solutions Related to Pervasive Encryption?The content solution is a collection of the technical resources related to pervasive encryption for IBM Z. If you are new to pervasive encryption, and want an overview of how it works, the pervasive encryption in action video explains how the various solutions that comprise pervasive encryption protect data against potential threats. If you are ready to learn about the different solutions and components of pervasive encryption, see “How to get started with pervasive encryption on IBM Z.” This section provides you with a solution view for each of the following components:
z/OS Data Set Encryption
Data set encryption enables encryption through the DFSMS access methods. It is application transparent and can be enabled by policy. This section covers an overview along with considerations, guidelines and steps for setting up the environment and creating encrypted data sets. It also points to information regarding how other IBM products and components exploit data set encryption, such as Db2, IMS, CICS, zFS and more.
z/OS Coupling Facility Encryption
Coupling facility resource management (CFRM) policy statements are used to enable encryption on a structure-by-structure basis. Pervasive encryption of coupling facility structures protects user data and simplifies the task of compliance. This section covers considerations and steps to encrypt coupling facility structures.
z/OS Encryption Readiness Technology
This section shows how z/OS administrators can use z/OS Communications Server's z/OS Encryption Readiness technology to determine which TCP and Enterprise Extender connections to and from their z/OS systems meet approved network encryption criteria.
Pervasive Encryption for IBM Linux on Z and LinuxONE
To simplify the journey to pervasive encryption on LinuxONE and Linux on Z, IBM has designed a consumable solution to enable extensive encryption of data in flight and at rest while reducing costs associated with protecting data. The IBM Secure Service Container for IBM Cloud Private is a software solution that hosts container-based applications for hybrid and private cloud workloads on IBM LinuxONE and Z servers, while providing automatic pervasive encryption of data in flight and at rest.
How Do You Know You Have All of the Information You Need?For each solution related to pervasive encryption for IBM Z, the “Technical Resources for Pervasive Encryption for IBM Z” section has the most up-to-date Knowledge Center publications, IBM Redbooks, pervasive encryption FAQs, Education WIKIs, Data Set Encryption Support, IBM Developer videos and more. The content solution is designed to provide a solutions-based approach to help you get started with pervasive encryption for IBM Z. Think of it as a one-stop-shop for clients responsible for implementing one or more of the solutions.
Where Do You Find the Latest Information?The content solution is updated when new information is created. Be sure to bookmark the page and come back frequently to see the latest updates and additions in the “What’s New” section. If you have questions or comments about the page, please let us know by clicking “Rate this Content.”
Finally, the “Coming Soon” section lists content that is in the works. Critical to any encryption strategy is key management! As you progress through your pervasive encryption journey, it is important to consider enhancements to your policies and procedures which include a robust key management strategy. The pervasive encryption Z content solution plans to add a key management section designed to provide you with the information you need. Stay tuned!
Pervasive encryption is a journey. If you’re ready to start implementing one or more of the pervasive encryption solutions, you can use the pervasive encryption IBM Z content solution to learn how to get started. A goldmine of information to help protect your enterprise data with pervasive encryption for IBM Z awaits!
Jacky Doll is a content designer for IBM Z.
Cecilia Carranza Lewis is a senior technical staff member for IBM Systems.
Sponsored ContentAchieve Compliance Without Impacting Productivity
Post a Comment
Note: Comments are moderated and will not appear until approvedcomments powered by Disqus