Seminare
Seminare

IBM ESS10G - Pervasive Encryption on z/OS

Webinar - Cegos Integrata GmbH

Overview

Organizations are compelled to find effective and cost-efficient data security solutions.

Encryption is one of the technologies that enables organizations to reduce the cost, impact and even likelihood of a breach. Encrypting data can help companies meet the stringent mandates of the GDPR, HIPAA and other mandates.

IBM z15 has been designed for pervasive encryption, enabling organizations to encrypt 100% of an organization’s IBM Z critical business data in-flight and at-rest, with no application changes and no impact to SLAs. Encrypting only the data required to meet compliance mandates should be considered a minimum threshold, not a best practice. IBM z15 makes pervasive encryption the new standard in data protection and the foundation of a larger data security and protection strategy.

z/OS is designed to provide new policy-based encryption options that take full advantage of the improvements in the z15 platform. These new capabilities include:

Data set encryption, which is one aspect of pervasive encryption, provides enhanced data protection for many z/OS data sets gives users the ability to encrypt data without needing to make changes to applications to embed encryption APIs within applications.

New z/OS policy controls which make it possible to use pervasive encryption to protect user data and simplify the task of compliance for many z/OS data sets, zFS file systems, and Coupling Facility structures....

Termin Ort Preis*
25.11.2024- 27.11.2024 online 2.856,00 €
*Alle Preise verstehen sich inkl. MwSt.

Detaillierte Informationen zum Seminar

Inhalte:

Course Outline

  • Describe the components of Pervasive Encryption on z/OS

  • Explain the role of encryption for data protection

2

  • Implement hardware crypto on your z System

  • Load and activate AES Master Keys

  • Implement and start ICSF

  • Understand the differences between secure keys clear keys and protected keys

  • Describe how are key values used for encryption and decryption

  • Generate, maintain and manage Keys

  • Setup access to key labels

  • Setup policy to supply key label (RACF SMS JCL)

  • Access data in encrypted data sets

  • Create encrypted data sets - Supplying key labels

  • Convert existing data sets to encryption

  • Verify encryption status

  • Encrypt Data in Transit

  • Encrypt Data at Rest

  • Manage data sets, data keys, and key labels

Objective

After completing this course, you should be able to:

  • Describe the components of Pervasive Encryption on z/OS

  • Explain the role of encryption for data protection

2

  • Implement hardware crypto on your z System

  • Load and activate AES Master Keys

  • Implement and start ICSF

  • Understand the differences between secure keys clear keys and protected keys

  • Describe how are key values used for encryption and decryption

  • Generate, maintain and manage Keys

  • Setup access to key labels

  • Setup policy to supply key label (RACF SMS JCL)

  • Access data in encrypted data sets

  • Create encrypted data sets - Supplying key labels

  • Convert existing data sets to encryption

  • Verify encryption status

  • Encrypt Data in Transit

  • Encrypt Data at Rest

  • Manage data sets, data keys, and key labels

Dauer/zeitlicher Ablauf:
3 Tage
Teilnahmevoraussetzungen:

Prerequisites

  • General z/OS knowledge, including basic UNIX System Services skills

  • Basic knowledge of RACF

  • Curriculum relationship

    o [ES66G]

Lehrgangsverlauf/Methoden:
presentation, discussion, hands-on exercises
Zielgruppe:

Audience

This class is intended for z/OS system programmers and security specialists in charge of designing, implementing and monitoring Pervasive Encryption on z/OS.

Seminarkennung:
30146
Nach unten
Nach oben
Wir setzen Analyse-Cookies ein, um Ihre Zufriedenheit bei der Nutzung unserer Webseite zu verbessern. Diese Cookies werden nicht automatisiert gesetzt. Wenn Sie mit dem Einsatz dieser Cookies einverstanden sind, klicken Sie bitte auf Akzeptieren. Weitere Informationen finden Sie hier.
Akzeptieren Nicht akzeptieren









Um Spam abzuwehren, geben Sie bitte die Buchstaben auf dem Bild in das Textfeld ein:

captcha



Bei der Verarbeitung Ihrer personenbezogenen Daten im Zusammenhang mit der Kontaktfunktion beachten wir die gesetzlichen Bestimmungen. Unsere ausführlichen Datenschutzinformationen finden Sie hier. Bei der Kontakt-Funktion erhobene Daten werden nur an den jeweiligen Anbieter weitergeleitet und sind nötig, damit der Anbieter auf Ihr Anliegen reagieren kann.







Um Spam abzuwehren, geben Sie bitte die Buchstaben auf dem Bild in das Textfeld ein:

captcha