Getting Started with IBM Z Cyber Vault

A draft IBM Redbooks publication

Updated 27 August 2021

cover image

IBM Form #: SG24-8511-00

More options

Rate and comment

Authors: Bill White, Matthias Bangert, Cyril Armand, Roger Bales, Diego Bessone, Anthony Ciabattoni, Michael Frankenberg, Debra Hallen, DeWayne Hughes, Vinod Kanwal, Karen Smolar, Jean-Marc Vandon, Paolo Vitali, Knud Vraa


With cyberattacks on the raise, cyber resiliency is becoming more important than ever. Cyber resiliency can provide the required capability in the face of adversity, without significant impact if detected early. A cybersecurity strategy might minimize the risk of attacks getting through to systems, applications, and data, but a cyber resiliency strategy is needed to minimize the impact of a cyberattack by recovering quickly. Preparing for, responding to, and recovering from a cyberattack is not something that just happens, but rather must be thoroughly architected, planned for, and tested.
This IBM Redbooks publication looks at some common cyber threats and introduces a cyber resiliency solution called IBM Z Cyber Vault. It describes the technology and cyber resiliency capabilities of the solution at various hardware, software, and operational levels, and discusses what to consider when pursuing higher cyber resiliency goals.
Guidance and step-by-step examples for the deployment of IBM Z Cyber Vault are also included, as well as a suggested framework with advice for conducting basic data validation and samples that can be tailored to individual business needs, priorities, and IT configurations.
This publication is intended for IT managers, LOB managers, IT architects, system programmers, storage administrators, security administrators, database administrators, and system operations professionals.

Table of contents

Chapter 1. Protecting against key cyber threats
Chapter 2. Planning and designing the IBM Z Cyber Vault environment
Chapter 3. Deploying the IBM Z Cyber Vault environment
Chapter 4. Establishing a validation framework

These pages are Web versions of IBM Redbooks- and Redpapers-in-progress. They are published here for those who need the information now and may contain spelling, layout and grammatical errors. This material has not been submitted to any formal IBM test and is published AS IS. It has not been the subject of rigorous review. Your feedback is welcomed to improve the usefulness of the material to others.

Follow IBM Redbooks

Follow IBM Redbooks