Centrally Managing Access to Self-Encrypting Drives in Lenovo System x Servers Using IBM Security Key Lifecycle Manager

An IBM Redbooks publication

Published 16 March 2015

cover image

ISBN-10: 0738440493
ISBN-13: 9780738440491
IBM Form #: SG24-8247-00
(260 pages)

More options

Rate and comment

Authors: Ryan Bradley, Ryan Bradley, Angelo Parisi


Data security is one of the paramount requirements for organizations of all sizes. Although many companies invested heavily in protection from network-based attacks and other threats, few effective safeguards are available to protect against potentially costly exposures of proprietary data that results from a hard disk drive being stolen, misplaced, retired, or redeployed.

Self-encrypting drives (SEDs) can satisfy this need by providing the ultimate in security for data-at-rest and can help reduce IT drive retirement costs in the data center. Self-encrypting drives are also an excellent choice if you must comply with government or industry regulations for data privacy and encryption.

To effectively manage a large deployment of SEDs in Lenovo® System x® servers, an organization must rely on a centralized key management solution. This IBM Redbooks® publication explains the technology behind SEDs and demonstrates how to deploy a key management solution that uses IBM Security Key Lifecycle Manager and properly setup your System x servers.

Table of contents

Part 1. Technology and configuration
Chapter 1. Technology primer
Chapter 2. Supported systems and sample configuration
Part 2. Hands-on configuration
Chapter 3. IBM Security Key Lifecycle Manager setup
Chapter 4. Integrated Management Module configuration
Chapter 5. UEFI configuration
Chapter 6. Managing your System x server SED deployment
Appendix A. Local key management alternatives
Appendix B. Troubleshooting
Appendix C. Licenses and software

Follow IBM Redbooks

Follow IBM Redbooks