IBM DS8000 Safeguarded Copy (Updated for DS8000 R9.1)
A draft IBM Redpaper publication
Updated 21 January 2021

IBM Form #: REDP-5506-01
View online
Authors: Michael Frankenberg, Nick Clayton, Rick Pekosh, Mark Wells
Abstract
This IBM® Redpaper™ publication explains the IBM DS8000 Safeguarded Copy functionality.
With Safeguarded Copy, organizations have the ability to improve their cyber resiliency by frequently creating protected point-in-time backups of their critical data, with minimum impact and effective resource utilization.
The paper introduces Safeguarded Copy and discusses the need for logical corruption protection (LCP) and information about regulatory requirements. It presents the general concepts of LCP, and then explore various use cases for recovery.
The paper is intended for IT security architects, who plan and design an organization's cyber security strategy, as well as the infrastructure technical specialists who implement them.
This edition applies to DS8000 Release 9.1
Table of contents
Chapter 1. Safeguarded Copy introduction and concepts
Chapter 2. Safeguarded Copy planning and considerations
Chapter 3. Safeguarded Copy capacity sizing by using the CSM ESESizer functionality
Chapter 4. Safeguarded Copy implementation and management
Appendix A. Additional Topologies
These pages are Web versions of IBM Redbooks- and Redpapers-in-progress. They are published here for those who need the information now and may contain spelling, layout and grammatical errors. This material has not been submitted to any formal IBM test and is published AS IS. It has not been the subject of rigorous review. Your feedback is welcomed to improve the usefulness of the material to others.