Getting Started with z/OS Data Set Encryption

An IBM Redbooks publication

Published 05 June 2018, updated 27 September 2018

cover image

ISBN-10: 073845687x
ISBN-13: 9780738456874
IBM Form #: SG24-8410-00
(200 pages)

More options

Rate and comment

Authors: Bill White, Andy Coulson, Jacky Doll, Brad Habbershaw, Cecilia Carranza Lewis, Thomas Liu, Ryan McCarry, Eysha Shirrine Powers, Philippe Richard, Romoaldo Santos


This IBM® Redbooks® publication provides a broad explanation of data protection through encryption and IBM Z® pervasive encryption with a focus on IBM z/OS® data set encryption. It describes how the various hardware and software components interact in a z/OS data set encryption environment.

In addition, this book concentrates on the planning and preparing of the environment and offers implementation, configuration, and operational examples that can be used in z/OS data set encryption environments.

This publication is intended for IT architects, system programmer, and security administrators who plan for, deploy, and manage security on the Z platform. The reader is expected to have a basic understanding of IBM Z security concepts.

Table of contents

Chapter 1. Protecting data in today's IT environment
Chapter 2. Identifying components and release levels
Chapter 3. Planning for z/OS data set encryption
Chapter 4. Preparing for z/OS data set encryption
Chapter 5. Deploying z/OS data set encryption
Chapter 6. Auditing z/OS data set encryption
Chapter 7. Maintaining encrypted data sets
Chapter 8. Maintaining the ICSF environment
Chapter 9. Maintaining data set encryption keys
Appendix A. Troubleshooting

Follow IBM Redbooks

Follow IBM Redbooks