Getting Started with Linux on Z Encryption for Data At-Rest

An IBM Redbooks publication

thumbnail 

Published on April 04, 2019, updated April 08, 2019

  1. .EPUB (0.9 MB)
  2. .PDF (2.7 MB)

Apple BooksGoogle Play Books
Share this page:   

ISBN-10: 0738457469
ISBN-13: 9780738457468
IBM Form #: SG24-8436-00


Authors: Bill White, Megan Hampton, Benedikt Klotz, Guilherme Nogueira, Pat Oughton and Carlos Henrique Reimer

    menu icon

    Abstract

    This IBM® Redbooks® publication provides a general explanation of data protection through encryption and IBM Z® pervasive encryption with a focus on Linux on IBM Z encryption for data at-rest. It also describes how the various hardware and software components interact in a Linux on Z encryption environment for .

    In addition, this book concentrates on the planning and preparing of the environment. It offers implementation, configuration, and operational examples that can be used in Linux on Z volume encryption environments.

    This publication is intended for IT architects, system administrators, and security administrators who plan for, deploy, and manage security on the Z platform. The reader is expected to have a basic understanding of IBM Z security concepts.

    Table of Contents

    Chapter 1. Protecting sensitive data

    Chapter 2. Identifying components and release levels

    Chapter 3. Planning for Linux on Z data at-rest encryption

    Chapter 4. Preparing for Linux on Z data at-rest encryption

    Chapter 5. Deploying encrypted volumes for data at-rest

    Chapter 6. Auditing and monitoring the data at-rest environment

    Chapter 7. Maintaining encrypted volumes for data at-rest

    Chapter 8. Performing key management for data at-rest encryption

    Appendix A. Using protected keys for high-speed encryption

     

    Others who read this also read