Published on November 18, 2021, updated November 29, 2021
IBM Form #: SG24-8511-00
Authors: Bill White, Matthias Bangert, Cyril Armand, Roger Bales, Diego Bessone, Anthony Ciabattoni, Michael Frankenberg, Debra Hallen, DeWayne Hughes, Vinod Kanwal, Karen Smolar, Jean-Marc Vandon, Paolo Vitali and Knud Vraa
With cyberattacks on the raise, cyber resiliency is becoming more important than ever. Cyber resiliency can provide the required capability against cyberattacks and prevent significant impact if the attacks are detected early. A cybersecurity strategy might minimize the risk of attacks getting through to systems, applications, and data, but a cyber resiliency strategy is needed to minimize the impact of a cyberattack by recovering quickly. Preparing for, responding to, and recovering from a cyberattack is not something that just happens, but must be thoroughly designed, planned for, and tested.
This IBM® Redbooks® publication looks at some common cyberthreats and introduces a cyber resiliency solution that is called IBM Z® Cyber Vault. This book describes the technology and cyber resiliency capabilities of the solution at various hardware, software, and operational levels, and describes what to consider when pursuing higher cyber resiliency goals.
Guidance and step-by-step examples for the deployment of IBM Z Cyber Vault are also included, and a suggested framework with advice for conducting basic data validation and samples that can be tailored to individual business needs, priorities, and IT configurations.
This publication is intended for IT managers, line of business (LOB) managers, IT architects, system programmers, storage administrators, security administrators, database administrators (DBAs), and system operations professionals.
Chapter 1. Protecting against key cyberthreats
Chapter 2. Planning and designing the IBM Z Cyber Vault environment
Chapter 3. Deploying the IBM Z Cyber Vault environment
Chapter 4. Establishing a validation framework