SlideShare ist ein Scribd-Unternehmen logo
1 von 1036
Downloaden Sie, um offline zu lesen
Front cover


IBM System Storage
Data Encryption
Understand the encryption concepts
and terminology

Compare various IBM storage
encryption methods

Plan for Tivoli Key Lifecycle
Manager and its keystores




                                                       Alex Osuna
                                                   David Crowther
                                                   Reimar Pflieger
                                                        Esha Seth
                                                      Ferenc Toth




ibm.com/redbooks
International Technical Support Organization

IBM System Storage Data Encryption

June 2010




                                               SG24-7797-00
Note: Before using this information and the product it supports, read the information in “Notices” on
 page xvii.




First Edition (June 2010)

This edition applies to Tivoli Key Lifecycle Manager Version 1 and later and the Encryption Key Manager
Release 1 and later.




© Copyright International Business Machines Corporation 2010. All rights reserved.
Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule
Contract with IBM Corp.
Contents

                     Notices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvii
                     Trademarks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xviii

                     Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xix
                     The team who wrote this book . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xix
                     Now you can become a published author, too! . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xx
                     Comments welcome. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxi
                     Stay connected to IBM Redbooks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxi

Part 1. Introduction to data encryption. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1

                     Chapter 1. Encryption concepts and terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
                     1.1 Concepts of storage data encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
                        1.1.1 Symmetric key encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
                        1.1.2 Asymmetric key encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
                        1.1.3 Hybrid encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
                        1.1.4 Digital certificates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
                     1.2 IBM Key Management methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
                     1.3 Tivoli Key Lifecycle Manager and Encryption Key Manager . . . . . . . . . . . . . . . . . . . . . 16
                        1.3.1 IBM Encryption Key Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
                        1.3.2 Encryption Key Manager components and resources . . . . . . . . . . . . . . . . . . . . . 19
                        1.3.3 Encryption keys. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
                        1.3.4 Tivoli Key Lifecycle Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
                        1.3.5 Tivoli Key Lifecycle Manager components and resources . . . . . . . . . . . . . . . . . . 22

                     Chapter 2. Introduction to storage data encryption. . . . . . . . . . . . . . . . . . . . . . . . . . . .                               27
                     2.1 IBM tape drive encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .             28
                     2.2 IBM System Storage DS5000 series with encryption support. . . . . . . . . . . . . . . . . . . .                                     29
                     2.3 DS8000 series with encryption support. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                      31
                        2.3.1 Encryption updates in DS8000 R5.0 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                        33
                     2.4 Storage data encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .             34
                        2.4.1 Encryption of data on IBM tape drives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                        34
                        2.4.2 Encryption of data in IBM System Storage DS5000 Series . . . . . . . . . . . . . . . . .                                       35
                        2.4.3 Encryption of data in IBM System Storage DS8000 Series . . . . . . . . . . . . . . . . .                                       37
                     2.5 Encryption data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .       41
                        2.5.1 IBM tape drive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .         41
                        2.5.2 IBM Storage Series DS5000 and DS8000 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                               43
                     2.6 Using data encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .           44
                        2.6.1 Encrypting data in the tape drive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                    44
                        2.6.2 Encrypting data on disk drives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                   45
                        2.6.3 Fundamentals to encryption: Policy and key management. . . . . . . . . . . . . . . . . .                                       46

                     Chapter 3. IBM storage encryption methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                             49
                     3.1 Tivoli Key Lifecycle Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                50
                        3.1.1 Tivoli Key Lifecycle Manager components and resources . . . . . . . . . . . . . . . . . .                                      51
                        3.1.2 Key exchange . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .           53
                     3.2 IBM Encryption Key Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                  54
                        3.2.1 Encryption Key Manager components and resources . . . . . . . . . . . . . . . . . . . . .                                      56
                     3.3 TS1120, TS1130, and LTO4 tape drive encryption. . . . . . . . . . . . . . . . . . . . . . . . . . . .                               58


© Copyright IBM Corp. 2010. All rights reserved.                                                                                                              iii
3.3.1 Key exchange . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .     59
                     3.4 DS8000 disk encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .        60
                        3.4.1 Encryption key management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                62
                        3.4.2 Encryption deadlock . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .        67
                        3.4.3 Encryption recovery key support. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .               68
                        3.4.4 Dual platform key server support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .               70
                     3.5 Comparing tape encryption methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                 73
                        3.5.1 System-Managed Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                74
                        3.5.2 Library-Managed Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .             77
                        3.5.3 Encrypting and decrypting with SME and LME . . . . . . . . . . . . . . . . . . . . . . . . . . .                         79
                        3.5.4 Application-Managed Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                 81
                        3.5.5 Mixed mode example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .           84

                     Chapter 4. IBM System Storage tape automation for encryption . . . . . . . . . . . . . . . . . 87
                     4.1 IBM System Storage TS1130 and TS1120 tape drive . . . . . . . . . . . . . . . . . . . . . . . . . 88
                        4.1.1 Tape data encryption support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
                        4.1.2 TS1120 characteristics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
                        4.1.3 TS1130 characteristics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
                        4.1.4 3592 cartridges and media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
                     4.2 IBM System Storage TS1120 Tape Controller . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
                        4.2.1 IBM TS1120 Tape Controller characteristics . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
                        4.2.2 IBM TS1120 Tape Controller encryption support . . . . . . . . . . . . . . . . . . . . . . . . . 97
                        4.2.3 Installation with an IBM TS3500 Tape Library . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
                        4.2.4 Installation with an IBM TS3400 Tape Library . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
                        4.2.5 Installation with an IBM 3494 Tape Library . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
                        4.2.6 IBM TotalStorage 3592 Model J70 Tape Controller . . . . . . . . . . . . . . . . . . . . . . 101
                     4.3 IBM Virtualization Engine TS7700 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102
                     4.4 IBM LTO Ultrium tape drives and libraries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
                        4.4.1 Linear Tape-Open overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
                        4.4.2 LTO media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106
                        4.4.3 IBM System Storage TS2240 Tape Drive Express Model . . . . . . . . . . . . . . . . . 108
                        4.4.4 IBM System Storage TS2340 Tape Drive Express Model . . . . . . . . . . . . . . . . . 109
                        4.4.5 IBM System Storage TS1040 Tape Drive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110
                        4.4.6 IBM System Storage TS2900 Tape Autoloader . . . . . . . . . . . . . . . . . . . . . . . . . 111
                        4.4.7 IBM System Storage TS3100 Tape Library . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
                        4.4.8 IBM System Storage TS3200 Tape Library . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113
                        4.4.9 IBM System Storage TS3310 Tape Library . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115
                     4.5 IBM System Storage TS3400 Tape Library . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
                     4.6 IBM System Storage TS3500 Tape Library . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120
                        4.6.1 TS3500 frames . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
                        4.6.2 TS3500 characteristics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124
                     4.7 IBM TotalStorage 3494 Tape Library . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131

                     Chapter 5. Full Disk Encryption technology in disk subsystems. . . . . . . . . . . . . . . .                                      133
                     5.1 FDE fundamentals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .        134
                     5.2 Hardware implementation details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .               135
                     5.3 FDE disks in storage products . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .             136

Part 2. IBM System Storage DS5000 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139

                     Chapter 6. Understanding Full Disk Encryption in DS5000 . . . . . . . . . . . . . . . . . . . .                                   141
                     6.1 FDE disk drives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   142
                        6.1.1 Securing data against a breach . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                 142
                     6.2 Creating a security key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .       143


iv     IBM System Storage Data Encryption
6.3   Changing a security key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .          144
6.4   Security key identifier . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .      144
6.5   Unlocking secure drives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .          148
6.6   Secure erase . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   149
6.7   FDE security authorizations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .            149
6.8   FDE key terms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .      151

Chapter 7. Configuring encryption on DS5000 with Full Disk Encryption drives . . .                                                   153
7.1 The need for encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .            154
   7.1.1 Encryption method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .             154
7.2 Disk Security components. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .              156
   7.2.1 DS5000 Disk Encryption Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                        156
   7.2.2 Full Data Encryption disks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .               157
   7.2.3 Premium feature license . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .               157
   7.2.4 Keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .    157
   7.2.5 Security key identifier . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .           157
   7.2.6 Passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .         158
7.3 Setting up and enabling the Secure Disk feature . . . . . . . . . . . . . . . . . . . . . . . . . . . .                          159
   7.3.1 FDE and the premium feature key check . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                           159
   7.3.2 Secure key creation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .             160
   7.3.3 Enable disk security on the array . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                   162
7.4 Additional secure disk functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .               163
   7.4.1 Changing the security key. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                164
   7.4.2 Saving the security key file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .              165
   7.4.3 Secure disk erase . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .           166
   7.4.4 FDE drive status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .          167
   7.4.5 Hot-spare drive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .         167
   7.4.6 Log files. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .    168
7.5 Migrating secure disk arrays . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .             168
   7.5.1 Planning checklist . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .          169
   7.5.2 Export the array . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .          169
7.6 Import secure drive array . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .            172
   7.6.1 Unlock drives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .         173
   7.6.2 Import array. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .       174

Chapter 8. DS5000 Full Disk Encryption best practices . . . . . . . . . . . . . . . . . . . . . . .                                  177
8.1 Physical asset protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .            178
8.2 Data backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .      179
8.3 FDE drive security key and the security key file . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                       179
8.4 DS subsystem controller shell remote login . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                       181
8.5 Working with Full Disk Encryption drives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                     181
8.6 Replacing controllers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .         182
8.7 Storage industry standards and practices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                     182

Chapter 9. Frequently asked questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                        183
9.1 Securing arrays . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .      184
9.2 Secure erase . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .     184
9.3 Security keys and passphrases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                  185
9.4 Premium features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .         185
9.5 Global hot-spare drives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .          186
9.6 Boot support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .     186
9.7 Locked and unlocked states . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .               187
9.8 Backup and recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .            187
9.9 Additional questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .         187

                                                                                                                      Contents         v
Part 3. Implementing tape data encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189

                    Chapter 10. Planning for software and hardware to support tape drives . . . . . . . . .                                        191
                    10.1 Encryption planning. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .    192
                    10.2 Planning assumptions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .      192
                    10.3 Encryption planning quick-reference tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                  193
                    10.4 Choosing encryption methods. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .            196
                       10.4.1 Encryption method comparison. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                197
                       10.4.2 System z encryption methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .              197
                       10.4.3 Open systems encryption methods. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                   198
                       10.4.4 Decision time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .    199
                    10.5 Solutions available by operating system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .               199
                       10.5.1 The z/OS solution components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .               199
                       10.5.2 z/VM, z/VSE, and z/TPF solution components for TS1120 drives . . . . . . . . . .                                     202
                       10.5.3 IBM System i encryption solution components . . . . . . . . . . . . . . . . . . . . . . . . .                        204
                       10.5.4 AIX solution components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .            206
                       10.5.5 Linux on System z. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .       209
                       10.5.6 Linux on System p, System x, and other Intel or AMD Opteron servers. . . . . .                                       210
                       10.5.7 HP-UX, Sun, and Microsoft Windows components. . . . . . . . . . . . . . . . . . . . . .                              213
                       10.5.8 Tivoli Storage Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .         216
                    10.6 Ordering information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .    216
                       10.6.1 TS1120 tape drive prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .              216
                       10.6.2 Tape controller prerequisites. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .           218
                       10.6.3 LTO4 and LTO5 tape drive prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                     219
                       10.6.4 Tape library prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .         220
                       10.6.5 Other library and rack open systems installations. . . . . . . . . . . . . . . . . . . . . . .                       222
                       10.6.6 TS7700 Virtualization Engine prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . .                     222
                       10.6.7 General software prerequisites for encryption . . . . . . . . . . . . . . . . . . . . . . . . .                      223
                       10.6.8 TS1120 and TS1130 supported platforms . . . . . . . . . . . . . . . . . . . . . . . . . . . .                        224
                       10.6.9 IBM LTO4 and LTO5 tape drive supported platforms . . . . . . . . . . . . . . . . . . . .                             225
                    10.7 Other planning considerations for tape data encryption . . . . . . . . . . . . . . . . . . . . . .                        226
                       10.7.1 In-band and out-of-band . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .          226
                       10.7.2 Performance considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .             227
                       10.7.3 Encryption with other backup applications . . . . . . . . . . . . . . . . . . . . . . . . . . . .                    227
                       10.7.4 ALMS and encryption in the TS3500 library . . . . . . . . . . . . . . . . . . . . . . . . . . .                      228
                       10.7.5 TS1120 and TS1130 rekeying considerations . . . . . . . . . . . . . . . . . . . . . . . . .                          229
                    10.8 Upgrade and migration considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                230
                       10.8.1 Potential issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   230
                       10.8.2 TS1120 and TS1130 compatibility considerations . . . . . . . . . . . . . . . . . . . . . .                           231
                       10.8.3 DFSMSdss host-based encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                   235
                       10.8.4 Positioning TS1120 Tape Encryption and Encryption Facility for z/OS . . . . . .                                      236

                    Chapter 11. Planning for Tivoli Key Lifecycle Manager and its keystores. . . . . . . . .                                       237
                    11.1 Tivoli Key Lifecycle Manager planning quick reference . . . . . . . . . . . . . . . . . . . . . .                         238
                    11.2 Tivoli Key Lifecycle Manager and keystore considerations. . . . . . . . . . . . . . . . . . . .                           241
                       11.2.1 Tivoli Key Lifecycle Manager configuration planning checklist . . . . . . . . . . . . .                              244
                    11.3 Working with keys and certificates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .            245
                       11.3.1 IT Service Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .            245
                       11.3.2 General security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .     246
                       11.3.3 Tivoli Key Lifecycle Manager key server availability . . . . . . . . . . . . . . . . . . . . .                       246
                       11.3.4 Encryption deadlock prevention for DS8000. . . . . . . . . . . . . . . . . . . . . . . . . . .                       247
                       11.3.5 Tivoli Key Lifecycle Manager key server. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                   247
                       11.3.6 DS8000 and tape devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .            248


vi     IBM System Storage Data Encryption
11.4 Multiple Tivoli Key Lifecycle Managers for redundancy . . . . . . . . . . . . . . . . . . . . . . 249
   11.4.1 Setting up primary and secondary Tivoli Key Lifecycle Manager servers. . . . . 250
   11.4.2 Synchronizing primary and secondary Tivoli Key Lifecycle Manager servers . 250
11.5 Backup and restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 251
   11.5.1 Categories of data in a backup file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 251
   11.5.2 Backup file security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 252
   11.5.3 IBM Tivoli Storage Manager as a backup repository . . . . . . . . . . . . . . . . . . . . 252
   11.5.4 Backup and restore runtime requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . 252
   11.5.5 Backing up critical files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 253
   11.5.6 Restoring a backup file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 254
   11.5.7 Deleting a backup file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256
11.6 Key exporting and importing tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256
   11.6.1 Exporting keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256
   11.6.2 Importing keys. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257
   11.6.3 Importing the public key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 258
   11.6.4 Exporting the public key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 258
11.7 Integration and EKM to Tivoli Key Lifecycle Manager migration . . . . . . . . . . . . . . . . 259
   11.7.1 Integrating Tivoli Key Lifecycle Manager for DS8000 with an existing EKM tape
         encryption installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 259
   11.7.2 Migrating from EKM to Tivoli Key Lifecycle Manager . . . . . . . . . . . . . . . . . . . . 259
   11.7.3 Multiple encrypted disk or tape devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 260
11.8 Data exchange with business partners . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261
11.9 Disaster recovery considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 262
11.10 Database selection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263

Chapter 12. Implementing Tivoli Key Lifecycle Manager . . . . . . . . . . . . . . . . . . . . . . 265
12.1 Implementation notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 266
12.2 Installing Tivoli Key Lifecycle Manager on 64-bit Windows Server 2008 . . . . . . . . . 266
12.3 Installing Tivoli Key Lifecycle Manager on 64-bit Red Hat Enterprise Linux AS Version
    5.3 server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 299
12.4 Installing Tivoli Key Lifecycle Manager on z/OS . . . . . . . . . . . . . . . . . . . . . . . . . . . . 329
12.5 Configuring Tivoli Key Lifecycle Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 335
   12.5.1 Configuration forLTO4 and TS1100 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 339
   12.5.2 Configuration for DS8000 disk drives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 348
12.6 Conclusions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 351

Chapter 13. Tivoli Key Lifecycle Manager operational considerations . . . . . . . . . . .                                       353
13.1 Scripting with Tivoli Key Lifecycle Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                  354
   13.1.1 Simple Linux backup script example. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                   354
13.2 Synchronizing primary Tivoli Key Lifecycle Manager configuration data . . . . . . . . .                                    355
   13.2.1 Setting up primary and secondary Tivoli Key Lifecycle Manager servers. . . . .                                        355
   13.2.2 Synchronizing primary and secondary Tivoli Key Lifecycle Manager servers .                                            356
13.3 Tivoli Key Lifecycle Manager maintenance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                   357
   13.3.1 General disk and tape management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                    357
   13.3.2 Adding and removing drives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .              359
   13.3.3 Scheduling key group rollover for LTO tape drives . . . . . . . . . . . . . . . . . . . . . .                         364
   13.3.4 Scheduling certificate rollover for 3592 tape . . . . . . . . . . . . . . . . . . . . . . . . . . .                   368
13.4 Tivoli Key Lifecycle Manager backup and restore procedures . . . . . . . . . . . . . . . . .                               371
   13.4.1 Using the GUI to back up . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .            372
   13.4.2 Restore by using the GUI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .            373
   13.4.3 Backing up by using the command line. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                     376
   13.4.4 Restore by using the command line . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                   377
13.5 Data sharing with business partners . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .              378


                                                                                                                 Contents         vii
13.5.1 Sharing TS1100 certificate data with a business partner . . . . . . . . . . . . . . . . .                            379
                  13.5.2 Sharing LTO key data with a business partner . . . . . . . . . . . . . . . . . . . . . . . . .                       381
               13.6 Removing Tivoli Key Lifecycle Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                 384
                  13.6.1 Backing up the keystore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .          385
               13.7 Fixing the security warnings in your web browser. . . . . . . . . . . . . . . . . . . . . . . . . . .                     385
                  13.7.1 Fixing the security warning in Internet Explorer browser . . . . . . . . . . . . . . . . .                           385
                  13.7.2 Fixing the security warning in Firefox 2. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                386
               13.8 The Tivoli Key Lifecycle Manager command-line interface . . . . . . . . . . . . . . . . . . . .                           386
                  13.8.1 Commands using wsadmin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .               386
                  13.8.2 Tivoli Key Lifecycle Manager commands using wsadmin . . . . . . . . . . . . . . . . .                                387
                  13.8.3 Setting a larger timeout interval for command processing . . . . . . . . . . . . . . . .                             388
                  13.8.4 Syntax examples. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .       388
                  13.8.5 Continuation character . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .         388
                  13.8.6 Parameter error messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .             389
                  13.8.7 Command summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .            389

               Chapter 14. Planning for Encryption Key Manager and its keystores . . . . . . . . . . . .                                      393
               14.1 EKM planning quick-reference . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .            394
               14.2 Ordering information and requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                 396
                  14.2.1 EKM on z/OS or z/OS.e requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                     396
                  14.2.2 EKM on z/VM, z/VSE, and z/TPF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                  397
                  14.2.3 EKM on IBM System i requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                   397
                  14.2.4 EKM on AIX requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .              398
                  14.2.5 EKM on Linux requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .              399
                  14.2.6 EKM on Hewlett-Packard, Sun, and Windows requirements . . . . . . . . . . . . . .                                    399
               14.3 EKM and keystore considerations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .              400
                  14.3.1 EKM configuration planning checklist . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                 402
                  14.3.2 Best security practices for working with keys and certificates. . . . . . . . . . . . . .                            403
                  14.3.3 Acting on the advice . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .       403
                  14.3.4 Typical EKM implementations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .               404
                  14.3.5 Multiple EKMs for redundancy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .               407
                  14.3.6 Using Virtual IP Addressing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .            408
                  14.3.7 Key manager backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .           409
                  14.3.8 FIPS 140-2 certification. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .        409
               14.4 Other EKM considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .          410
                  14.4.1 EKM Release 1 to EKM Release 2 migration . . . . . . . . . . . . . . . . . . . . . . . . . .                         410
                  14.4.2 Data exchange with business partners or other platforms . . . . . . . . . . . . . . . .                              410
                  14.4.3 Disaster recovery considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .               411
                  14.4.4 i5/OS disaster recovery considerations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                  411
                  14.4.5 EKM performance considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                 411

               Chapter 15. Implementing the Encryption Key Manager. . . . . . . . . . . . . . . . . . . . . . .                               413
               15.1 Implementing EKM in z/OS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .          414
                  15.1.1 z/OS UNIX System Services. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .               414
                  15.1.2 Installing EKM in z/OS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .         415
                  15.1.3 Security products involved: RACF, Top Secret, and ACF2. . . . . . . . . . . . . . . .                                417
                  15.1.4 Create a JCE4758RACFKS for EKM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                       418
                  15.1.5 Setting up the EKM environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                 420
                  15.1.6 Starting EKM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   423
                  15.1.7 Additional definitions of hardware keystores for z/OS. . . . . . . . . . . . . . . . . . . .                         428
                  15.1.8 Virtual IP Addressing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .        429
                  15.1.9 EKM TCP/IP configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .             430
               15.2 Installing EKM on AIX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .     431


viii   IBM System Storage Data Encryption
15.2.1 Install the IBM Software Developer Kit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 431
15.3 Installing EKM on a Microsoft Windows platform . . . . . . . . . . . . . . . . . . . . . . . . . . . 436
   15.3.1 EKM setup tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 437
   15.3.2 Installing the IBM Software Developer Kit on Microsoft Windows. . . . . . . . . . . 438
   15.3.3 Starting EKM on Microsoft Windows. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 443
   15.3.4 Configuring and starting EKM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 444
15.4 Installing EKM in i5/OS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 450
   15.4.1 New installation of the Encryption Key Manager. . . . . . . . . . . . . . . . . . . . . . . . 450
   15.4.2 Upgrading the Encryption Key Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 453
   15.4.3 Configuring EKM for tape data encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . 455
15.5 Implementing LTO4 and LTO5 encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 458
   15.5.1 LTO4 EKM implementation checklist . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 459
   15.5.2 Download the latest EKM software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 459
   15.5.3 Create a JCEKS keystore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 463
   15.5.4 Off-site or business partner exchange with LTO4 compared to 3592. . . . . . . . 466
   15.5.5 EKM Version 2 installation and customization on Microsoft Windows . . . . . . . 467
   15.5.6 Starting EKM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 469
   15.5.7 Starting EKM as a Microsoft Windows Service . . . . . . . . . . . . . . . . . . . . . . . . . 470
15.6 Implementing LTO4 and LTO5 Library-Managed Encryption . . . . . . . . . . . . . . . . . . 472
   15.6.1 Barcode Encryption Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 472
   15.6.2 Specifying a Barcode Encryption Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 475
   15.6.3 TS3500 Library-Managed Encryption differences from TS3310, TS3200, TS3100,
         and TS2900 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 479
15.7 LTO4 or LTO5 System-Managed Encryption implementation. . . . . . . . . . . . . . . . . . 480
   15.7.1 LTO4 SME implementation checklist for Windows . . . . . . . . . . . . . . . . . . . . . . 480

Chapter 16. Planning and managing your keys with Encryption Key Manager . . . .                                                     481
16.1 Keystore and SAF Digital Certificates (keyrings) . . . . . . . . . . . . . . . . . . . . . . . . . . .                         482
16.2 JCEKS. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   482
   16.2.1 Examples of managing public-private key pairs . . . . . . . . . . . . . . . . . . . . . . . .                             483
   16.2.2 Managing symmetric keys in a JCEKS keystore. . . . . . . . . . . . . . . . . . . . . . . .                                486
   16.2.3 Example using iKeyman . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                 490
16.3 JCE4758KS and JCECCAKS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                     497
   16.3.1 Script notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .      497
   16.3.2 Symmetric keys in a JCECCAKS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                        499
16.4 JCERACFKS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .        500
16.5 JCE4758RACFKS and JCECCARACFKS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                                 502
   16.5.1 RACDCERT keywords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                   503
   16.5.2 Best practice . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .       505
16.6 PKCS#11 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .      506
16.7 IBMi5OSKeyStore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .          506
   16.7.1 Digital Certificate Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .               507
   16.7.2 Setting up an IBMi5OSKeyStore. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                      507
16.8 ShowPrivateTool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .        522
16.9 MatchKeys tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .       524
16.10 Hardware cryptography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .             527

Chapter 17. Encryption Key Manager operational considerations. . . . . . . . . . . . . . .                                          531
17.1 EKM commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .           532
   17.1.1 The EKM sync command and EKM properties file . . . . . . . . . . . . . . . . . . . . . .                                  532
   17.1.2 EKM command-line interface and command set . . . . . . . . . . . . . . . . . . . . . . .                                  533
17.2 Backup procedures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .          538
   17.2.1 EKM file system backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                538


                                                                                                                    Contents         ix
17.2.2 Identifying DFSMShsm to z/OS UNIX System Services . . . . . . . . . . . . . . . . . .                                  540
                 17.2.3 Keystore backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .        540
                 17.2.4 RACF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   541
              17.3 ICSF disaster recovery procedures. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                542
                 17.3.1 Key recovery checklist . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .           542
                 17.3.2 Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .    543
                 17.3.3 Pre-key change: All LPARs in the sysplex . . . . . . . . . . . . . . . . . . . . . . . . . . . .                       543
                 17.3.4 Check the ICSF installation options data . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                     546
                 17.3.5 Disable all services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .       547
                 17.3.6 Entering master keys for all LPARs in the sysplex . . . . . . . . . . . . . . . . . . . . . .                          548
                 17.3.7 Post-key change for all LPARs in the sysplex. . . . . . . . . . . . . . . . . . . . . . . . . .                        553
                 17.3.8 Exiting disaster recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .          554
              17.4 Business partner tape-sharing example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                   554
                 17.4.1 Key-sharing steps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .        554
                 17.4.2 Exporting a public key and certificate to a business partner . . . . . . . . . . . . . . .                             555
                 17.4.3 Exporting a symmetric key from a JCEKS keystore . . . . . . . . . . . . . . . . . . . . .                              559
                 17.4.4 Importing a public key and a certificate from a business partner . . . . . . . . . . .                                 559
                 17.4.5 Tape exchange and verification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                 561
                 17.4.6 Importing symmetric keys to a JCEKS keystore . . . . . . . . . . . . . . . . . . . . . . . .                           563
              17.5 RACF export tool for z/OS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .           563
              17.6 Audit log considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .        564
                 17.6.1 Audit overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .      565
                 17.6.2 Audit log parsing tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .         565

              Chapter 18. Implementing TS1100 series encryption in System z . . . . . . . . . . . . . . .                                      571
              18.1 Implementation overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .           572
              18.2 Implementation prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .            572
                 18.2.1 Implementing the initial tape library hardware. . . . . . . . . . . . . . . . . . . . . . . . . .                      573
                 18.2.2 Initial z/OS software definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .            574
              18.3 EKM implementation overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .               575
              18.4 Implementing the tape library . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .           576
                 18.4.1 Implementation steps for the IBM TS3500 Tape Library. . . . . . . . . . . . . . . . . .                                576
                 18.4.2 Implementation steps for the IBM 3494 Tape Library . . . . . . . . . . . . . . . . . . . .                             579
                 18.4.3 Implementation steps for the IBM TS3400 Tape Library. . . . . . . . . . . . . . . . . .                                583
              18.5 Implementing the tape control unit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .              585
              18.6 z/OS implementation steps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .           585
                 18.6.1 z/OS software maintenance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                586
                 18.6.2 Update PARMLIB member IECIOSxx. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                          586
                 18.6.3 Define or update Data Class definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                    587
                 18.6.4 Considerations for JES3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .            591
                 18.6.5 Tape management system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                 592
                 18.6.6 DFSMSrmm support for tape data encryption. . . . . . . . . . . . . . . . . . . . . . . . . .                           592
                 18.6.7 DFSMSdfp access method service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                     596
                 18.6.8 Data Facility Data Set Services considerations . . . . . . . . . . . . . . . . . . . . . . . .                         597
                 18.6.9 DFSMS Hierarchal Storage Manager considerations . . . . . . . . . . . . . . . . . . . .                                598
              18.7 z/VM implementation steps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .           599
                 18.7.1 Tape library and tape control unit implementation . . . . . . . . . . . . . . . . . . . . . .                          600
                 18.7.2 Out-of-band encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .           600
                 18.7.3 Defining key aliases to z/VM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .             604
                 18.7.4 Using ATTACH and DETACH to control encryption . . . . . . . . . . . . . . . . . . . . .                                605
                 18.7.5 Using SET RDEVICE to control encryption. . . . . . . . . . . . . . . . . . . . . . . . . . . .                         606
                 18.7.6 QUERY responses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .            606
                 18.7.7 z/VM DASD Dump Restore (DDR) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                       607


x   IBM System Storage Data Encryption
18.8 Miscellaneous implementation considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                         607
   18.8.1 Data exchange with other data centers or business partners . . . . . . . . . . . . . .                                   607
   18.8.2 Availability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   608
18.9 TS1120 and TS1130 tape cartridge rekeying in z/OS. . . . . . . . . . . . . . . . . . . . . . . .                              608
   18.9.1 TS1120 Model E05 rekeying support in z/OS . . . . . . . . . . . . . . . . . . . . . . . . . .                            608
   18.9.2 IEHINITT enhancements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                  609
   18.9.3 Security considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .            612
   18.9.4 Packaging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .      612
   18.9.5 Rekeying exits and messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                    612

Chapter 19. Implementing TS7700 tape encryption . . . . . . . . . . . . . . . . . . . . . . . . . . .                              613
19.1 TS7700 encryption overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .              614
19.2 Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   615
   19.2.1 Tape drives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .      615
   19.2.2 TS7700 Virtualization Engine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                 615
   19.2.3 Library Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .          615
   19.2.4 Encryption Key Manager. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                615
19.3 Implementation overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .             616
   19.3.1 Implementing the initial tape library hardware. . . . . . . . . . . . . . . . . . . . . . . . . .                        616
   19.3.2 Implementing the initial TS7700 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                  616
   19.3.3 Initial z/OS software definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .              617
   19.3.4 EKM implementation overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                    617
19.4 Tape library implementation and setup for encryption . . . . . . . . . . . . . . . . . . . . . . .                            617
   19.4.1 Enabling drives for encryption in the IBM TS3500 Tape Library. . . . . . . . . . . .                                     618
   19.4.2 Enabling drives for encryption in the IBM 3494 Tape Library . . . . . . . . . . . . . .                                  620
   19.4.3 Encryption-enabled drives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                623
19.5 Software implementation steps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .               623
   19.5.1 z/OS software maintenance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                  623
   19.5.2 Encryption Key Manager installation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                     623
   19.5.3 z/OS DFSMS implementation steps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                        623
19.6 TS7700 implementation steps. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                624
   19.6.1 Configuring the TS7700 for encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                      624
   19.6.2 Creating TS7700 storage groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                     626
   19.6.3 Creating TS7700 management classes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                           627
   19.6.4 Activate the TS7700 Encryption Feature License . . . . . . . . . . . . . . . . . . . . . . .                             629
   19.6.5 EKM addresses. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .           631
   19.6.6 Testing EKM connectivity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .               632
   19.6.7 Configuring pool encryption settings for the TS7700 . . . . . . . . . . . . . . . . . . . .                              632
19.7 Implementation considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .               634
   19.7.1 Management construct definitions and transfer . . . . . . . . . . . . . . . . . . . . . . . .                            634
   19.7.2 Changing storage pool encryption settings . . . . . . . . . . . . . . . . . . . . . . . . . . . .                        634
   19.7.3 Moving data to encrypted storage pools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                       635
   19.7.4 EKM operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .          637
   19.7.5 Tracking encryption usage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                638
   19.7.6 Data exchange with other data centers or business partners . . . . . . . . . . . . . .                                   638
19.8 TS7700 encryption with z/VM, z/VSE, or z/TPF . . . . . . . . . . . . . . . . . . . . . . . . . . . .                          638

Chapter 20. Implementing TS1120 and TS1130 encryption in an open systems
           environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .           641
20.1 Encryption overview in an open systems environment . . . . . . . . . . . . . . . . . . . . . . .                              642
20.2 Adding drives to a logical library . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .            643
   20.2.1 Advanced Library Management System considerations . . . . . . . . . . . . . . . . . .                                    643
20.3 Managing the encryption and business partner exchange . . . . . . . . . . . . . . . . . . . .                                 644
   20.3.1 Disaster recovery considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                   646

                                                                                                                   Contents         xi
20.3.2 Keeping track of key usage. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .         647
                     20.4 Encryption implementation checklist . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .          648
                        20.4.1 Planning your EKM environment. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .              648
                        20.4.2 EKM setup tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   649
                        20.4.3 Application-Managed Encryption setup tasks . . . . . . . . . . . . . . . . . . . . . . . . . .                    649
                        20.4.4 System-Managed (Atape) Encryption setup tasks . . . . . . . . . . . . . . . . . . . . . .                         650
                        20.4.5 Library-Managed Encryption setup tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                  651
                     20.5 Implementing Library-Managed Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                  651
                        20.5.1 LME implementation tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .          651
                        20.5.2 Upgrading firmware. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .     652
                        20.5.3 Add EKM or Tivoli Key Lifecycle Manager IP addresses . . . . . . . . . . . . . . . . .                            658
                        20.5.4 Enabling Library-Managed Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                 659
                        20.5.5 Barcode Encryption Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .         662
                     20.6 Implementing System-Managed Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                   668
                        20.6.1 System-Managed Encryption tasks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                669
                        20.6.2 Atape device driver . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   670
                        20.6.3 Update Atape EKM proxy configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                  670
                        20.6.4 System-Managed Encryption Atape device entries . . . . . . . . . . . . . . . . . . . . .                          672
                        20.6.5 Updating the Atape device driver configuration . . . . . . . . . . . . . . . . . . . . . . . .                    673
                        20.6.6 Enabling System-Managed Encryption using the TS3500 web GUI. . . . . . . . .                                      674
                        20.6.7 Using SMIT to enable System-Managed Encryption . . . . . . . . . . . . . . . . . . . .                            676
                        20.6.8 Managing System-Managed Encryption and business partner exchange . . . .                                          683
                     20.7 Application-Managed Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .           686
                        20.7.1 IBM Tivoli Storage Manager overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                 686
                        20.7.2 IBM Tivoli Storage Manager support for 3592 drive encryption . . . . . . . . . . . .                              687
                        20.7.3 Implementing Application-Managed Encryption . . . . . . . . . . . . . . . . . . . . . . . .                       688
                        20.7.4 IBM Tivoli Storage Manager encryption considerations . . . . . . . . . . . . . . . . . .                          691
                     20.8 IBM 3494 with TS1120 or TS1130 encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                    692
                        20.8.1 Review the 3494 encryption-capable drives . . . . . . . . . . . . . . . . . . . . . . . . . . .                   692
                        20.8.2 Specifying a Barcode Encryption Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                696
                        20.8.3 Entering the EKM IP address and key labels . . . . . . . . . . . . . . . . . . . . . . . . . .                    698
                        20.8.4 ILEP key label mapping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .        699

                     Chapter 21. Tape data encryption with i5/OS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                 701
                     21.1 Planning for tape data encryption with i5/OS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .               702
                        21.1.1 Hardware prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .      702
                        21.1.2 Software prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .      703
                        21.1.3 Disaster recovery considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .            704
                        21.1.4 EKM keystore considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .           705
                        21.1.5 TS1120 Tape Encryption policy considerations . . . . . . . . . . . . . . . . . . . . . . . .                      706
                        21.1.6 Considerations for sharing tapes with partners. . . . . . . . . . . . . . . . . . . . . . . . .                   707
                        21.1.7 Steps for implementing tape encryption with i5/OS . . . . . . . . . . . . . . . . . . . . .                       709
                     21.2 Setup and usage of tape data encryption with i5/OS . . . . . . . . . . . . . . . . . . . . . . . .                     709
                        21.2.1 Creating an EKM keystore and certificate. . . . . . . . . . . . . . . . . . . . . . . . . . . . .                 710
                        21.2.2 Configuring the TS3500 library for Library-Managed Encryption . . . . . . . . . . .                               722
                        21.2.3 Importing and exporting encryption keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                 732
                        21.2.4 Working with encrypted tape cartridges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                744
                        21.2.5 Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   749

Part 4. DS8000 encryption features. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 751

                     Chapter 22. IBM System Storage DS8000 encryption preparation. . . . . . . . . . . . . . . 753
                     22.1 Encryption-capable DS8000 ordering and configuration. . . . . . . . . . . . . . . . . . . . . . 754
                     22.2 Requirements for encrypting storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 755

xii     IBM System Storage Data Encryption
22.3 Tivoli Key Lifecycle Manager configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 756
   22.3.1 Log in to Tivoli Integrated Portal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 756
   22.3.2 Creating an image certificate or certificate request. . . . . . . . . . . . . . . . . . . . . . 757
   22.3.3 Configure the SFIs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 761
   22.3.4 Starting and stopping the Tivoli Key Lifecycle Manager server and determining its
         status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 765
22.4 Configuring the Tivoli Key Lifecycle Manager server connections to the DS8000 . . 767

Chapter 23. DS8000 encryption features and implementation . . . . . . . . . . . . . . . . . .                                      771
23.1 DS8100/DS8300 (R4.2) GUI configuration for encryption . . . . . . . . . . . . . . . . . . . .                                 772
   23.1.1 Configuring the encryption group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                   772
   23.1.2 Applying the encryption activation key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                     773
   23.1.3 Configuring and administering encrypted arrays. . . . . . . . . . . . . . . . . . . . . . . .                            776
   23.1.4 Configuring and administering encrypted ranks . . . . . . . . . . . . . . . . . . . . . . . .                            780
   23.1.5 Configuring and administering encrypted extent pools . . . . . . . . . . . . . . . . . . .                               783
23.2 DS8700 (R5.0) GUI configuration for encryption . . . . . . . . . . . . . . . . . . . . . . . . . . .                          788
   23.2.1 Configuring the recovery key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                 788
   23.2.2 Configuring the encryption group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                   792
   23.2.3 Applying the encryption activation key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                     794
   23.2.4 Configuring and administering encrypted arrays. . . . . . . . . . . . . . . . . . . . . . . .                            796
   23.2.5 Configuring and administering encrypted ranks . . . . . . . . . . . . . . . . . . . . . . . .                            798
   23.2.6 Configuring and administering encrypted extent pools . . . . . . . . . . . . . . . . . . .                               801
23.3 DS8000 DS CLI configuration for encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                        804
   23.3.1 Configuring the Tivoli Key Lifecycle Manager server connection . . . . . . . . . . .                                     804
   23.3.2 Configuring and administering the encryption group. . . . . . . . . . . . . . . . . . . . .                              806
   23.3.3 Applying encryption activation key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                   807
   23.3.4 Creating encrypted arrays. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .               807
   23.3.5 Creating encrypted ranks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .               808
   23.3.6 Creating encrypted extent pools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                  809
23.4 Encryption and Copy Services functions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                     810

Chapter 24. DS8700 advanced encryption features and implementation . . . . . . . . .                                               811
24.1 New security roles: Storage and security administrator . . . . . . . . . . . . . . . . . . . . . .                            812
24.2 Recovery key support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .          814
   24.2.1 Configuring the recovery key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                 814
   24.2.2 Validating the recovery key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .              818
   24.2.3 Initiating recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .        820
   24.2.4 Using the process to rekey the recovery key . . . . . . . . . . . . . . . . . . . . . . . . . .                          826
   24.2.5 Deleting the recovery key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .              830
   24.2.6 Recovery key state summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                   833
24.3 Dual platform key server support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                833
   24.3.1 Setting up Tivoli Key Lifecycle Manager server . . . . . . . . . . . . . . . . . . . . . . . .                           833

Chapter 25. Best practices and guidelines for DS8000 encryption . . . . . . . . . . . . . .                                        845
25.1 Best practices for encrypting storage environments . . . . . . . . . . . . . . . . . . . . . . . . .                          846
   25.1.1 Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   846
   25.1.2 Availability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   846
   25.1.3 Encryption deadlock prevention . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                   847
25.2 Dual Hardware Management Console and redundancy . . . . . . . . . . . . . . . . . . . . . .                                   850
   25.2.1 Dual Hardware Management Console advantages . . . . . . . . . . . . . . . . . . . . .                                    850
   25.2.2 Redundant HMC configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                     850
25.3 Multiple Tivoli Key Lifecycle Managers for redundancy . . . . . . . . . . . . . . . . . . . . . .                             852
   25.3.1 Setting up primary and secondary Tivoli Key Lifecycle Manager servers. . . . .                                           853
   25.3.2 Synchronizing primary and secondary Tivoli Key Lifecycle Manager servers .                                               853

                                                                                                                 Contents          xiii
25.4 Backup and restore the Tivoli Key Lifecycle Manager servers . . . . . . . . . . . . . . . . .                                         853
                 25.4.1 Categories of data in a backup file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                          854
                 25.4.2 Backup file security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                 854
                 25.4.3 IBM Tivoli Storage Manager as a backup repository . . . . . . . . . . . . . . . . . . . .                                        854
                 25.4.4 Backup and restore runtime requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . .                                  854
                 25.4.5 Backing up critical files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                  855
                 25.4.6 Restoring a backup file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                    856
                 25.4.7 Deleting a backup file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                   858
              25.5 Key exporting and importing tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                         858
                 25.5.1 Exporting keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                 859
                 25.5.2 Importing keys. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                859

              Appendix A. z/OS planning and implementation checklists . . . . . . . . . . . . . . . . . . . .                                            863
              DFSMS Systems Managed Tape planning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                                864
                DFSMS planning and the z/OS encryption planning checklist . . . . . . . . . . . . . . . . . . .                                          864
                Storage administrator stand-alone environment planning. . . . . . . . . . . . . . . . . . . . . . .                                      865
                Storage administrator tape library environment planning . . . . . . . . . . . . . . . . . . . . . . .                                    866
              DFSMS Systems Managed Tape implementation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                                    867
              Object access method planning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                    869
                Storage administrator OAM planning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                           869
              OAM implementation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .               870
              DFSMShsm tape environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                      871

              Appendix B. DS8700 encryption-related system reference codes . . . . . . . . . . . . . . . 873

              Appendix C. z/OS Java and Open Edition tips . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                                  877
              JZOS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .     878
                 Console communication with batch jobs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                           878
                 Encryption Key Manager and JZOS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                           879
              MVS Open Edition tips . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .              882
                 Exporting a variable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .              882
                 Setting up an alias . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .             882
                 Copying the escape character . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                      883
                 Advantages of VT100 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                 884
              Advanced security hwkeytool and keytool scripts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                              885
                 Complete keytool example for JCEKS using hidden passwords . . . . . . . . . . . . . . . . .                                             885
                 Complete hwkeytool example for JCE4758KS using hidden passwords . . . . . . . . . . .                                                   887
              Java . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   889
                 Security and providers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                889
                 Garbage Collector . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .             890
                 Verifying the installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .              891
                 z/OS region size . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .            891
                 Policy files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .      891

              Appendix D. Asymmetric and Symmetric Master Key change procedures . . . . . . . .                                                          893
              Asymmetric Master Key change ceremony . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                              894
                 Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .         894
                 Testing encryption and decryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                       894
                 Pre-key change: Disabling PKA services for all images in the sysplex. . . . . . . . . . . . .                                           894
                 Key change: First LPAR in the sysplex . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                         896
                 Key change: Subsequent LPARs in the sysplex . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                                 902
                 Post-key change: All LPARs in the sysplex . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                             906
              ICSF tips . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .      910
                 Creating a PKDS VSAM data set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                         910


xiv   IBM System Storage Data Encryption
Symmetric Master Key change ceremony . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                        911
  Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .     912
  Testing the encryption and decryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                     912
  Disabling dynamic CKDS updates for all images in the sysplex . . . . . . . . . . . . . . . . . .                                    912
  Key change: First LPAR in the sysplex . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                     913
  Reenciphering the CKDS under the new SYM-MK. . . . . . . . . . . . . . . . . . . . . . . . . . . .                                  919
  Changing the new SYM-MK and activating the re-enciphered CKDS . . . . . . . . . . . . .                                             921
  Key change: Subsequent LPARs in the sysplex . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                             922
  Post-key change: All LPARs in the sysplex . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                         925

Appendix E. z/OS tape data encryption diagnostics . . . . . . . . . . . . . . . . . . . . . . . . . .                                 931
EKM problem determination when running z/OS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                           932
Error scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   932
Diagnostic scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .        935
Encryption Key Manager error codes and recovery actions. . . . . . . . . . . . . . . . . . . . . . . .                                938
   Drive error codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .        940
   Control unit error codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .           941
   IOS628E message indicates connection failure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                           942

Appendix F. IEHINITT exits and messages for rekeying . . . . . . . . . . . . . . . . . . . . . . .                                    943
Dynamic Exits Service Facility support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                  944
  Error conditions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .      944
  Programming considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                  945
REKEY messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .          945
  New messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .          946
  Modified messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .           946

Appendix G. Implementing EKM on z/OS SECURE key processing to TS1100 and
                LTO4/LTO5 drives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                949
Implementing EKM in z/OS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .              950
   Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .    950
   z/OS UNIX System Services. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                 950
   Installing the Encryption Key Manager in z/OS. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                         951
   Create a JCECCAKS for EKM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                    953
   Setting up the EKM environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                   954
   Starting EKM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .     957
   Configuring EKM TCP/IP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .               962
   Enterprise-wide key management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                    964
Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   964

Appendix H. Encryption testing in an open systems environment . . . . . . . . . . . . . .                                             965
Encryption key path test . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .        966
   Using key path diagnostics in an LME environment . . . . . . . . . . . . . . . . . . . . . . . . . . .                             966
   Key Path Diagnostic test in a SME environment. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                           969
Testing data encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .         973
   IBM Tape Diagnostic Tool. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .              973
   Encryption Verification test using the ITDT-GE. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                        973
   Encryption verification using the ITDT-SE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                      978
   Encryption test using the device driver functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                        979

Related publications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .          985
IBM Redbooks publications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .             985
Other publications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .      985
Online resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .      987


                                                                                                                     Contents          xv
How to get IBM Redbooks publications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 988
              Help from IBM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 988

              Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 991




xvi   IBM System Storage Data Encryption
Notices

This information was developed for products and services offered in the U.S.A.

IBM may not offer the products, services, or features discussed in this document in other countries. Consult
your local IBM representative for information on the products and services currently available in your area. Any
reference to an IBM product, program, or service is not intended to state or imply that only that IBM product,
program, or service may be used. Any functionally equivalent product, program, or service that does not
infringe any IBM intellectual property right may be used instead. However, it is the user's responsibility to
evaluate and verify the operation of any non-IBM product, program, or service.

IBM may have patents or pending patent applications covering subject matter described in this document. The
furnishing of this document does not give you any license to these patents. You can send license inquiries, in
writing, to:
IBM Director of Licensing, IBM Corporation, North Castle Drive, Armonk, NY 10504-1785 U.S.A.

The following paragraph does not apply to the United Kingdom or any other country where such
provisions are inconsistent with local law: INTERNATIONAL BUSINESS MACHINES CORPORATION
PROVIDES THIS PUBLICATION "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR
IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF NON-INFRINGEMENT,
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of
express or implied warranties in certain transactions, therefore, this statement may not apply to you.

This information could include technical inaccuracies or typographical errors. Changes are periodically made
to the information herein; these changes will be incorporated in new editions of the publication. IBM may make
improvements and/or changes in the product(s) and/or the program(s) described in this publication at any time
without notice.

Any references in this information to non-IBM websites are provided for convenience only and do not in any
manner serve as an endorsement of those websites. The materials at those websites are not part of the
materials for this IBM product and use of those websites is at your own risk.

IBM may use or distribute any of the information you supply in any way it believes appropriate without incurring
any obligation to you.

Information concerning non-IBM products was obtained from the suppliers of those products, their published
announcements or other publicly available sources. IBM has not tested those products and cannot confirm the
accuracy of performance, compatibility or any other claims related to non-IBM products. Questions on the
capabilities of non-IBM products should be addressed to the suppliers of those products.

This information contains examples of data and reports used in daily business operations. To illustrate them
as completely as possible, the examples include the names of individuals, companies, brands, and products.
All of these names are fictitious and any similarity to the names and addresses used by an actual business
enterprise is entirely coincidental.
The following company name appearing in this publication is fictitious:

ZABYXC

This name is used for instructional purposes only.



COPYRIGHT LICENSE:

This information contains sample application programs in source language, which illustrate programming
techniques on various operating platforms. You may copy, modify, and distribute these sample programs in
any form without payment to IBM, for the purposes of developing, using, marketing or distributing application
programs conforming to the application programming interface for the operating platform for which the sample
programs are written. These examples have not been thoroughly tested under all conditions. IBM, therefore,
cannot guarantee or imply reliability, serviceability, or function of these programs.



© Copyright IBM Corp. 2010. All rights reserved.                                                            xvii
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797
Ibm system storage data encryption sg247797

Weitere ähnliche Inhalte

Was ist angesagt?

Ibm tivoli security solutions for microsoft software environments redp4430
Ibm tivoli security solutions for microsoft software environments redp4430Ibm tivoli security solutions for microsoft software environments redp4430
Ibm tivoli security solutions for microsoft software environments redp4430Banking at Ho Chi Minh city
 
Backing up db2 using ibm tivoli storage management sg246247
Backing up db2 using ibm tivoli storage management sg246247Backing up db2 using ibm tivoli storage management sg246247
Backing up db2 using ibm tivoli storage management sg246247Banking at Ho Chi Minh city
 
Ibm tivoli storage manager in a clustered environment sg246679
Ibm tivoli storage manager in a clustered environment sg246679Ibm tivoli storage manager in a clustered environment sg246679
Ibm tivoli storage manager in a clustered environment sg246679Banking at Ho Chi Minh city
 
Ibm tivoli key lifecycle manager for z os redp4472
Ibm tivoli key lifecycle manager for z os redp4472Ibm tivoli key lifecycle manager for z os redp4472
Ibm tivoli key lifecycle manager for z os redp4472Banking at Ho Chi Minh city
 
Integrating backup recovery and media services and ibm tivoli storage manager...
Integrating backup recovery and media services and ibm tivoli storage manager...Integrating backup recovery and media services and ibm tivoli storage manager...
Integrating backup recovery and media services and ibm tivoli storage manager...Banking at Ho Chi Minh city
 
Ibm tivoli storage manager bare machine recovery for microsoft windows 2003 a...
Ibm tivoli storage manager bare machine recovery for microsoft windows 2003 a...Ibm tivoli storage manager bare machine recovery for microsoft windows 2003 a...
Ibm tivoli storage manager bare machine recovery for microsoft windows 2003 a...Banking at Ho Chi Minh city
 
Implementing tivoli data warehouse v 1.2 sg247100
Implementing tivoli data warehouse v 1.2 sg247100Implementing tivoli data warehouse v 1.2 sg247100
Implementing tivoli data warehouse v 1.2 sg247100Banking at Ho Chi Minh city
 
Certification study guide for ibm tivoli configuration manager 4.2 redp3946
Certification study guide for ibm tivoli configuration manager 4.2 redp3946Certification study guide for ibm tivoli configuration manager 4.2 redp3946
Certification study guide for ibm tivoli configuration manager 4.2 redp3946Banking at Ho Chi Minh city
 
Tivoli business systems manager v2.1 end to-end business impact management sg...
Tivoli business systems manager v2.1 end to-end business impact management sg...Tivoli business systems manager v2.1 end to-end business impact management sg...
Tivoli business systems manager v2.1 end to-end business impact management sg...Banking at Ho Chi Minh city
 
Ibm system storage solutions handbook
Ibm system storage solutions handbook Ibm system storage solutions handbook
Ibm system storage solutions handbook Diego Alberto Tamayo
 
Tape automation with ibm e server xseries servers redp0415
Tape automation with ibm e server xseries servers redp0415Tape automation with ibm e server xseries servers redp0415
Tape automation with ibm e server xseries servers redp0415Banking at Ho Chi Minh city
 
Tivoli data warehouse version 1.3 planning and implementation sg246343
Tivoli data warehouse version 1.3 planning and implementation sg246343Tivoli data warehouse version 1.3 planning and implementation sg246343
Tivoli data warehouse version 1.3 planning and implementation sg246343Banking at Ho Chi Minh city
 
Develop and deploy a secure portal solution using web sphere portal v5 and ti...
Develop and deploy a secure portal solution using web sphere portal v5 and ti...Develop and deploy a secure portal solution using web sphere portal v5 and ti...
Develop and deploy a secure portal solution using web sphere portal v5 and ti...Banking at Ho Chi Minh city
 
Ibm tivoli web access for information management sg246823
Ibm tivoli web access for information management sg246823Ibm tivoli web access for information management sg246823
Ibm tivoli web access for information management sg246823Banking at Ho Chi Minh city
 

Was ist angesagt? (18)

Netfinity tape solutions sg245218
Netfinity tape solutions sg245218Netfinity tape solutions sg245218
Netfinity tape solutions sg245218
 
Ibm tivoli security solutions for microsoft software environments redp4430
Ibm tivoli security solutions for microsoft software environments redp4430Ibm tivoli security solutions for microsoft software environments redp4430
Ibm tivoli security solutions for microsoft software environments redp4430
 
Backing up db2 using ibm tivoli storage management sg246247
Backing up db2 using ibm tivoli storage management sg246247Backing up db2 using ibm tivoli storage management sg246247
Backing up db2 using ibm tivoli storage management sg246247
 
Ibm tivoli storage manager in a clustered environment sg246679
Ibm tivoli storage manager in a clustered environment sg246679Ibm tivoli storage manager in a clustered environment sg246679
Ibm tivoli storage manager in a clustered environment sg246679
 
Ibm tivoli key lifecycle manager for z os redp4472
Ibm tivoli key lifecycle manager for z os redp4472Ibm tivoli key lifecycle manager for z os redp4472
Ibm tivoli key lifecycle manager for z os redp4472
 
Integrating backup recovery and media services and ibm tivoli storage manager...
Integrating backup recovery and media services and ibm tivoli storage manager...Integrating backup recovery and media services and ibm tivoli storage manager...
Integrating backup recovery and media services and ibm tivoli storage manager...
 
Ibm tivoli storage tape drive
Ibm tivoli storage tape driveIbm tivoli storage tape drive
Ibm tivoli storage tape drive
 
Ibm tivoli storage manager bare machine recovery for microsoft windows 2003 a...
Ibm tivoli storage manager bare machine recovery for microsoft windows 2003 a...Ibm tivoli storage manager bare machine recovery for microsoft windows 2003 a...
Ibm tivoli storage manager bare machine recovery for microsoft windows 2003 a...
 
A practical guide to tivoli sa nergy sg246146
A practical guide to tivoli sa nergy sg246146A practical guide to tivoli sa nergy sg246146
A practical guide to tivoli sa nergy sg246146
 
Implementing tivoli data warehouse v 1.2 sg247100
Implementing tivoli data warehouse v 1.2 sg247100Implementing tivoli data warehouse v 1.2 sg247100
Implementing tivoli data warehouse v 1.2 sg247100
 
Certification study guide for ibm tivoli configuration manager 4.2 redp3946
Certification study guide for ibm tivoli configuration manager 4.2 redp3946Certification study guide for ibm tivoli configuration manager 4.2 redp3946
Certification study guide for ibm tivoli configuration manager 4.2 redp3946
 
Tivoli business systems manager v2.1 end to-end business impact management sg...
Tivoli business systems manager v2.1 end to-end business impact management sg...Tivoli business systems manager v2.1 end to-end business impact management sg...
Tivoli business systems manager v2.1 end to-end business impact management sg...
 
Ibm system storage solutions handbook
Ibm system storage solutions handbook Ibm system storage solutions handbook
Ibm system storage solutions handbook
 
Tape automation with ibm e server xseries servers redp0415
Tape automation with ibm e server xseries servers redp0415Tape automation with ibm e server xseries servers redp0415
Tape automation with ibm e server xseries servers redp0415
 
Tivoli data warehouse version 1.3 planning and implementation sg246343
Tivoli data warehouse version 1.3 planning and implementation sg246343Tivoli data warehouse version 1.3 planning and implementation sg246343
Tivoli data warehouse version 1.3 planning and implementation sg246343
 
Designing an ibm storage area network sg245758
Designing an ibm storage area network sg245758Designing an ibm storage area network sg245758
Designing an ibm storage area network sg245758
 
Develop and deploy a secure portal solution using web sphere portal v5 and ti...
Develop and deploy a secure portal solution using web sphere portal v5 and ti...Develop and deploy a secure portal solution using web sphere portal v5 and ti...
Develop and deploy a secure portal solution using web sphere portal v5 and ti...
 
Ibm tivoli web access for information management sg246823
Ibm tivoli web access for information management sg246823Ibm tivoli web access for information management sg246823
Ibm tivoli web access for information management sg246823
 

Ähnlich wie Ibm system storage data encryption sg247797

Implementing the ibm system storage san32 b e4 encryption switch - sg247922
Implementing the ibm system storage san32 b e4 encryption switch - sg247922Implementing the ibm system storage san32 b e4 encryption switch - sg247922
Implementing the ibm system storage san32 b e4 encryption switch - sg247922Banking at Ho Chi Minh city
 
Deployment guide series tivoli continuous data protection for files sg247235
Deployment guide series tivoli continuous data protection for files sg247235Deployment guide series tivoli continuous data protection for files sg247235
Deployment guide series tivoli continuous data protection for files sg247235Banking at Ho Chi Minh city
 
Deployment guide series tivoli continuous data protection for files v3.1 sg24...
Deployment guide series tivoli continuous data protection for files v3.1 sg24...Deployment guide series tivoli continuous data protection for files v3.1 sg24...
Deployment guide series tivoli continuous data protection for files v3.1 sg24...Banking at Ho Chi Minh city
 
It security compliance management design guide with ibm tivoli security infor...
It security compliance management design guide with ibm tivoli security infor...It security compliance management design guide with ibm tivoli security infor...
It security compliance management design guide with ibm tivoli security infor...Banking at Ho Chi Minh city
 
It security compliance management design guide with ibm tivoli security infor...
It security compliance management design guide with ibm tivoli security infor...It security compliance management design guide with ibm tivoli security infor...
It security compliance management design guide with ibm tivoli security infor...Banking at Ho Chi Minh city
 
Large scale implementation of ibm tivoli composite application manager for we...
Large scale implementation of ibm tivoli composite application manager for we...Large scale implementation of ibm tivoli composite application manager for we...
Large scale implementation of ibm tivoli composite application manager for we...Banking at Ho Chi Minh city
 
Large scale implementation of ibm tivoli composite application manager for we...
Large scale implementation of ibm tivoli composite application manager for we...Large scale implementation of ibm tivoli composite application manager for we...
Large scale implementation of ibm tivoli composite application manager for we...Banking at Ho Chi Minh city
 
Deployment guide series ibm total storage productivity center for data sg247140
Deployment guide series ibm total storage productivity center for data sg247140Deployment guide series ibm total storage productivity center for data sg247140
Deployment guide series ibm total storage productivity center for data sg247140Banking at Ho Chi Minh city
 
Ibm tivoli asset management for it portfolio overview sg247376
Ibm tivoli asset management for it portfolio overview sg247376Ibm tivoli asset management for it portfolio overview sg247376
Ibm tivoli asset management for it portfolio overview sg247376Banking at Ho Chi Minh city
 
Backing up db2 using ibm tivoli storage management sg246247
Backing up db2 using ibm tivoli storage management sg246247Backing up db2 using ibm tivoli storage management sg246247
Backing up db2 using ibm tivoli storage management sg246247Banking at Ho Chi Minh city
 
Introducing and Implementing IBM FlashSystem V9000
Introducing and Implementing IBM FlashSystem V9000Introducing and Implementing IBM FlashSystem V9000
Introducing and Implementing IBM FlashSystem V9000Michael Martin
 
IBM enterprise Content Management
IBM enterprise Content ManagementIBM enterprise Content Management
IBM enterprise Content Managementwardell henley
 
Ibm tivoli monitoring implementation and performance optimization for large s...
Ibm tivoli monitoring implementation and performance optimization for large s...Ibm tivoli monitoring implementation and performance optimization for large s...
Ibm tivoli monitoring implementation and performance optimization for large s...Banking at Ho Chi Minh city
 
Implementing ibm storage data deduplication solutions sg247888
Implementing ibm storage data deduplication solutions sg247888Implementing ibm storage data deduplication solutions sg247888
Implementing ibm storage data deduplication solutions sg247888Banking at Ho Chi Minh city
 
Disaster recovery solutions for ibm total storage san file system sg247157
Disaster recovery solutions for ibm total storage san file system sg247157Disaster recovery solutions for ibm total storage san file system sg247157
Disaster recovery solutions for ibm total storage san file system sg247157Banking at Ho Chi Minh city
 
Disaster recovery solutions for ibm total storage san file system sg247157
Disaster recovery solutions for ibm total storage san file system sg247157Disaster recovery solutions for ibm total storage san file system sg247157
Disaster recovery solutions for ibm total storage san file system sg247157Banking at Ho Chi Minh city
 

Ähnlich wie Ibm system storage data encryption sg247797 (19)

Implementing the ibm system storage san32 b e4 encryption switch - sg247922
Implementing the ibm system storage san32 b e4 encryption switch - sg247922Implementing the ibm system storage san32 b e4 encryption switch - sg247922
Implementing the ibm system storage san32 b e4 encryption switch - sg247922
 
Deployment guide series tivoli continuous data protection for files sg247235
Deployment guide series tivoli continuous data protection for files sg247235Deployment guide series tivoli continuous data protection for files sg247235
Deployment guide series tivoli continuous data protection for files sg247235
 
Deployment guide series tivoli continuous data protection for files v3.1 sg24...
Deployment guide series tivoli continuous data protection for files v3.1 sg24...Deployment guide series tivoli continuous data protection for files v3.1 sg24...
Deployment guide series tivoli continuous data protection for files v3.1 sg24...
 
It security compliance management design guide with ibm tivoli security infor...
It security compliance management design guide with ibm tivoli security infor...It security compliance management design guide with ibm tivoli security infor...
It security compliance management design guide with ibm tivoli security infor...
 
It security compliance management design guide with ibm tivoli security infor...
It security compliance management design guide with ibm tivoli security infor...It security compliance management design guide with ibm tivoli security infor...
It security compliance management design guide with ibm tivoli security infor...
 
Large scale implementation of ibm tivoli composite application manager for we...
Large scale implementation of ibm tivoli composite application manager for we...Large scale implementation of ibm tivoli composite application manager for we...
Large scale implementation of ibm tivoli composite application manager for we...
 
Large scale implementation of ibm tivoli composite application manager for we...
Large scale implementation of ibm tivoli composite application manager for we...Large scale implementation of ibm tivoli composite application manager for we...
Large scale implementation of ibm tivoli composite application manager for we...
 
Deployment guide series ibm total storage productivity center for data sg247140
Deployment guide series ibm total storage productivity center for data sg247140Deployment guide series ibm total storage productivity center for data sg247140
Deployment guide series ibm total storage productivity center for data sg247140
 
Ibm total storage san file system sg247057
Ibm total storage san file system sg247057Ibm total storage san file system sg247057
Ibm total storage san file system sg247057
 
Introducing ibm tivoli license manager sg246888
Introducing ibm tivoli license manager sg246888Introducing ibm tivoli license manager sg246888
Introducing ibm tivoli license manager sg246888
 
Introducing ibm tivoli license manager sg246888
Introducing ibm tivoli license manager sg246888Introducing ibm tivoli license manager sg246888
Introducing ibm tivoli license manager sg246888
 
Ibm tivoli asset management for it portfolio overview sg247376
Ibm tivoli asset management for it portfolio overview sg247376Ibm tivoli asset management for it portfolio overview sg247376
Ibm tivoli asset management for it portfolio overview sg247376
 
Backing up db2 using ibm tivoli storage management sg246247
Backing up db2 using ibm tivoli storage management sg246247Backing up db2 using ibm tivoli storage management sg246247
Backing up db2 using ibm tivoli storage management sg246247
 
Introducing and Implementing IBM FlashSystem V9000
Introducing and Implementing IBM FlashSystem V9000Introducing and Implementing IBM FlashSystem V9000
Introducing and Implementing IBM FlashSystem V9000
 
IBM enterprise Content Management
IBM enterprise Content ManagementIBM enterprise Content Management
IBM enterprise Content Management
 
Ibm tivoli monitoring implementation and performance optimization for large s...
Ibm tivoli monitoring implementation and performance optimization for large s...Ibm tivoli monitoring implementation and performance optimization for large s...
Ibm tivoli monitoring implementation and performance optimization for large s...
 
Implementing ibm storage data deduplication solutions sg247888
Implementing ibm storage data deduplication solutions sg247888Implementing ibm storage data deduplication solutions sg247888
Implementing ibm storage data deduplication solutions sg247888
 
Disaster recovery solutions for ibm total storage san file system sg247157
Disaster recovery solutions for ibm total storage san file system sg247157Disaster recovery solutions for ibm total storage san file system sg247157
Disaster recovery solutions for ibm total storage san file system sg247157
 
Disaster recovery solutions for ibm total storage san file system sg247157
Disaster recovery solutions for ibm total storage san file system sg247157Disaster recovery solutions for ibm total storage san file system sg247157
Disaster recovery solutions for ibm total storage san file system sg247157
 

Mehr von Banking at Ho Chi Minh city

IBM MobileFirst Platform v7.0 POT Offers Lab v1.0
IBM MobileFirst Platform v7.0 POT Offers Lab v1.0IBM MobileFirst Platform v7.0 POT Offers Lab v1.0
IBM MobileFirst Platform v7.0 POT Offers Lab v1.0Banking at Ho Chi Minh city
 
IBM MobileFirst Platform v7.0 POT App Mgmt Lab v1.1
IBM MobileFirst Platform  v7.0 POT App Mgmt Lab v1.1IBM MobileFirst Platform  v7.0 POT App Mgmt Lab v1.1
IBM MobileFirst Platform v7.0 POT App Mgmt Lab v1.1Banking at Ho Chi Minh city
 
IBM MobileFirst Platform v7.0 POT Analytics v1.1
IBM MobileFirst Platform v7.0 POT Analytics v1.1IBM MobileFirst Platform v7.0 POT Analytics v1.1
IBM MobileFirst Platform v7.0 POT Analytics v1.1Banking at Ho Chi Minh city
 
IBM MobileFirst Platform Pot Sentiment Analysis v3
IBM MobileFirst Platform Pot Sentiment Analysis v3IBM MobileFirst Platform Pot Sentiment Analysis v3
IBM MobileFirst Platform Pot Sentiment Analysis v3Banking at Ho Chi Minh city
 
IBM MobileFirst Platform 7.0 POT InApp Feedback V0.1
IBM MobileFirst Platform 7.0 POT InApp Feedback V0.1IBM MobileFirst Platform 7.0 POT InApp Feedback V0.1
IBM MobileFirst Platform 7.0 POT InApp Feedback V0.1Banking at Ho Chi Minh city
 
Tme 10 cookbook for aix systems management and networking sg244867
Tme 10 cookbook for aix systems management and networking sg244867Tme 10 cookbook for aix systems management and networking sg244867
Tme 10 cookbook for aix systems management and networking sg244867Banking at Ho Chi Minh city
 
Tivoli data warehouse version 1.3 planning and implementation sg246343
Tivoli data warehouse version 1.3 planning and implementation sg246343Tivoli data warehouse version 1.3 planning and implementation sg246343
Tivoli data warehouse version 1.3 planning and implementation sg246343Banking at Ho Chi Minh city
 
Tivoli data warehouse 1.2 and business objects redp9116
Tivoli data warehouse 1.2 and business objects redp9116Tivoli data warehouse 1.2 and business objects redp9116
Tivoli data warehouse 1.2 and business objects redp9116Banking at Ho Chi Minh city
 
Tivoli storage productivity center v4.2 release guide sg247894
Tivoli storage productivity center v4.2 release guide sg247894Tivoli storage productivity center v4.2 release guide sg247894
Tivoli storage productivity center v4.2 release guide sg247894Banking at Ho Chi Minh city
 
Synchronizing data with ibm tivoli directory integrator 6.1 redp4317
Synchronizing data with ibm tivoli directory integrator 6.1 redp4317Synchronizing data with ibm tivoli directory integrator 6.1 redp4317
Synchronizing data with ibm tivoli directory integrator 6.1 redp4317Banking at Ho Chi Minh city
 
Storage migration and consolidation with ibm total storage products redp3888
Storage migration and consolidation with ibm total storage products redp3888Storage migration and consolidation with ibm total storage products redp3888
Storage migration and consolidation with ibm total storage products redp3888Banking at Ho Chi Minh city
 
Solution deployment guide for ibm tivoli composite application manager for we...
Solution deployment guide for ibm tivoli composite application manager for we...Solution deployment guide for ibm tivoli composite application manager for we...
Solution deployment guide for ibm tivoli composite application manager for we...Banking at Ho Chi Minh city
 

Mehr von Banking at Ho Chi Minh city (20)

Postgresql v15.1
Postgresql v15.1Postgresql v15.1
Postgresql v15.1
 
Postgresql v14.6 Document Guide
Postgresql v14.6 Document GuidePostgresql v14.6 Document Guide
Postgresql v14.6 Document Guide
 
IBM MobileFirst Platform v7.0 Pot Intro v0.1
IBM MobileFirst Platform v7.0 Pot Intro v0.1IBM MobileFirst Platform v7.0 Pot Intro v0.1
IBM MobileFirst Platform v7.0 Pot Intro v0.1
 
IBM MobileFirst Platform v7 Tech Overview
IBM MobileFirst Platform v7 Tech OverviewIBM MobileFirst Platform v7 Tech Overview
IBM MobileFirst Platform v7 Tech Overview
 
IBM MobileFirst Foundation Version Flyer v1.0
IBM MobileFirst Foundation Version Flyer v1.0IBM MobileFirst Foundation Version Flyer v1.0
IBM MobileFirst Foundation Version Flyer v1.0
 
IBM MobileFirst Platform v7.0 POT Offers Lab v1.0
IBM MobileFirst Platform v7.0 POT Offers Lab v1.0IBM MobileFirst Platform v7.0 POT Offers Lab v1.0
IBM MobileFirst Platform v7.0 POT Offers Lab v1.0
 
IBM MobileFirst Platform v7.0 pot intro v0.1
IBM MobileFirst Platform v7.0 pot intro v0.1IBM MobileFirst Platform v7.0 pot intro v0.1
IBM MobileFirst Platform v7.0 pot intro v0.1
 
IBM MobileFirst Platform v7.0 POT App Mgmt Lab v1.1
IBM MobileFirst Platform  v7.0 POT App Mgmt Lab v1.1IBM MobileFirst Platform  v7.0 POT App Mgmt Lab v1.1
IBM MobileFirst Platform v7.0 POT App Mgmt Lab v1.1
 
IBM MobileFirst Platform v7.0 POT Analytics v1.1
IBM MobileFirst Platform v7.0 POT Analytics v1.1IBM MobileFirst Platform v7.0 POT Analytics v1.1
IBM MobileFirst Platform v7.0 POT Analytics v1.1
 
IBM MobileFirst Platform Pot Sentiment Analysis v3
IBM MobileFirst Platform Pot Sentiment Analysis v3IBM MobileFirst Platform Pot Sentiment Analysis v3
IBM MobileFirst Platform Pot Sentiment Analysis v3
 
IBM MobileFirst Platform 7.0 POT InApp Feedback V0.1
IBM MobileFirst Platform 7.0 POT InApp Feedback V0.1IBM MobileFirst Platform 7.0 POT InApp Feedback V0.1
IBM MobileFirst Platform 7.0 POT InApp Feedback V0.1
 
Tme 10 cookbook for aix systems management and networking sg244867
Tme 10 cookbook for aix systems management and networking sg244867Tme 10 cookbook for aix systems management and networking sg244867
Tme 10 cookbook for aix systems management and networking sg244867
 
Tivoli firewall magic redp0227
Tivoli firewall magic redp0227Tivoli firewall magic redp0227
Tivoli firewall magic redp0227
 
Tivoli data warehouse version 1.3 planning and implementation sg246343
Tivoli data warehouse version 1.3 planning and implementation sg246343Tivoli data warehouse version 1.3 planning and implementation sg246343
Tivoli data warehouse version 1.3 planning and implementation sg246343
 
Tivoli data warehouse 1.2 and business objects redp9116
Tivoli data warehouse 1.2 and business objects redp9116Tivoli data warehouse 1.2 and business objects redp9116
Tivoli data warehouse 1.2 and business objects redp9116
 
Tec implementation examples sg245216
Tec implementation examples sg245216Tec implementation examples sg245216
Tec implementation examples sg245216
 
Tivoli storage productivity center v4.2 release guide sg247894
Tivoli storage productivity center v4.2 release guide sg247894Tivoli storage productivity center v4.2 release guide sg247894
Tivoli storage productivity center v4.2 release guide sg247894
 
Synchronizing data with ibm tivoli directory integrator 6.1 redp4317
Synchronizing data with ibm tivoli directory integrator 6.1 redp4317Synchronizing data with ibm tivoli directory integrator 6.1 redp4317
Synchronizing data with ibm tivoli directory integrator 6.1 redp4317
 
Storage migration and consolidation with ibm total storage products redp3888
Storage migration and consolidation with ibm total storage products redp3888Storage migration and consolidation with ibm total storage products redp3888
Storage migration and consolidation with ibm total storage products redp3888
 
Solution deployment guide for ibm tivoli composite application manager for we...
Solution deployment guide for ibm tivoli composite application manager for we...Solution deployment guide for ibm tivoli composite application manager for we...
Solution deployment guide for ibm tivoli composite application manager for we...
 

Kürzlich hochgeladen

Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 

Kürzlich hochgeladen (20)

Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 

Ibm system storage data encryption sg247797

  • 1. Front cover IBM System Storage Data Encryption Understand the encryption concepts and terminology Compare various IBM storage encryption methods Plan for Tivoli Key Lifecycle Manager and its keystores Alex Osuna David Crowther Reimar Pflieger Esha Seth Ferenc Toth ibm.com/redbooks
  • 2.
  • 3. International Technical Support Organization IBM System Storage Data Encryption June 2010 SG24-7797-00
  • 4. Note: Before using this information and the product it supports, read the information in “Notices” on page xvii. First Edition (June 2010) This edition applies to Tivoli Key Lifecycle Manager Version 1 and later and the Encryption Key Manager Release 1 and later. © Copyright International Business Machines Corporation 2010. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp.
  • 5. Contents Notices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvii Trademarks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xviii Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xix The team who wrote this book . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xix Now you can become a published author, too! . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xx Comments welcome. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxi Stay connected to IBM Redbooks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxi Part 1. Introduction to data encryption. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Chapter 1. Encryption concepts and terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 1.1 Concepts of storage data encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 1.1.1 Symmetric key encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 1.1.2 Asymmetric key encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 1.1.3 Hybrid encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 1.1.4 Digital certificates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 1.2 IBM Key Management methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 1.3 Tivoli Key Lifecycle Manager and Encryption Key Manager . . . . . . . . . . . . . . . . . . . . . 16 1.3.1 IBM Encryption Key Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 1.3.2 Encryption Key Manager components and resources . . . . . . . . . . . . . . . . . . . . . 19 1.3.3 Encryption keys. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 1.3.4 Tivoli Key Lifecycle Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 1.3.5 Tivoli Key Lifecycle Manager components and resources . . . . . . . . . . . . . . . . . . 22 Chapter 2. Introduction to storage data encryption. . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 2.1 IBM tape drive encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 2.2 IBM System Storage DS5000 series with encryption support. . . . . . . . . . . . . . . . . . . . 29 2.3 DS8000 series with encryption support. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 2.3.1 Encryption updates in DS8000 R5.0 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 2.4 Storage data encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 2.4.1 Encryption of data on IBM tape drives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 2.4.2 Encryption of data in IBM System Storage DS5000 Series . . . . . . . . . . . . . . . . . 35 2.4.3 Encryption of data in IBM System Storage DS8000 Series . . . . . . . . . . . . . . . . . 37 2.5 Encryption data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 2.5.1 IBM tape drive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 2.5.2 IBM Storage Series DS5000 and DS8000 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43 2.6 Using data encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 2.6.1 Encrypting data in the tape drive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 2.6.2 Encrypting data on disk drives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 2.6.3 Fundamentals to encryption: Policy and key management. . . . . . . . . . . . . . . . . . 46 Chapter 3. IBM storage encryption methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 3.1 Tivoli Key Lifecycle Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50 3.1.1 Tivoli Key Lifecycle Manager components and resources . . . . . . . . . . . . . . . . . . 51 3.1.2 Key exchange . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 3.2 IBM Encryption Key Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54 3.2.1 Encryption Key Manager components and resources . . . . . . . . . . . . . . . . . . . . . 56 3.3 TS1120, TS1130, and LTO4 tape drive encryption. . . . . . . . . . . . . . . . . . . . . . . . . . . . 58 © Copyright IBM Corp. 2010. All rights reserved. iii
  • 6. 3.3.1 Key exchange . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59 3.4 DS8000 disk encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60 3.4.1 Encryption key management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62 3.4.2 Encryption deadlock . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67 3.4.3 Encryption recovery key support. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68 3.4.4 Dual platform key server support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70 3.5 Comparing tape encryption methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73 3.5.1 System-Managed Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74 3.5.2 Library-Managed Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77 3.5.3 Encrypting and decrypting with SME and LME . . . . . . . . . . . . . . . . . . . . . . . . . . . 79 3.5.4 Application-Managed Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81 3.5.5 Mixed mode example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84 Chapter 4. IBM System Storage tape automation for encryption . . . . . . . . . . . . . . . . . 87 4.1 IBM System Storage TS1130 and TS1120 tape drive . . . . . . . . . . . . . . . . . . . . . . . . . 88 4.1.1 Tape data encryption support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89 4.1.2 TS1120 characteristics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89 4.1.3 TS1130 characteristics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91 4.1.4 3592 cartridges and media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93 4.2 IBM System Storage TS1120 Tape Controller . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95 4.2.1 IBM TS1120 Tape Controller characteristics . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96 4.2.2 IBM TS1120 Tape Controller encryption support . . . . . . . . . . . . . . . . . . . . . . . . . 97 4.2.3 Installation with an IBM TS3500 Tape Library . . . . . . . . . . . . . . . . . . . . . . . . . . . 97 4.2.4 Installation with an IBM TS3400 Tape Library . . . . . . . . . . . . . . . . . . . . . . . . . . . 99 4.2.5 Installation with an IBM 3494 Tape Library . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100 4.2.6 IBM TotalStorage 3592 Model J70 Tape Controller . . . . . . . . . . . . . . . . . . . . . . 101 4.3 IBM Virtualization Engine TS7700 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102 4.4 IBM LTO Ultrium tape drives and libraries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104 4.4.1 Linear Tape-Open overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105 4.4.2 LTO media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106 4.4.3 IBM System Storage TS2240 Tape Drive Express Model . . . . . . . . . . . . . . . . . 108 4.4.4 IBM System Storage TS2340 Tape Drive Express Model . . . . . . . . . . . . . . . . . 109 4.4.5 IBM System Storage TS1040 Tape Drive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110 4.4.6 IBM System Storage TS2900 Tape Autoloader . . . . . . . . . . . . . . . . . . . . . . . . . 111 4.4.7 IBM System Storage TS3100 Tape Library . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111 4.4.8 IBM System Storage TS3200 Tape Library . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113 4.4.9 IBM System Storage TS3310 Tape Library . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115 4.5 IBM System Storage TS3400 Tape Library . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118 4.6 IBM System Storage TS3500 Tape Library . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120 4.6.1 TS3500 frames . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121 4.6.2 TS3500 characteristics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124 4.7 IBM TotalStorage 3494 Tape Library . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131 Chapter 5. Full Disk Encryption technology in disk subsystems. . . . . . . . . . . . . . . . 133 5.1 FDE fundamentals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134 5.2 Hardware implementation details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135 5.3 FDE disks in storage products . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136 Part 2. IBM System Storage DS5000 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139 Chapter 6. Understanding Full Disk Encryption in DS5000 . . . . . . . . . . . . . . . . . . . . 141 6.1 FDE disk drives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142 6.1.1 Securing data against a breach . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142 6.2 Creating a security key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143 iv IBM System Storage Data Encryption
  • 7. 6.3 Changing a security key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144 6.4 Security key identifier . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144 6.5 Unlocking secure drives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148 6.6 Secure erase . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149 6.7 FDE security authorizations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149 6.8 FDE key terms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151 Chapter 7. Configuring encryption on DS5000 with Full Disk Encryption drives . . . 153 7.1 The need for encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154 7.1.1 Encryption method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154 7.2 Disk Security components. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156 7.2.1 DS5000 Disk Encryption Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156 7.2.2 Full Data Encryption disks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157 7.2.3 Premium feature license . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157 7.2.4 Keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157 7.2.5 Security key identifier . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157 7.2.6 Passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158 7.3 Setting up and enabling the Secure Disk feature . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159 7.3.1 FDE and the premium feature key check . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159 7.3.2 Secure key creation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160 7.3.3 Enable disk security on the array . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162 7.4 Additional secure disk functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163 7.4.1 Changing the security key. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164 7.4.2 Saving the security key file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165 7.4.3 Secure disk erase . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166 7.4.4 FDE drive status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167 7.4.5 Hot-spare drive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167 7.4.6 Log files. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168 7.5 Migrating secure disk arrays . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168 7.5.1 Planning checklist . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169 7.5.2 Export the array . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169 7.6 Import secure drive array . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172 7.6.1 Unlock drives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173 7.6.2 Import array. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174 Chapter 8. DS5000 Full Disk Encryption best practices . . . . . . . . . . . . . . . . . . . . . . . 177 8.1 Physical asset protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178 8.2 Data backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179 8.3 FDE drive security key and the security key file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179 8.4 DS subsystem controller shell remote login . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181 8.5 Working with Full Disk Encryption drives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181 8.6 Replacing controllers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182 8.7 Storage industry standards and practices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182 Chapter 9. Frequently asked questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183 9.1 Securing arrays . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 184 9.2 Secure erase . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 184 9.3 Security keys and passphrases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185 9.4 Premium features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185 9.5 Global hot-spare drives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186 9.6 Boot support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186 9.7 Locked and unlocked states . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187 9.8 Backup and recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187 9.9 Additional questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187 Contents v
  • 8. Part 3. Implementing tape data encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189 Chapter 10. Planning for software and hardware to support tape drives . . . . . . . . . 191 10.1 Encryption planning. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192 10.2 Planning assumptions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192 10.3 Encryption planning quick-reference tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193 10.4 Choosing encryption methods. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196 10.4.1 Encryption method comparison. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197 10.4.2 System z encryption methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197 10.4.3 Open systems encryption methods. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198 10.4.4 Decision time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199 10.5 Solutions available by operating system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199 10.5.1 The z/OS solution components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199 10.5.2 z/VM, z/VSE, and z/TPF solution components for TS1120 drives . . . . . . . . . . 202 10.5.3 IBM System i encryption solution components . . . . . . . . . . . . . . . . . . . . . . . . . 204 10.5.4 AIX solution components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206 10.5.5 Linux on System z. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209 10.5.6 Linux on System p, System x, and other Intel or AMD Opteron servers. . . . . . 210 10.5.7 HP-UX, Sun, and Microsoft Windows components. . . . . . . . . . . . . . . . . . . . . . 213 10.5.8 Tivoli Storage Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216 10.6 Ordering information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216 10.6.1 TS1120 tape drive prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216 10.6.2 Tape controller prerequisites. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 218 10.6.3 LTO4 and LTO5 tape drive prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 219 10.6.4 Tape library prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 220 10.6.5 Other library and rack open systems installations. . . . . . . . . . . . . . . . . . . . . . . 222 10.6.6 TS7700 Virtualization Engine prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . 222 10.6.7 General software prerequisites for encryption . . . . . . . . . . . . . . . . . . . . . . . . . 223 10.6.8 TS1120 and TS1130 supported platforms . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224 10.6.9 IBM LTO4 and LTO5 tape drive supported platforms . . . . . . . . . . . . . . . . . . . . 225 10.7 Other planning considerations for tape data encryption . . . . . . . . . . . . . . . . . . . . . . 226 10.7.1 In-band and out-of-band . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 226 10.7.2 Performance considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227 10.7.3 Encryption with other backup applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227 10.7.4 ALMS and encryption in the TS3500 library . . . . . . . . . . . . . . . . . . . . . . . . . . . 228 10.7.5 TS1120 and TS1130 rekeying considerations . . . . . . . . . . . . . . . . . . . . . . . . . 229 10.8 Upgrade and migration considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230 10.8.1 Potential issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230 10.8.2 TS1120 and TS1130 compatibility considerations . . . . . . . . . . . . . . . . . . . . . . 231 10.8.3 DFSMSdss host-based encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235 10.8.4 Positioning TS1120 Tape Encryption and Encryption Facility for z/OS . . . . . . 236 Chapter 11. Planning for Tivoli Key Lifecycle Manager and its keystores. . . . . . . . . 237 11.1 Tivoli Key Lifecycle Manager planning quick reference . . . . . . . . . . . . . . . . . . . . . . 238 11.2 Tivoli Key Lifecycle Manager and keystore considerations. . . . . . . . . . . . . . . . . . . . 241 11.2.1 Tivoli Key Lifecycle Manager configuration planning checklist . . . . . . . . . . . . . 244 11.3 Working with keys and certificates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245 11.3.1 IT Service Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245 11.3.2 General security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 246 11.3.3 Tivoli Key Lifecycle Manager key server availability . . . . . . . . . . . . . . . . . . . . . 246 11.3.4 Encryption deadlock prevention for DS8000. . . . . . . . . . . . . . . . . . . . . . . . . . . 247 11.3.5 Tivoli Key Lifecycle Manager key server. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 247 11.3.6 DS8000 and tape devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 248 vi IBM System Storage Data Encryption
  • 9. 11.4 Multiple Tivoli Key Lifecycle Managers for redundancy . . . . . . . . . . . . . . . . . . . . . . 249 11.4.1 Setting up primary and secondary Tivoli Key Lifecycle Manager servers. . . . . 250 11.4.2 Synchronizing primary and secondary Tivoli Key Lifecycle Manager servers . 250 11.5 Backup and restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 251 11.5.1 Categories of data in a backup file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 251 11.5.2 Backup file security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 252 11.5.3 IBM Tivoli Storage Manager as a backup repository . . . . . . . . . . . . . . . . . . . . 252 11.5.4 Backup and restore runtime requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . 252 11.5.5 Backing up critical files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 253 11.5.6 Restoring a backup file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 254 11.5.7 Deleting a backup file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256 11.6 Key exporting and importing tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256 11.6.1 Exporting keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256 11.6.2 Importing keys. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257 11.6.3 Importing the public key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 258 11.6.4 Exporting the public key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 258 11.7 Integration and EKM to Tivoli Key Lifecycle Manager migration . . . . . . . . . . . . . . . . 259 11.7.1 Integrating Tivoli Key Lifecycle Manager for DS8000 with an existing EKM tape encryption installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 259 11.7.2 Migrating from EKM to Tivoli Key Lifecycle Manager . . . . . . . . . . . . . . . . . . . . 259 11.7.3 Multiple encrypted disk or tape devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 260 11.8 Data exchange with business partners . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261 11.9 Disaster recovery considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 262 11.10 Database selection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263 Chapter 12. Implementing Tivoli Key Lifecycle Manager . . . . . . . . . . . . . . . . . . . . . . 265 12.1 Implementation notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 266 12.2 Installing Tivoli Key Lifecycle Manager on 64-bit Windows Server 2008 . . . . . . . . . 266 12.3 Installing Tivoli Key Lifecycle Manager on 64-bit Red Hat Enterprise Linux AS Version 5.3 server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 299 12.4 Installing Tivoli Key Lifecycle Manager on z/OS . . . . . . . . . . . . . . . . . . . . . . . . . . . . 329 12.5 Configuring Tivoli Key Lifecycle Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 335 12.5.1 Configuration forLTO4 and TS1100 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 339 12.5.2 Configuration for DS8000 disk drives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 348 12.6 Conclusions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 351 Chapter 13. Tivoli Key Lifecycle Manager operational considerations . . . . . . . . . . . 353 13.1 Scripting with Tivoli Key Lifecycle Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 354 13.1.1 Simple Linux backup script example. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 354 13.2 Synchronizing primary Tivoli Key Lifecycle Manager configuration data . . . . . . . . . 355 13.2.1 Setting up primary and secondary Tivoli Key Lifecycle Manager servers. . . . . 355 13.2.2 Synchronizing primary and secondary Tivoli Key Lifecycle Manager servers . 356 13.3 Tivoli Key Lifecycle Manager maintenance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 357 13.3.1 General disk and tape management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 357 13.3.2 Adding and removing drives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 359 13.3.3 Scheduling key group rollover for LTO tape drives . . . . . . . . . . . . . . . . . . . . . . 364 13.3.4 Scheduling certificate rollover for 3592 tape . . . . . . . . . . . . . . . . . . . . . . . . . . . 368 13.4 Tivoli Key Lifecycle Manager backup and restore procedures . . . . . . . . . . . . . . . . . 371 13.4.1 Using the GUI to back up . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 372 13.4.2 Restore by using the GUI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 373 13.4.3 Backing up by using the command line. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 376 13.4.4 Restore by using the command line . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 377 13.5 Data sharing with business partners . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 378 Contents vii
  • 10. 13.5.1 Sharing TS1100 certificate data with a business partner . . . . . . . . . . . . . . . . . 379 13.5.2 Sharing LTO key data with a business partner . . . . . . . . . . . . . . . . . . . . . . . . . 381 13.6 Removing Tivoli Key Lifecycle Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 384 13.6.1 Backing up the keystore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 385 13.7 Fixing the security warnings in your web browser. . . . . . . . . . . . . . . . . . . . . . . . . . . 385 13.7.1 Fixing the security warning in Internet Explorer browser . . . . . . . . . . . . . . . . . 385 13.7.2 Fixing the security warning in Firefox 2. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 386 13.8 The Tivoli Key Lifecycle Manager command-line interface . . . . . . . . . . . . . . . . . . . . 386 13.8.1 Commands using wsadmin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 386 13.8.2 Tivoli Key Lifecycle Manager commands using wsadmin . . . . . . . . . . . . . . . . . 387 13.8.3 Setting a larger timeout interval for command processing . . . . . . . . . . . . . . . . 388 13.8.4 Syntax examples. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 388 13.8.5 Continuation character . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 388 13.8.6 Parameter error messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 389 13.8.7 Command summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 389 Chapter 14. Planning for Encryption Key Manager and its keystores . . . . . . . . . . . . 393 14.1 EKM planning quick-reference . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 394 14.2 Ordering information and requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 396 14.2.1 EKM on z/OS or z/OS.e requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 396 14.2.2 EKM on z/VM, z/VSE, and z/TPF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 397 14.2.3 EKM on IBM System i requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 397 14.2.4 EKM on AIX requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 398 14.2.5 EKM on Linux requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 399 14.2.6 EKM on Hewlett-Packard, Sun, and Windows requirements . . . . . . . . . . . . . . 399 14.3 EKM and keystore considerations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 400 14.3.1 EKM configuration planning checklist . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 402 14.3.2 Best security practices for working with keys and certificates. . . . . . . . . . . . . . 403 14.3.3 Acting on the advice . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 403 14.3.4 Typical EKM implementations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 404 14.3.5 Multiple EKMs for redundancy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 407 14.3.6 Using Virtual IP Addressing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 408 14.3.7 Key manager backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 409 14.3.8 FIPS 140-2 certification. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 409 14.4 Other EKM considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 410 14.4.1 EKM Release 1 to EKM Release 2 migration . . . . . . . . . . . . . . . . . . . . . . . . . . 410 14.4.2 Data exchange with business partners or other platforms . . . . . . . . . . . . . . . . 410 14.4.3 Disaster recovery considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 411 14.4.4 i5/OS disaster recovery considerations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 411 14.4.5 EKM performance considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 411 Chapter 15. Implementing the Encryption Key Manager. . . . . . . . . . . . . . . . . . . . . . . 413 15.1 Implementing EKM in z/OS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 414 15.1.1 z/OS UNIX System Services. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 414 15.1.2 Installing EKM in z/OS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 415 15.1.3 Security products involved: RACF, Top Secret, and ACF2. . . . . . . . . . . . . . . . 417 15.1.4 Create a JCE4758RACFKS for EKM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 418 15.1.5 Setting up the EKM environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 420 15.1.6 Starting EKM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 423 15.1.7 Additional definitions of hardware keystores for z/OS. . . . . . . . . . . . . . . . . . . . 428 15.1.8 Virtual IP Addressing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 429 15.1.9 EKM TCP/IP configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 430 15.2 Installing EKM on AIX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 431 viii IBM System Storage Data Encryption
  • 11. 15.2.1 Install the IBM Software Developer Kit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 431 15.3 Installing EKM on a Microsoft Windows platform . . . . . . . . . . . . . . . . . . . . . . . . . . . 436 15.3.1 EKM setup tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 437 15.3.2 Installing the IBM Software Developer Kit on Microsoft Windows. . . . . . . . . . . 438 15.3.3 Starting EKM on Microsoft Windows. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 443 15.3.4 Configuring and starting EKM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 444 15.4 Installing EKM in i5/OS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 450 15.4.1 New installation of the Encryption Key Manager. . . . . . . . . . . . . . . . . . . . . . . . 450 15.4.2 Upgrading the Encryption Key Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 453 15.4.3 Configuring EKM for tape data encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . 455 15.5 Implementing LTO4 and LTO5 encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 458 15.5.1 LTO4 EKM implementation checklist . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 459 15.5.2 Download the latest EKM software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 459 15.5.3 Create a JCEKS keystore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 463 15.5.4 Off-site or business partner exchange with LTO4 compared to 3592. . . . . . . . 466 15.5.5 EKM Version 2 installation and customization on Microsoft Windows . . . . . . . 467 15.5.6 Starting EKM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 469 15.5.7 Starting EKM as a Microsoft Windows Service . . . . . . . . . . . . . . . . . . . . . . . . . 470 15.6 Implementing LTO4 and LTO5 Library-Managed Encryption . . . . . . . . . . . . . . . . . . 472 15.6.1 Barcode Encryption Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 472 15.6.2 Specifying a Barcode Encryption Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 475 15.6.3 TS3500 Library-Managed Encryption differences from TS3310, TS3200, TS3100, and TS2900 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 479 15.7 LTO4 or LTO5 System-Managed Encryption implementation. . . . . . . . . . . . . . . . . . 480 15.7.1 LTO4 SME implementation checklist for Windows . . . . . . . . . . . . . . . . . . . . . . 480 Chapter 16. Planning and managing your keys with Encryption Key Manager . . . . 481 16.1 Keystore and SAF Digital Certificates (keyrings) . . . . . . . . . . . . . . . . . . . . . . . . . . . 482 16.2 JCEKS. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 482 16.2.1 Examples of managing public-private key pairs . . . . . . . . . . . . . . . . . . . . . . . . 483 16.2.2 Managing symmetric keys in a JCEKS keystore. . . . . . . . . . . . . . . . . . . . . . . . 486 16.2.3 Example using iKeyman . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 490 16.3 JCE4758KS and JCECCAKS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 497 16.3.1 Script notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 497 16.3.2 Symmetric keys in a JCECCAKS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 499 16.4 JCERACFKS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 500 16.5 JCE4758RACFKS and JCECCARACFKS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 502 16.5.1 RACDCERT keywords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 503 16.5.2 Best practice . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 505 16.6 PKCS#11 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 506 16.7 IBMi5OSKeyStore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 506 16.7.1 Digital Certificate Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 507 16.7.2 Setting up an IBMi5OSKeyStore. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 507 16.8 ShowPrivateTool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 522 16.9 MatchKeys tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 524 16.10 Hardware cryptography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 527 Chapter 17. Encryption Key Manager operational considerations. . . . . . . . . . . . . . . 531 17.1 EKM commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 532 17.1.1 The EKM sync command and EKM properties file . . . . . . . . . . . . . . . . . . . . . . 532 17.1.2 EKM command-line interface and command set . . . . . . . . . . . . . . . . . . . . . . . 533 17.2 Backup procedures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 538 17.2.1 EKM file system backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 538 Contents ix
  • 12. 17.2.2 Identifying DFSMShsm to z/OS UNIX System Services . . . . . . . . . . . . . . . . . . 540 17.2.3 Keystore backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 540 17.2.4 RACF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 541 17.3 ICSF disaster recovery procedures. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 542 17.3.1 Key recovery checklist . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 542 17.3.2 Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 543 17.3.3 Pre-key change: All LPARs in the sysplex . . . . . . . . . . . . . . . . . . . . . . . . . . . . 543 17.3.4 Check the ICSF installation options data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 546 17.3.5 Disable all services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 547 17.3.6 Entering master keys for all LPARs in the sysplex . . . . . . . . . . . . . . . . . . . . . . 548 17.3.7 Post-key change for all LPARs in the sysplex. . . . . . . . . . . . . . . . . . . . . . . . . . 553 17.3.8 Exiting disaster recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 554 17.4 Business partner tape-sharing example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 554 17.4.1 Key-sharing steps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 554 17.4.2 Exporting a public key and certificate to a business partner . . . . . . . . . . . . . . . 555 17.4.3 Exporting a symmetric key from a JCEKS keystore . . . . . . . . . . . . . . . . . . . . . 559 17.4.4 Importing a public key and a certificate from a business partner . . . . . . . . . . . 559 17.4.5 Tape exchange and verification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 561 17.4.6 Importing symmetric keys to a JCEKS keystore . . . . . . . . . . . . . . . . . . . . . . . . 563 17.5 RACF export tool for z/OS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 563 17.6 Audit log considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 564 17.6.1 Audit overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 565 17.6.2 Audit log parsing tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 565 Chapter 18. Implementing TS1100 series encryption in System z . . . . . . . . . . . . . . . 571 18.1 Implementation overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 572 18.2 Implementation prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 572 18.2.1 Implementing the initial tape library hardware. . . . . . . . . . . . . . . . . . . . . . . . . . 573 18.2.2 Initial z/OS software definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 574 18.3 EKM implementation overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 575 18.4 Implementing the tape library . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 576 18.4.1 Implementation steps for the IBM TS3500 Tape Library. . . . . . . . . . . . . . . . . . 576 18.4.2 Implementation steps for the IBM 3494 Tape Library . . . . . . . . . . . . . . . . . . . . 579 18.4.3 Implementation steps for the IBM TS3400 Tape Library. . . . . . . . . . . . . . . . . . 583 18.5 Implementing the tape control unit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 585 18.6 z/OS implementation steps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 585 18.6.1 z/OS software maintenance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 586 18.6.2 Update PARMLIB member IECIOSxx. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 586 18.6.3 Define or update Data Class definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 587 18.6.4 Considerations for JES3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 591 18.6.5 Tape management system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 592 18.6.6 DFSMSrmm support for tape data encryption. . . . . . . . . . . . . . . . . . . . . . . . . . 592 18.6.7 DFSMSdfp access method service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 596 18.6.8 Data Facility Data Set Services considerations . . . . . . . . . . . . . . . . . . . . . . . . 597 18.6.9 DFSMS Hierarchal Storage Manager considerations . . . . . . . . . . . . . . . . . . . . 598 18.7 z/VM implementation steps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 599 18.7.1 Tape library and tape control unit implementation . . . . . . . . . . . . . . . . . . . . . . 600 18.7.2 Out-of-band encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 600 18.7.3 Defining key aliases to z/VM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 604 18.7.4 Using ATTACH and DETACH to control encryption . . . . . . . . . . . . . . . . . . . . . 605 18.7.5 Using SET RDEVICE to control encryption. . . . . . . . . . . . . . . . . . . . . . . . . . . . 606 18.7.6 QUERY responses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 606 18.7.7 z/VM DASD Dump Restore (DDR) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 607 x IBM System Storage Data Encryption
  • 13. 18.8 Miscellaneous implementation considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 607 18.8.1 Data exchange with other data centers or business partners . . . . . . . . . . . . . . 607 18.8.2 Availability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 608 18.9 TS1120 and TS1130 tape cartridge rekeying in z/OS. . . . . . . . . . . . . . . . . . . . . . . . 608 18.9.1 TS1120 Model E05 rekeying support in z/OS . . . . . . . . . . . . . . . . . . . . . . . . . . 608 18.9.2 IEHINITT enhancements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 609 18.9.3 Security considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 612 18.9.4 Packaging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 612 18.9.5 Rekeying exits and messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 612 Chapter 19. Implementing TS7700 tape encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . 613 19.1 TS7700 encryption overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 614 19.2 Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 615 19.2.1 Tape drives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 615 19.2.2 TS7700 Virtualization Engine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 615 19.2.3 Library Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 615 19.2.4 Encryption Key Manager. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 615 19.3 Implementation overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 616 19.3.1 Implementing the initial tape library hardware. . . . . . . . . . . . . . . . . . . . . . . . . . 616 19.3.2 Implementing the initial TS7700 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 616 19.3.3 Initial z/OS software definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 617 19.3.4 EKM implementation overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 617 19.4 Tape library implementation and setup for encryption . . . . . . . . . . . . . . . . . . . . . . . 617 19.4.1 Enabling drives for encryption in the IBM TS3500 Tape Library. . . . . . . . . . . . 618 19.4.2 Enabling drives for encryption in the IBM 3494 Tape Library . . . . . . . . . . . . . . 620 19.4.3 Encryption-enabled drives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 623 19.5 Software implementation steps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 623 19.5.1 z/OS software maintenance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 623 19.5.2 Encryption Key Manager installation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 623 19.5.3 z/OS DFSMS implementation steps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 623 19.6 TS7700 implementation steps. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 624 19.6.1 Configuring the TS7700 for encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 624 19.6.2 Creating TS7700 storage groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 626 19.6.3 Creating TS7700 management classes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 627 19.6.4 Activate the TS7700 Encryption Feature License . . . . . . . . . . . . . . . . . . . . . . . 629 19.6.5 EKM addresses. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 631 19.6.6 Testing EKM connectivity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 632 19.6.7 Configuring pool encryption settings for the TS7700 . . . . . . . . . . . . . . . . . . . . 632 19.7 Implementation considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 634 19.7.1 Management construct definitions and transfer . . . . . . . . . . . . . . . . . . . . . . . . 634 19.7.2 Changing storage pool encryption settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . 634 19.7.3 Moving data to encrypted storage pools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 635 19.7.4 EKM operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 637 19.7.5 Tracking encryption usage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 638 19.7.6 Data exchange with other data centers or business partners . . . . . . . . . . . . . . 638 19.8 TS7700 encryption with z/VM, z/VSE, or z/TPF . . . . . . . . . . . . . . . . . . . . . . . . . . . . 638 Chapter 20. Implementing TS1120 and TS1130 encryption in an open systems environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 641 20.1 Encryption overview in an open systems environment . . . . . . . . . . . . . . . . . . . . . . . 642 20.2 Adding drives to a logical library . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 643 20.2.1 Advanced Library Management System considerations . . . . . . . . . . . . . . . . . . 643 20.3 Managing the encryption and business partner exchange . . . . . . . . . . . . . . . . . . . . 644 20.3.1 Disaster recovery considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 646 Contents xi
  • 14. 20.3.2 Keeping track of key usage. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 647 20.4 Encryption implementation checklist . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 648 20.4.1 Planning your EKM environment. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 648 20.4.2 EKM setup tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 649 20.4.3 Application-Managed Encryption setup tasks . . . . . . . . . . . . . . . . . . . . . . . . . . 649 20.4.4 System-Managed (Atape) Encryption setup tasks . . . . . . . . . . . . . . . . . . . . . . 650 20.4.5 Library-Managed Encryption setup tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 651 20.5 Implementing Library-Managed Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 651 20.5.1 LME implementation tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 651 20.5.2 Upgrading firmware. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 652 20.5.3 Add EKM or Tivoli Key Lifecycle Manager IP addresses . . . . . . . . . . . . . . . . . 658 20.5.4 Enabling Library-Managed Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 659 20.5.5 Barcode Encryption Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 662 20.6 Implementing System-Managed Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 668 20.6.1 System-Managed Encryption tasks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 669 20.6.2 Atape device driver . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 670 20.6.3 Update Atape EKM proxy configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 670 20.6.4 System-Managed Encryption Atape device entries . . . . . . . . . . . . . . . . . . . . . 672 20.6.5 Updating the Atape device driver configuration . . . . . . . . . . . . . . . . . . . . . . . . 673 20.6.6 Enabling System-Managed Encryption using the TS3500 web GUI. . . . . . . . . 674 20.6.7 Using SMIT to enable System-Managed Encryption . . . . . . . . . . . . . . . . . . . . 676 20.6.8 Managing System-Managed Encryption and business partner exchange . . . . 683 20.7 Application-Managed Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 686 20.7.1 IBM Tivoli Storage Manager overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 686 20.7.2 IBM Tivoli Storage Manager support for 3592 drive encryption . . . . . . . . . . . . 687 20.7.3 Implementing Application-Managed Encryption . . . . . . . . . . . . . . . . . . . . . . . . 688 20.7.4 IBM Tivoli Storage Manager encryption considerations . . . . . . . . . . . . . . . . . . 691 20.8 IBM 3494 with TS1120 or TS1130 encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 692 20.8.1 Review the 3494 encryption-capable drives . . . . . . . . . . . . . . . . . . . . . . . . . . . 692 20.8.2 Specifying a Barcode Encryption Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 696 20.8.3 Entering the EKM IP address and key labels . . . . . . . . . . . . . . . . . . . . . . . . . . 698 20.8.4 ILEP key label mapping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 699 Chapter 21. Tape data encryption with i5/OS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 701 21.1 Planning for tape data encryption with i5/OS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 702 21.1.1 Hardware prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 702 21.1.2 Software prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 703 21.1.3 Disaster recovery considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 704 21.1.4 EKM keystore considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 705 21.1.5 TS1120 Tape Encryption policy considerations . . . . . . . . . . . . . . . . . . . . . . . . 706 21.1.6 Considerations for sharing tapes with partners. . . . . . . . . . . . . . . . . . . . . . . . . 707 21.1.7 Steps for implementing tape encryption with i5/OS . . . . . . . . . . . . . . . . . . . . . 709 21.2 Setup and usage of tape data encryption with i5/OS . . . . . . . . . . . . . . . . . . . . . . . . 709 21.2.1 Creating an EKM keystore and certificate. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 710 21.2.2 Configuring the TS3500 library for Library-Managed Encryption . . . . . . . . . . . 722 21.2.3 Importing and exporting encryption keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 732 21.2.4 Working with encrypted tape cartridges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 744 21.2.5 Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 749 Part 4. DS8000 encryption features. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 751 Chapter 22. IBM System Storage DS8000 encryption preparation. . . . . . . . . . . . . . . 753 22.1 Encryption-capable DS8000 ordering and configuration. . . . . . . . . . . . . . . . . . . . . . 754 22.2 Requirements for encrypting storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 755 xii IBM System Storage Data Encryption
  • 15. 22.3 Tivoli Key Lifecycle Manager configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 756 22.3.1 Log in to Tivoli Integrated Portal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 756 22.3.2 Creating an image certificate or certificate request. . . . . . . . . . . . . . . . . . . . . . 757 22.3.3 Configure the SFIs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 761 22.3.4 Starting and stopping the Tivoli Key Lifecycle Manager server and determining its status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 765 22.4 Configuring the Tivoli Key Lifecycle Manager server connections to the DS8000 . . 767 Chapter 23. DS8000 encryption features and implementation . . . . . . . . . . . . . . . . . . 771 23.1 DS8100/DS8300 (R4.2) GUI configuration for encryption . . . . . . . . . . . . . . . . . . . . 772 23.1.1 Configuring the encryption group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 772 23.1.2 Applying the encryption activation key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 773 23.1.3 Configuring and administering encrypted arrays. . . . . . . . . . . . . . . . . . . . . . . . 776 23.1.4 Configuring and administering encrypted ranks . . . . . . . . . . . . . . . . . . . . . . . . 780 23.1.5 Configuring and administering encrypted extent pools . . . . . . . . . . . . . . . . . . . 783 23.2 DS8700 (R5.0) GUI configuration for encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . 788 23.2.1 Configuring the recovery key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 788 23.2.2 Configuring the encryption group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 792 23.2.3 Applying the encryption activation key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 794 23.2.4 Configuring and administering encrypted arrays. . . . . . . . . . . . . . . . . . . . . . . . 796 23.2.5 Configuring and administering encrypted ranks . . . . . . . . . . . . . . . . . . . . . . . . 798 23.2.6 Configuring and administering encrypted extent pools . . . . . . . . . . . . . . . . . . . 801 23.3 DS8000 DS CLI configuration for encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 804 23.3.1 Configuring the Tivoli Key Lifecycle Manager server connection . . . . . . . . . . . 804 23.3.2 Configuring and administering the encryption group. . . . . . . . . . . . . . . . . . . . . 806 23.3.3 Applying encryption activation key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 807 23.3.4 Creating encrypted arrays. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 807 23.3.5 Creating encrypted ranks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 808 23.3.6 Creating encrypted extent pools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 809 23.4 Encryption and Copy Services functions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 810 Chapter 24. DS8700 advanced encryption features and implementation . . . . . . . . . 811 24.1 New security roles: Storage and security administrator . . . . . . . . . . . . . . . . . . . . . . 812 24.2 Recovery key support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 814 24.2.1 Configuring the recovery key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 814 24.2.2 Validating the recovery key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 818 24.2.3 Initiating recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 820 24.2.4 Using the process to rekey the recovery key . . . . . . . . . . . . . . . . . . . . . . . . . . 826 24.2.5 Deleting the recovery key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 830 24.2.6 Recovery key state summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 833 24.3 Dual platform key server support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 833 24.3.1 Setting up Tivoli Key Lifecycle Manager server . . . . . . . . . . . . . . . . . . . . . . . . 833 Chapter 25. Best practices and guidelines for DS8000 encryption . . . . . . . . . . . . . . 845 25.1 Best practices for encrypting storage environments . . . . . . . . . . . . . . . . . . . . . . . . . 846 25.1.1 Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 846 25.1.2 Availability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 846 25.1.3 Encryption deadlock prevention . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 847 25.2 Dual Hardware Management Console and redundancy . . . . . . . . . . . . . . . . . . . . . . 850 25.2.1 Dual Hardware Management Console advantages . . . . . . . . . . . . . . . . . . . . . 850 25.2.2 Redundant HMC configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 850 25.3 Multiple Tivoli Key Lifecycle Managers for redundancy . . . . . . . . . . . . . . . . . . . . . . 852 25.3.1 Setting up primary and secondary Tivoli Key Lifecycle Manager servers. . . . . 853 25.3.2 Synchronizing primary and secondary Tivoli Key Lifecycle Manager servers . 853 Contents xiii
  • 16. 25.4 Backup and restore the Tivoli Key Lifecycle Manager servers . . . . . . . . . . . . . . . . . 853 25.4.1 Categories of data in a backup file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 854 25.4.2 Backup file security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 854 25.4.3 IBM Tivoli Storage Manager as a backup repository . . . . . . . . . . . . . . . . . . . . 854 25.4.4 Backup and restore runtime requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . 854 25.4.5 Backing up critical files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 855 25.4.6 Restoring a backup file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 856 25.4.7 Deleting a backup file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 858 25.5 Key exporting and importing tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 858 25.5.1 Exporting keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 859 25.5.2 Importing keys. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 859 Appendix A. z/OS planning and implementation checklists . . . . . . . . . . . . . . . . . . . . 863 DFSMS Systems Managed Tape planning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 864 DFSMS planning and the z/OS encryption planning checklist . . . . . . . . . . . . . . . . . . . 864 Storage administrator stand-alone environment planning. . . . . . . . . . . . . . . . . . . . . . . 865 Storage administrator tape library environment planning . . . . . . . . . . . . . . . . . . . . . . . 866 DFSMS Systems Managed Tape implementation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 867 Object access method planning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 869 Storage administrator OAM planning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 869 OAM implementation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 870 DFSMShsm tape environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 871 Appendix B. DS8700 encryption-related system reference codes . . . . . . . . . . . . . . . 873 Appendix C. z/OS Java and Open Edition tips . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 877 JZOS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 878 Console communication with batch jobs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 878 Encryption Key Manager and JZOS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 879 MVS Open Edition tips . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 882 Exporting a variable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 882 Setting up an alias . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 882 Copying the escape character . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 883 Advantages of VT100 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 884 Advanced security hwkeytool and keytool scripts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 885 Complete keytool example for JCEKS using hidden passwords . . . . . . . . . . . . . . . . . 885 Complete hwkeytool example for JCE4758KS using hidden passwords . . . . . . . . . . . 887 Java . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 889 Security and providers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 889 Garbage Collector . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 890 Verifying the installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 891 z/OS region size . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 891 Policy files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 891 Appendix D. Asymmetric and Symmetric Master Key change procedures . . . . . . . . 893 Asymmetric Master Key change ceremony . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 894 Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 894 Testing encryption and decryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 894 Pre-key change: Disabling PKA services for all images in the sysplex. . . . . . . . . . . . . 894 Key change: First LPAR in the sysplex . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 896 Key change: Subsequent LPARs in the sysplex . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 902 Post-key change: All LPARs in the sysplex . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 906 ICSF tips . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 910 Creating a PKDS VSAM data set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 910 xiv IBM System Storage Data Encryption
  • 17. Symmetric Master Key change ceremony . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 911 Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 912 Testing the encryption and decryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 912 Disabling dynamic CKDS updates for all images in the sysplex . . . . . . . . . . . . . . . . . . 912 Key change: First LPAR in the sysplex . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 913 Reenciphering the CKDS under the new SYM-MK. . . . . . . . . . . . . . . . . . . . . . . . . . . . 919 Changing the new SYM-MK and activating the re-enciphered CKDS . . . . . . . . . . . . . 921 Key change: Subsequent LPARs in the sysplex . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 922 Post-key change: All LPARs in the sysplex . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 925 Appendix E. z/OS tape data encryption diagnostics . . . . . . . . . . . . . . . . . . . . . . . . . . 931 EKM problem determination when running z/OS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 932 Error scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 932 Diagnostic scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 935 Encryption Key Manager error codes and recovery actions. . . . . . . . . . . . . . . . . . . . . . . . 938 Drive error codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 940 Control unit error codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 941 IOS628E message indicates connection failure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 942 Appendix F. IEHINITT exits and messages for rekeying . . . . . . . . . . . . . . . . . . . . . . . 943 Dynamic Exits Service Facility support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 944 Error conditions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 944 Programming considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 945 REKEY messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 945 New messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 946 Modified messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 946 Appendix G. Implementing EKM on z/OS SECURE key processing to TS1100 and LTO4/LTO5 drives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 949 Implementing EKM in z/OS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 950 Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 950 z/OS UNIX System Services. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 950 Installing the Encryption Key Manager in z/OS. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 951 Create a JCECCAKS for EKM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 953 Setting up the EKM environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 954 Starting EKM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 957 Configuring EKM TCP/IP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 962 Enterprise-wide key management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 964 Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 964 Appendix H. Encryption testing in an open systems environment . . . . . . . . . . . . . . 965 Encryption key path test . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 966 Using key path diagnostics in an LME environment . . . . . . . . . . . . . . . . . . . . . . . . . . . 966 Key Path Diagnostic test in a SME environment. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 969 Testing data encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 973 IBM Tape Diagnostic Tool. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 973 Encryption Verification test using the ITDT-GE. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 973 Encryption verification using the ITDT-SE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 978 Encryption test using the device driver functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 979 Related publications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 985 IBM Redbooks publications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 985 Other publications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 985 Online resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 987 Contents xv
  • 18. How to get IBM Redbooks publications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 988 Help from IBM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 988 Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 991 xvi IBM System Storage Data Encryption
  • 19. Notices This information was developed for products and services offered in the U.S.A. IBM may not offer the products, services, or features discussed in this document in other countries. Consult your local IBM representative for information on the products and services currently available in your area. Any reference to an IBM product, program, or service is not intended to state or imply that only that IBM product, program, or service may be used. Any functionally equivalent product, program, or service that does not infringe any IBM intellectual property right may be used instead. However, it is the user's responsibility to evaluate and verify the operation of any non-IBM product, program, or service. IBM may have patents or pending patent applications covering subject matter described in this document. The furnishing of this document does not give you any license to these patents. You can send license inquiries, in writing, to: IBM Director of Licensing, IBM Corporation, North Castle Drive, Armonk, NY 10504-1785 U.S.A. The following paragraph does not apply to the United Kingdom or any other country where such provisions are inconsistent with local law: INTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES THIS PUBLICATION "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF NON-INFRINGEMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of express or implied warranties in certain transactions, therefore, this statement may not apply to you. This information could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these changes will be incorporated in new editions of the publication. IBM may make improvements and/or changes in the product(s) and/or the program(s) described in this publication at any time without notice. Any references in this information to non-IBM websites are provided for convenience only and do not in any manner serve as an endorsement of those websites. The materials at those websites are not part of the materials for this IBM product and use of those websites is at your own risk. IBM may use or distribute any of the information you supply in any way it believes appropriate without incurring any obligation to you. Information concerning non-IBM products was obtained from the suppliers of those products, their published announcements or other publicly available sources. IBM has not tested those products and cannot confirm the accuracy of performance, compatibility or any other claims related to non-IBM products. Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products. This information contains examples of data and reports used in daily business operations. To illustrate them as completely as possible, the examples include the names of individuals, companies, brands, and products. All of these names are fictitious and any similarity to the names and addresses used by an actual business enterprise is entirely coincidental. The following company name appearing in this publication is fictitious: ZABYXC This name is used for instructional purposes only. COPYRIGHT LICENSE: This information contains sample application programs in source language, which illustrate programming techniques on various operating platforms. You may copy, modify, and distribute these sample programs in any form without payment to IBM, for the purposes of developing, using, marketing or distributing application programs conforming to the application programming interface for the operating platform for which the sample programs are written. These examples have not been thoroughly tested under all conditions. IBM, therefore, cannot guarantee or imply reliability, serviceability, or function of these programs. © Copyright IBM Corp. 2010. All rights reserved. xvii