logo

IBM Systems IBM Z Mainframe Course

course overview

download outline

Select Country and City to View dates & book now

Overview

Organizations are compelled to find effective and cost-efficient data security solutions.

Encryption is one of the technologies that enables organizations to reduce the cost, impact and even likelihood of a breach. Encrypting data can help companies meet the stringent mandates of the GDPR, HIPAA and other mandates.

IBM z14 has been designed for pervasive encryption, enabling organizations to encrypt 100% of an organization’s IBM Z critical business data in-flight and at-rest, with no application changes and no impact to SLAs. Encrypting only the data required to meet compliance mandates should be considered a minimum threshold, not a best practice. IBM z14 makes pervasive encryption the new standard in data protection and the foundation of a larger data security and protection strategy.

z/OS is designed to provide new policy-based encryption options that take full advantage of the improvements in the z14 platform. These new capabilities include:

Data set encryption, which is one aspect of pervasive encryption, provides enhanced data protection for many z/OS data sets gives users the ability to encrypt data without needing to make changes to applications to embed encryption APIs within applications.

New z/OS policy controls which make it possible to use pervasive encryption to protect user data and simplify the task of compliance for many z/OS data sets, zFS file systems, and Coupling Facility structures.

Pervasive encryption for IBM Z® is a consumable approach to enable extensive encryption of data in-flight and at-rest to substantially simplify encryption and reduce costs associated with protecting data.

In this course you will learn how to implement Pervasive Encryption in your z/OS installation. The course explores in detail, the various technologies that are involved in z System and z/OS Cryptographic Services, ICSF, RACF and DFSMS access method Services.

In the hands-on exercises, you begin with the setup of your hardware crypto environment (CCA crypto express and CPACF), then you will load and activate your AES master keys, setup ICSF and its Key datasets (CKDS PKDS TKDS), then define your data encryption keys, activate your data set encryption policy, and encrypt your data sets and zFS filesystems.

These exercises reinforce the concepts and technologies being covered in the lectures.

Audience

This class is intended for z/OS system programmers and security specialists in charge of designing, implementing and monitoring Pervasive Encryption on z/OS.

Skills Gained

After completing this course, you should be able to:

    Describe the components of Pervasive Encryption on z/OS

    Explain the role of encryption for data protection

2

    Implement hardware crypto on your z System

    Load and activate AES Master Keys

    Implement and start ICSF

    Understand the differences between secure keys clear keys and protected keys

    Describe how are key values used for encryption and decryption

    Generate, maintain and manage Keys

    Setup access to key labels

    Setup policy to supply key label (RACF SMS JCL)

    Access data in encrypted data sets

    Create encrypted data sets - Supplying key labels

    Convert existing data sets to encryption

    Verify encryption status

    Encrypt Data in Transit

    Encrypt Data at Rest

    Manage data sets, data keys, and key labels

Prerequisites

  • General z/OS knowledge, including basic UNIX System Services skills
  • Basic knowledge of RACF
  • Curriculum relationship
  • o [ES66G]

Outline

    Describe the components of Pervasive Encryption on z/OS

    Explain the role of encryption for data protection

2

    Implement hardware crypto on your z System

    Load and activate AES Master Keys

    Implement and start ICSF

    Understand the differences between secure keys clear keys and protected keys

    Describe how are key values used for encryption and decryption

    Generate, maintain and manage Keys

    Setup access to key labels

    Setup policy to supply key label (RACF SMS JCL)

    Access data in encrypted data sets

    Create encrypted data sets - Supplying key labels

    Convert existing data sets to encryption

    Verify encryption status

    Encrypt Data in Transit

    Encrypt Data at Rest

    Manage data sets, data keys, and key labels

Talk to an expert

Thinking about Onsite?

If you need training for 3 or more people, you should ask us about onsite training. Putting aside the obvious location benefit, content can be customised to better meet your business objectives and more can be covered than in a public classroom. Its a cost effective option. One on one training can be delivered too, at reasonable rates.

Submit an enquiry from any page on this site and let us know you are interested in the requirements box, or simply mention it when we contact you.

All $ prices are in USD unless it’s a NZ or AU date

SPVC = Self Paced Virtual Class

LVC = Live Virtual Class

Please Note: All courses are availaible as Live Virtual Classes

Trusted by over 1/2 million students in 15 countries

Our clients have included prestigious national organisations such as Oxford University Press, multi-national private corporations such as JP Morgan and HSBC, as well as public sector institutions such as the Department of Defence and the Department of Health.