Encryption overview
IBM tape storage devices include options to encrypt data as it is written to a tape cartridge.
Encryption occurs at full line speed in the tape drive after compression. (Data is compressed more efficiently before it is encrypted.) This capability adds a strong measure of security to stored data without any processing usage and performance degradation.
- The encryption-capable tape drive
- Encryption capability means that they are functionally capable of hardware
encryption. All tape drives in the tape library are encryption-capable.
Note: Transparent LTO Encryption is standard with the tape library.
- Encryption policy
- Encryption policy is the method that is used to implement encryption. It includes the rules that govern which volumes are encrypted and the mechanism for key selection. How and where these rules are set up depends on the operating environment.
Drive specific details
Data is one of the most highly valued resources in a competitive business environment. Protecting that data, controlling access to it, and verifying its authenticity while its availability is maintained are priorities in our security-conscious world. Data encryption is a tool that answers many of these needs.
This capability adds a strong measure of security to stored data without the processing overhead and performance degradation that is associated with encryption that is completed on the server or at the expense of a dedicated appliance.
- The encryption-enabled tape drive
- All LTO Ultrium 4 and newer tape drives are encryption-capable. All EH7, EH8, 55F, 60F and 70F/70S tape drives are encryption-capable.
- Encryption key management
- Encryption involves the use of several kinds of keys, in successive layers. How these keys are generated, maintained, controlled, and transmitted depends upon the operating environment where the encrypting tape drive is installed. Some applications, such as Tivoli® Storage Manager, can run key management. For environments without such applications or those where application-independent encryption is wanted, IBM offers an encryption key server (such as the Tivoli Key Lifecycle Manager, or the IBM Security Key Lifecycle Manager for z/OS®)
- Encryption policy
- This is the method that is used to implement encryption. It includes the rules that govern which volumes are encrypted and the mechanism for key selection. How and where these rules are set up depends on the operating environment.
- IBM external key management
- The Encryption Key Manager can be used on the TS1120 and the TS1130 tape drives. However, it is not supported for TS1140 and later tape drives, and is no longer available for download. If changes to your encryption must be made, consider upgrading to the IBM Security Guardium Key Lifecycle Manager. Another IBM option is IBM Spectrum Protect.
how tosupport is also provided with customers who have a support line contract.