Pervasive Encryption for Data Volumes
This document describes an infrastructure for encrypting volumes using protected and secure keys for encrypting and decrypting data. This infrastructure for protected volume encryption provides end-to-end protection for data at-rest for Linux on IBM Z® and IBM LinuxONE™.
This publication informs about the required setup and describes various scenarios that deal with the data management on the encrypted volumes, with key management, and with tasks of backup, recovery, and migration.
You can find the latest version of this publication in the Linux® on Z library at: https://www.ibm.com/docs/en/linux-on-systems?topic=encryption-pervasive-data-volumes
- For a video with information on the features and advantages of the infrastructure for protected volume encryption, click or enter the following URL:
https://video.ibm.com/recorded/130688362 - For an illustration of the ease of setting up data volumes for pervasive encryption, watch this video:
https://video.ibm.com/recorded/129264401