White Papers
Abstract
This paper will describe how data can be protected and encrypted using the features and functions available with IBM Z, z/OS and Db2 for z/OS. This paper will not attempt to provide an exhaustive list of the various options and settings that could be used to protect your data. Rather it will review the major options available with Db2 for z/OS and dive deeply into one that will provide the greatest benefit with the least cost and effort: encryption of Db2 for z/OS data using z/OS DFSMS data set level encryption, leveraging IBM Z hardware.
[{"Line of Business":{"code":"LOB10","label":"Data and AI"},"Business Unit":{"code":"BU059","label":"IBM Software w\/o TPS"},"Product":{"code":"SSEPEK","label":"Db2 for z\/OS"},"ARM Category":[{"code":"a8m0z00000007BIAAY","label":"Security-\u003EEncryption"}],"ARM Case Number":"","Platform":[{"code":"PF035","label":"z\/OS"}],"Version":"11.0.0;12.0.0;and future releases"}]
Was this topic helpful?
Document Information
Modified date:
07 December 2021
UID
ibm16406680