SHARE in Pittsburgh

15775: z/OS Cryptographic Services - ICSF Best Practices

Thursday, August 7, 2014: 8:30 AM-9:30 AM
Room 316 (David L. Lawrence Convention Center)
Speaker: Steve Hart(IBM Corporation)
Handouts
  • ICSF Best Practices SHARE Pittsburgh 2014 (692.3 kB)
  • This presentation covers IBM recommendations for Cryptographic Administrators and System programmers. Recommendations include the use of cryptographic coprocessors and master keys for protecting cryptographic key material. Access control to ICSF services and key material should be protected using the CSFSERV, CSFKEYS, and CRYPTOZ SAF classes. IBM also recommends setting up ICSF key store policy rules using the XFACILIT SAF class for how encrypted key tokens stored in the CKDS and PKDS can be accessed and used. Additionally this presentation will discuss various settings in the ICSF options data set and how they affect both security and performance.

    Tracks: Security and Compliance and Security in the Enterprise
    Share |




    See more of Project: Security and Compliance
    See more of Program: Enterprise Data Center