Key Management Deployment Guide: Using the IBM Enterprise Key Management Foundation Key Management Deployment Guide: Using the IBM Enterprise Key Management Foundation

Key Management Deployment Guide: Using the IBM Enterprise Key Management Foundation

Publisher Description

In an increasingly interconnected world, data breaches grab headlines. The security of sensitive information is vital, and new requirements and regulatory bodies such as the Payment Card Industry Data Security Standard (PCI-DSS), Health Insurance Portability and Accountability Act (HIPAA), and Sarbanes-Oxley (SOX) create challenges for enterprises that use encryption to protect their information. As encryption becomes more widely adopted, organizations also must contend with an ever-growing set of encryption keys. Effective management of these keys is essential to ensure both the availability and security of the encrypted information. Centralized management of keys and certificates is necessary to perform the complex tasks that are related to key and certificate generation, renewal, and backup and recovery.

The IBM® Enterprise Key Management Foundation (EKMF) is a flexible and highly secure key management system for the enterprise. It provides centralized key management on IBM zEnterprise® and distributed platforms for streamlined, efficient, and secure key and certificate management operations.

This IBM Redbooks® publication introduces key concepts around a centralized key management infrastructure and depicts the proper planning, implementation, and management of such a system using the IBM Enterprise Key Management Foundation solution.

GENRE
Computing & Internet
RELEASED
2014
12 October
LANGUAGE
EN
English
LENGTH
386
Pages
PUBLISHER
IBM Redbooks
SIZE
5.8
MB

More Books by IBM Redbooks

TCP/IP Tutorial and Technical Overview TCP/IP Tutorial and Technical Overview
2006
IPv6 Introduction and Configuration IPv6 Introduction and Configuration
2012
IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager
2010
Advanced Networking Concepts Applied Using Linux on IBM System z Advanced Networking Concepts Applied Using Linux on IBM System z
2012
Scaling BPM Adoption: From Project to Program with IBM Business Process Manager Scaling BPM Adoption: From Project to Program with IBM Business Process Manager
2012
IBM SmartCloud: Becoming a Cloud Service Provider IBM SmartCloud: Becoming a Cloud Service Provider
2012