Securing Data - IBM DS8882F Introduction And Planning Manual

Rack mounted storage system
Table of Contents

Advertisement

Securing data

You can secure data with the encryption features that are supported by the storage
system.
Encryption technology has a number of considerations that are critical to
understand to maintain the security and accessibility of encrypted data. For
example, encryption must be enabled by feature code and configured to protect
data in your environment. Encryption also requires access to at least two external
key servers.
It is important to understand how to manage IBM encrypted storage and comply
with IBM encryption requirements. Failure to follow these requirements might
cause a permanent encryption deadlock, which might result in the permanent loss
of all key-server-managed encrypted data at all of your installations.
The storage system automatically tests access to the encryption keys every 8 hours
and access to the key servers every 5 minutes. You can verify access to key servers
manually, initiate key retrieval, and monitor the status of attempts to access the
key server.
Table 12. Performance groups and policies (continued)
1
Performance group
31
1
Performance group settings can be managed using DS CLI.
Note:
Performance policy
31
Chapter 3. Data management features
Performance policy
description
CKD low priority 6
59

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents