Maintaining encrypted data sets
Encrypted data sets can be retained for the entire life of the data. This chapter briefly explains how to determine which data sets are encrypted. It also provides step-by-step procedures for rotating the keys that are associated with data set encryption.
This chapter includes the following topics:
7.1 Identifying encrypted data sets
Data sets become encrypted when key labels are provided at data set allocation. Those ...

Get Getting Started with z/OS Data Set Encryption now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.