Auditing z/OS data set encryption
This chapter focuses on the various system management facilities (SMF)1 records that can aid in monitoring the z/OS data set encryption environment.
Brief descriptions and references are provided to demonstrate specific uses and tasks that are related to auditing the z/OS data set encryption environment. If a reporting process or workflow for auditing purposes is not yet established, another option to create reports is IBM Security zSecure (for more information, see 2.3.6, “IBM Security zSecure Suite” on page 31 ...
Get Getting Started with z/OS Data Set Encryption now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.