Maintaining encrypted data sets
Encrypted data sets can be retained for the entire life of the data. This chapter briefly explains how to determine which data sets are encrypted. It also provides step-by-step procedures for rotating the keys that are associated with data set encryption.
This chapter includes the following topics:
7.1 Identifying encrypted data sets
Data sets become encrypted when key labels are provided at data set allocation. Those ...

Get Getting Started with z/OS Data Set Encryption now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.