Book description
In an increasingly interconnected world, data breaches grab headlines. The security of sensitive information is vital, and new requirements and regulatory bodies such as the Payment Card Industry Data Security Standard (PCI-DSS), Health Insurance Portability and Accountability Act (HIPAA), and Sarbanes-Oxley (SOX) create challenges for enterprises that use encryption to protect their information. As encryption becomes more widely adopted, organizations also must contend with an ever-growing set of encryption keys. Effective management of these keys is essential to ensure both the availability and security of the encrypted information. Centralized management of keys and certificates is necessary to perform the complex tasks that are related to key and certificate generation, renewal, and backup and recovery.
The IBM® Enterprise Key Management Foundation (EKMF) is a flexible and highly secure key management system for the enterprise. It provides centralized key management on IBM zEnterprise® and distributed platforms for streamlined, efficient, and secure key and certificate management operations.
This IBM Redbooks® publication introduces key concepts around a centralized key management infrastructure and depicts the proper planning, implementation, and management of such a system using the IBM Enterprise Key Management Foundation solution.
Table of contents
- Front cover
- Notices
- Preface
-
Part 1 Business context and solution architecture
- Chapter 1. Business context for enterprise key management
- Chapter 2. Solution architecture
- Chapter 3. Deployment, administration, and maintenance
-
Part 2 Use case scenario
- Chapter 4. Overview of scenario, requirements, and approach
- Chapter 5. Key management infrastructure setup and deployment
- Appendix A. Troubleshooting
- Appendix B. Operational procedures
- Related publications
- Back cover
-
IBM System x Reference Architecture for Hadoop: IBM InfoSphere BigInsights Reference Architecture
- Introduction
- Business problem and business value
- Reference architecture use
- Requirements
- InfoSphere BigInsights predefined configuration
- InfoSphere BigInsights HBase predefined configuration
- Deployment considerations
- Customizing the predefined configurations
- Predefined configuration bill of materials
- References
- The team who wrote this paper
- Now you can become a published author, too!
- Stay connected to IBM Redbooks
- Notices
Product information
- Title: Key Management Deployment Guide: Using the IBM Enterprise Key Management Foundation
- Author(s):
- Release date: October 2014
- Publisher(s): IBM Redbooks
- ISBN: None
You might also like
book
Configuration Management for Senior Managers
Configuration Management for Senior Managers is written to help managers in product manufacturing and engineering environments …
book
Security+ Practice Questions Exam Cram 2 (Exam SYO-101)
The Security+ exam certifies that candidates have demonstrated the aptitude and ability to master general security …
book
Building an Enterprise-Wide Business Continuity Program
Drawing on over two decades of experience creating continuity plans and using them in actual recoveries, …
book
Infosec Strategies and Best Practices
Advance your career as an information security professional by turning theory into robust solutions to secure …