ACF2

 View Only

Implement Data Pervasive Encryption

  • 1.  Implement Data Pervasive Encryption

    Broadcom Employee
    Posted Jan 04, 2022 03:13 PM
    As a security administrator, it's important to understand the requirements and options for implementing pervasive encryption. Typically, a user has read or write access to a data set. Pervasive encryption provides layers of security by requiring the user to have permission to use the key label (applied to **** data sets) and the z/OS Integrated Cryptographic Service Facility API (access to the key label). If the user lacks these security accesses, an error message is issued. For best practices and steps on how to implement pervasive encryption for a data set, see Implement Data Pervasive Encryption with ACF2.


    ------------------------------
    Laura Fletcher
    Staff Technical Writer
    Broadcom
    Illinois
    ------------------------------