
includes both an installation license for the IBM Security Key Lifecycle Manager
management software and a license for encrypting drives.
IBM Security Key Lifecycle Manager for z/OS generates encryption keys and
manages their transfer to and from devices in an IBM Z environment.
Planning for full-disk encryption activation
Full-disk-encryption drives are standard on the storage system. These drives
encrypt and decrypt at interface speeds, with no impact on performance.
Full disk encryption offerings must be activated before use, as part of the system
installation and configuration. This installation and activation review is performed
by the IBM Systems Lab Services team. To submit a request or inquiry, see the
Storage Services website(www-03.ibm.com/systems/services/labservices/
platforms/labservices_storage.html), and click Contact us.
You are responsible for downloading or obtaining from IBM, and installing
designated machine code (such as microcode, basic input/output system code
[BIOS], utility programs, device drivers, and diagnostics that are delivered with an
IBM system) and other software updates in a timely manner from the ibm.com
website (www.ibm.com) or from other electronic media, and following the
instructions that IBM provides. You can request IBM to install machine code
changes; however, you might be charged for that service.
Planning for user accounts and passwords
Planning for administrative user and service accounts and passwords ensures that
you use the best security practices.
Managing secure user accounts
Follow these recommended practices for managing secure user accounts.
Procedure
Complete the following steps to achieve the level of secure access for users that is
required for your storage system.
1.
Assign two or more storage administrators and two or more security
administrators to manage your storage system. To preserve the dual control
that is recommended for recovery key management, do not assign both storage
administrator and security administrator roles to the same user. Change the
password for both the default storage administrator and default security
administrator user accounts, or delete the default user account after user
accounts for other administrators are created.
2.
Create one user account for each user who is authorized to access your storage
system. Do not share a single user account between multiple users.
3.
Assign appropriate user roles and scopes to user accounts in accordance with
the storage management responsibilities of the user.
4.
Review configurable user ID policies, and set the policies in accordance with
your security objectives. The default settings are consistent with IBM
recommended user ID and password policies and practices.
5.
For applications that require network access to the storage system, assign a
unique user ID (an ID that is not assigned to any other user). You can assign
different user IDs for different software applications or different servers so that
actions can be distinguished by user ID in the audit logs.
Chapter 9. Security
185
Summary of Contents for DS8880 Series
Page 1: ...IBM DS8880 Version 8 Release 5 Introduction and Planning Guide GC27 8525 16 IBM...
Page 12: ...xii DS8880 Introduction and Planning Guide...
Page 52: ...40 DS8880 Introduction and Planning Guide...
Page 68: ...56 DS8880 Introduction and Planning Guide...
Page 138: ...126 DS8880 Introduction and Planning Guide...
Page 184: ...172 DS8880 Introduction and Planning Guide...
Page 190: ...178 DS8880 Introduction and Planning Guide...
Page 194: ...182 DS8880 Introduction and Planning Guide...
Page 200: ...188 DS8880 Introduction and Planning Guide...
Page 206: ...194 DS8880 Introduction and Planning Guide...
Page 208: ...196 DS8880 Introduction and Planning Guide...
Page 216: ...204 DS8880 Introduction and Planning Guide...
Page 220: ...208 DS8880 Introduction and Planning Guide...
Page 222: ...210 DS8880 Introduction and Planning Guide...
Page 243: ......
Page 244: ...IBM Printed in USA GC27 8525 16...