Let me try it this way.

Is df/SMS encryption a pre-requisite to the z/14 "PERVASIVE ENCRYPTION"?

Thanks for all you time and effort,



-----Original Message-----
From: IBM Mainframe Discussion List <IBM-MAIN@LISTSERV.UA.EDU> On Behalf Of 
Timothy Sipples
Sent: Tuesday, April 2, 2019 1:06 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: Pervasive encryption and batch temporary datasets

Allan Staller wrote:
>My understanding is that this was a "hardware" feature and did not
>depend on DFSMS (except as possible an on/off switch).
>In you post you refer to PERVASIVE ENCRYPTION (z/14?) vs pervasive
>encryption (df/SMS). Can you comment on the prior posts requiring
>DF/SMS extended format as a pre-requisite?

I don't fully understand the question.

Let's see how IBM explains these terms....  OK, here's how IBM defined 
Pervasive Encryption (and other terms) in October, 2017:

"Pervasive encryption is a consumable approach to enable extensive encryption 
of data in-flight and at-rest to substantially simplify encryption and reduce 
costs associated with protecting data and achieving compliance mandates....

"The IBM z14 platform provides the hardware infrastructure, in a balanced 
system design, with the encryption capabilities that now make it possible to 
create a fortified perimeter around critical business data....

"The IBM Z operating environments, such as z/OS®, are designed to take 
advantage of the z14 platform imbedding the use of the z14 cryptographic 
engines within the operating environment to help create an environment where 
policies can be enforced that govern intrinsic data protection, helping clients 
build the perimeter around business data....

"z/OS V2.3 and z14 can help drive pervasive encryption efforts within an 
enterprise by supporting clients in their objective to meet complex compliance 
mandates by creating a fortified perimeter around core business data. z/OS is 
designed to provide new policy-based encryption options that take full 
advantage of the improvements in the z14 platform and can help clients protect 
their critical business data. These new capabilities
include:

• Enhanced data protection for many z/OS data sets, FS file systems, and 
Coupling Facility structures gives users the ability to encrypt data without 
needing to make changes to applications to imbed encryption APIs within 
applications

• New z/OS policy controls make it possible to use pervasive encryption to help 
protect user data and simplify the task of compliance

• z/OS Communications Server includes encryption-readiness technology to enable 
z/OS administrators to determine which TCP and Enterprise Extender traffic 
patterns to and from their z/OS systems meet approved encryption cr iteria and 
help simplify the task of compliance...."

OK, so let's pick this apart again. Oversimplifying only slightly:

Pervasive Encryption -- and I'll capitalize the second word, too -- is the 
"approach," the applied concept. In another era IBM might have called this 
concept an "Architecture." Maybe something like "Enterprise Encryption 
Architecture" (EAA). With a forward slash somewhere for good measure. :-)

The z14 models (and second generation LinuxONE machines, I would add -- they 
featured in separate announcements) are the first (and only to date) hardware 
enablers of Pervasive Encryption.

As with the z14 machine, z/OS Data Set Encryption is one (but only one) 
important enabler of Pervasive Encryption as applied to z/OS. Yes, you can 
implement Pervasive Encryption without z/OS; the concept applies to other 
operating systems, including Linux.

You *can* pervasively encrypt (adverb, lowercase) data on machines prior to the 
z14, and for that matter without z/OS Data Set Encryption. Encryption, and the 
ability of application programmers to use it, even pervasively, has been an 
evolving fixture of IBM Z (and prior) platforms since the 1970s.
And if you had/have a particularly energetic and dedicated application 
development team, well managed and supervised, you can pervasively encrypt 
data. Nobody I've encountered actually did this (pervasively encrypt all data), 
which is why Pervasive Encryption is quite important and revolutionary. You can 
also use z/OS Data Set Encryption, even pervasively, on IBM z196/z114 and newer 
machines. There will be processing overhead and possible service level 
implications pre-z14, but you can, and you probably should, at least to some 
degree. (Make forward progress, always.) However, in IBM's view, Pervasive 
Encryption -- the "architectural level set," as it were -- requires IBM z14 (or 
second generation LinuxONE machines), and it requires adopting multiple z/OS 
features if you have z/OS, including but not limited to z/OS Data Set 
Encryption.

Does all that make sense now?

Or, if you want the short official version, here's what IBM wrote in its z/OS 
Data Set Encryption FAQ:

"What is the difference between data set encryption in z/OS V2.2 and pervasive 
encryption in the July 2017 IBM Z announcements?
"Data set encryption, which is one aspect of pervasive encryption, is available 
in z/OS V2.2 when the requisite service is applied."

Too simple. I would have added "which is one aspect of Pervasive Encryption as 
applied to z/OS," but that would have required 4 more words. :-)

Yes, lots of people ask questions such as, "We're implementing Pervasive 
Encryption on z/OS. Does it support zFS?" I know what the questioner
*means*: z/OS Data Set Encryption here, not Pervasive Encryption. The pronoun 
"it" in this example actually, in reality, refers to z/OS Data Set Encryption. 
Sometimes it helps to be precise, but as long as I understand the question, I'm 
fine. I won't quibble.

--------------------------------------------------------------------------------------------------------
Timothy Sipples
IT Architect Executive, Industry Solutions, IBM Z & LinuxONE
--------------------------------------------------------------------------------------------------------

E-Mail: sipp...@sg.ibm.com

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@listserv.ua.edu with the message: INFO IBM-MAIN
::DISCLAIMER::
--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
The contents of this e-mail and any attachment(s) are confidential and intended 
for the named recipient(s) only. E-mail transmission is not guaranteed to be 
secure or error-free as information could be intercepted, corrupted, lost, 
destroyed, arrive late or incomplete, or may contain viruses in transmission. 
The e mail and its contents (with or without referred errors) shall therefore 
not attach any liability on the originator or HCL or its affiliates. Views or 
opinions, if any, presented in this email are solely those of the author and 
may not necessarily reflect the views or opinions of HCL or its affiliates. Any 
form of reproduction, dissemination, copying, disclosure, modification, 
distribution and / or publication of this message without the prior written 
consent of authorized representative of HCL is strictly prohibited. If you have 
received this email in error please delete it and notify the sender 
immediately. Before opening any email and/or attachments, please check them for 
viruses and other defects.
--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

Reply via email to