How can I tell how (or if) my z/OS network traffic is being encrypted? zERT to the rescue!
Project and Program:
Enterprise Data Center,
Security and Compliance
Tags:
Proceedings,
SHARE Sacramento 2018,
2018
With so many corporate, industry, and government regulations regarding cryptographic protection of data in flight, as well as weaknesses discovered in existing cryptographic protocols and algorithms, z/OS administrators and auditors need to be able to assess the quality of the cryptographic network protection being applied to their key z/OS workloads. But with four different protocols (TLS, SSL, SSH and IPSec), all of the cryptographic algorithms they support, and numerous ways to configure these protocols for different types of z/OS traffic, doing such an assessment can be daunting if not downright impossible.
This session will describe a new z/OS V2R3 Communications Server feature called z/OS encryption readiness technology (zERT) that provides the data that you need to build a complete picture of your z/OS cryptographic network protection posture.-Chris Meyer-IBM Corporation
Back to Proceedings File Library