Previous Topic: Initial ICSF and Security System Updates

Next Topic: How In-House Tape Processing Works

How Tape Encryption Works for Tape Management Systems

This section describes how encryption processing works for CA 1, CA TLMS, DFSMSrmm, and for other OEM tape management systems for when vendors of these products introduce support for CA Tape Encryption.

CA Tape Encryption uses the description field in the DFSMS data class or the security protection profiles defined to your security system to determine whether a tape is eligible for encryption. The following list summarizes how the tape encryption process works in your z/OS environment:

  1. CA Tape Encryption recognizes that a tape data set is eligible for tape encryption processing depending on how your environment is set up.

    For B2B tapes based on public key/private key pairs, the existing security system is called to provide an appropriate digital certificate.

  2. The CA Encryption Subsystem, BES, calls ICSF and CPACF for key generation and encryption services.
  3. The data is encrypted and written to tape.

Note: All of the tape encryption processing is transparent to the user.