Protecting your data is of utmost importance. The Payment Credit Industry (PCI) has defined standards for protection of credit card information. One of the most important factors in this compliance is the ability to provide optimum security, that is, data at rest must be encrypted through strong encryption.
Strong encryption is based on a published encryption algorithm that uses an encryption key. Some encryption algorithms require a single encryption key for encrypting and decrypting data while and others require a public and private key for encrypting and decrypting data.
A single encryption key is typically used for data at rest and a private/public key for transmission of data. The encryption key is stored externally from the data and can be secured in a database or by a key management product.
The separation of the encryption key and the data is vital to help ensure that the data by itself is unrecognizable to unauthorized individuals.
You can configure CA View can be configured to encrypt the report data and the report index data in the database and on tape. This support provides storage and access of the encryption keys with the IBM Integrated Cryptographic Service Facility (ICSF) product.
CA View uses the Advanced Encryption Standard (AES) algorithm. Depending on the supporting hardware, this algorithm uses either a 128-bit key or a 256-bit key to encrypt data. Use the ENCRYPT initialization parameter to activate this This feature is activated within the product by using the ENCRYPT initialization parameter..
This section contains the following topics:
Use ICSF Services to Create, Access, and Maintain Encryption Keys
Encryption Using New and Existing Database and Tape Data
Changing the Initialization Parameter ENCRYPT Setting
Supported Cryptographic Hardware
Encryption and Decryption Software Considerations
|
Copyright © 2015 CA Technologies.
All rights reserved.
|
|