z/OS Cryptographic Services ICSF Administrator's Guide
Previous topic | Next topic | Contents | Index | Contact z/OS | Library | PDF


The Tasks of a Data Security System

z/OS Cryptographic Services ICSF Administrator's Guide
SA22-7521-17

To help you select the products and services that you need to put a data security policy into effect, IBM has categorized these security functions. These functions are based on the International Organization for Standardization (ISO) standard 7498-2:

  • Identification and authentication—identifies users to the system and provides proof that they are who they claim to be.
  • Access control—determines which users can access which resources.
  • Data confidentiality—protects an organization's sensitive data from being disclosed to unauthorized individuals.
  • Data integrity—ensures that data is in its original and unaltered form.
  • Security management—administers, controls, and reviews a business security policy.
  • Nonrepudiation—assures that a message sender cannot deny later that he or she sent the message.

The z/OS Integrated Cryptographic Service Facility (ICSF) provides a cryptographic application programming interface that you can use along with your system's cryptographic feature to put these functions into effect in your data security policy.

Go to the previous page Go to the next page




Copyright IBM Corporation 1990, 2014