IBM Security Join our 16,000+ members as we work together to overcome the toughest challenges of cybersecurity. Join the Community
The availability and accessibility of cryptographic keys determines who can open an encrypted data set. Who should have access to the key labels? Who should have access to the key stores? How do you recover from the accidental or malicious deletion of a key? How do you recover from a corrupted key store? Watch this session with Eysha Powers to learn how to protect your cryptographic keys using the System Authorization Facility (SAF), Crypto Express adapters and Trusted Key Entry (TKE) Workstation. We also discuss disaster recovery and backup strategies for your cryptographic keys.
00:53:24