Encryption isn’t new, and older algorithms are vulnerable to hackers, which is why it’s important to protect your IBM i systems with algorithms that meet the latest standards. Because encryption algorithms are publicly available, and only encryption keys are private, it’s also important to implement a reliable system for creating, distributing and storing those keys. Encryption keys should have a managed lifecycle that includes creation, activation, use, rotation, expiration, retirement, and destruction after a period of time.
Some regulations, such as PCI DSS, require encryption key management practices such as separation of duties and dual-control processes in which two or more people are involved with managing encryption keys.
Read our eBook to learn more: IBM i Encryption 101.