You had made reference to some items that should have been done. I.E.

- did you record master keys in safe place
- what options you have active (what *should* be active)
- what cards are working (how many), what cards are installed
- how the services/keys should be protected by RACF.

I have done the above, but this was because it seemed the right thing to
do. I was just wondering if there was a redbook that outlined a best
practice approach of things to consider when you have cards like these.


-----Original Message-----
From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On
Behalf Of R.S.
Sent: Thursday, October 06, 2005 10:22 AM
To: [email protected]
Subject: Re: ICSF Verification

Ward, Mike S wrote:

> Is there a best practices redbook for the cards? 

I don't remain any.
However cyrpto cards are usually described in chapters of "New shining 
xxxx CPC Technical Introduction" redbooks.

BTW: What do you mean by "best practices"
IMHO best practice is to get what is needed, enable features via SE, 
implement ICSF and use it.
Oh, do not even think about touching the hardware! You destroy it by 
opening the card. That's for security reasons of key remaining in card 
storage.

Best practices for ICSF, especially in multiple host environment and/or 
DR planning - this should be carefully considered.

HTH
-- 
Radoslaw Skorupka
Lodz, Poland

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to