Frank,

I would strongly recommend a checklist style with places for initials
for each of the MK holders.

Naming conventions - Your naming convention takes care of the test
v.s. prod.. which is good.  But how do you handle migrating from one
key to another.  Example.  KEY1 is in use, KEY2 is the one that you
have to switch to... Depending on what you are using the key for ...
you may need both or need to replace the contents of KEY1 with KEY2
(think session keys... not data base encryption)  The whole key
management thing can make things difficult.

Personally, I agree with separating test and production.  However, you
may find that there are some keys (think PKDS) that have to be the
same in test and production.

As previously discussed the ability to move keys from one PKDS to
another using the KEYXFER tool is dependent on the MK being the same.
Not to say that I think having the same MK for test and production is
a good idea.... I would not recommend it.... it is just a reminder
that you may need to consider other options if the key needs to be the
same in both places.

The security for keys will be made much easier if you keep them
separated "name-wise".  You will regret choosing the same name for
test and production (only seems like a good idea... but your security
folks will stage a revolt ... tar and feathering may be involved.)   I
am making an assumption that the security rules / security data base
being the same between test and production.  I am personally a fan of
doing things "one way".  Centralizing databases and rules means that
even if you make a mistake.. and production ends up in test for
example ... then the same rules are always in effect.

Additionally, I would suggest implementing some of the newer controls
for CSFKEYS which allow for a bit more granularity that the old method
of "READ" or "NONE".

Also, I would consider using the Protected key if performance is a
consideration.  This topic has been discussed at some length on this
list.

Are you running more than one production LPAR that is going to share keys?

I have personally been thru a conversion from using Thales security
modules to using the Crypto Express cards.  It is awesome.

Rob Schramm
Senior Systems Consultant
Imperium Group


On Thu, Sep 13, 2012 at 8:39 PM, Frank Swarbrick
<frank.swarbr...@yahoo.com> wrote:
> All of our TN3270 traffic is SSL encrypted.
>
> I will definitely be documenting everything!
>
> We have a naming convention as suggested by our vendor, but if you have any 
> particular good practices I'd love to hear them.
>
> Your point about DR is also well taken.  We'll have to discuss that.
>
> Another question, since I've got your attention.  Our vendor mentions that at 
> all of their other customers the CKDS/PKDS are shared between production and 
> non-production.  It wasn't clear to me if this was because they run prod and 
> non-prod in the same LPAR or for some other reason (such as perhaps they 
> didn't know any better).  Because of this they had keys with names like 
> KEKKIM.TEST.ABCD and KEKKIM.PROD.ABCD.  We, on the other hand, will have 
> production in one crypto region with it's own CKDS/PKDS, totally separate 
> from non-production.  This seems the obvious, best way to go, but I'm curious 
> what others have to say.  Because of this we could have both a production and 
> a non-production key with the same label name, but they would not refer to 
> the same actual key value.  (One could not access the production keys from a 
> non-prod LPAR.)
>
> Thanks!
> Frank
>
>
>
>>________________________________
>> From: Rob Schramm <rob.schr...@gmail.com>
>>To: IBM-MAIN@LISTSERV.UA.EDU
>>Sent: Thursday, September 13, 2012 5:54 PM
>>Subject: Re: loading cryptographic coprocessor key part registers
>>
>>I am hoping that you have already considered the need for encrypting the
>>TSO session.
>>
>>Additionally,  having the procedure actually documented before entering
>>your production MK is a really good idea.  Also, secured key part storage
>>onsite as well as offsite for disaster recovery.
>>
>>Also, naming convention for the operational keys is critical!!!
>>
>>Rob Schramm
>>On Sep 13, 2012 5:50 PM, "Frank Swarbrick" <frank.swarbr...@yahoo.com>
>>wrote:
>>
>>> Looks like we found a solution:
>>> http://www-03.ibm.com/support/techdocs/atsmastr.nsf/WebIndex/PRS189.
>>> Frank
>>>
>>>
>>>
>>>
>>> >________________________________
>>> > From: Frank Swarbrick <frank.swarbr...@yahoo.com>
>>> >To: IBM-MAIN@LISTSERV.UA.EDU
>>> >Sent: Thursday, September 13, 2012 12:43 PM
>>> >Subject: loading cryptographic coprocessor key part registers
>>> >
>>> >We are migrating our PIN/card security process to use ICSF and a Crypto3
>>> card.  All of our vendor's other customers have used the TKE Workstation to
>>> load their operational keys (in multiple key part/component format).  We
>>> were not planning on purchasing the TKE feature.  But I cannot see any way
>>> outside of TKE to enter operational key components in to the "cryptographic
>>> >coprocessor's keypartregisters" outside of using TKE.  Help!
>>> >
>>> >Frank
>>> >
>>> >----------------------------------------------------------------------
>>> >For IBM-MAIN subscribe / signoff / archive access instructions,
>>> >send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>>> >
>>> >
>>> >
>>>
>>> ----------------------------------------------------------------------
>>> For IBM-MAIN subscribe / signoff / archive access instructions,
>>> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>>>
>>
>>----------------------------------------------------------------------
>>For IBM-MAIN subscribe / signoff / archive access instructions,
>>send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>>
>>
>>
>
> ----------------------------------------------------------------------
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

Reply via email to