ADSM-L

Re: [ADSM-L] Question on client side encryption

2007-08-16 03:27:03
Subject: Re: [ADSM-L] Question on client side encryption
From: Oscar Kolsteren <Oscar.Kolsteren AT INGDIRECT.CO DOT UK>
To: ADSM-L AT VM.MARIST DOT EDU
Date: Thu, 16 Aug 2007 08:25:03 +0100
What you also could do is remove the encryption password from the
registry and try to restore some data previously backupped. TSM should
then ask for an encryption password before you can continue

Regards,
Oscar

 
 
UNIX / TSM Administrator | ING Direct
410 Thames Valley Park Drive, Reading, Berkshire, RG6 1RH
Tel: 0118 938 1990 l Email: Oscar.kolsteren AT ingdirect.co DOT uk
 
-----Original Message-----
From: ADSM: Dist Stor Manager [mailto:ADSM-L AT VM.MARIST DOT EDU] On Behalf Of
William Boyer
Sent: 15 August 2007 18:56
To: ADSM-L AT VM.MARIST DOT EDU
Subject: [ADSM-L] Question on client side encryption

I have a client that required certain directories on each file server to
be encrypted. We made the changes to the DSM.OPT to enable
AES128 and the include.encrypt statemsents and did a selective always
backup of those directories so that the active version was an
encrypted version and all the other inactive un-encrypted versions will
roll off based on REtain Extra. Here is a question from the
client. Can anyone give some suggestions on how to prove that data is
encrypted?

Is there a way that we can report on what's encrypted, maybe as part of
the rules for backing up? The question is, if audited
internally, or externally, how do we prove data's encrypted.

More importantly, if we lose a tape, how could we prove it if asked if
we need to disclose?


Bill Boyer
>Select * from USERS where CLUE>0
0 rows returned

************************************************************************
********************************************
This email and any files transmitted with it are confidential and
intended solely for the use of the individual or entity to whom
they are addressed. If you have received this email in error please
notify the system manager.

This footnote also confirms that this email message has been swept
by an antivirus scanner for the presence of computer viruses.

ING Direct NV is a limited liability company incorporated in The
Netherlands. Registered in England & Wales, Branch Ref BR7357, 410
Thames Valley Park Drive, Reading, Berkshire, RG6 1RH.
************************************************************************
********************************************
---------------------------------------------------------------------------------------------------------------
ATTENTION:
The information in this electronic mail message is private and confidential, 
and only intended for the addressee. Should you receive this message by 
mistake, you are hereby notified that any disclosure, reproduction, 
distribution or use of this message is strictly prohibited. Please inform the 
sender by
reply transmission and delete the message without copying or opening it.

Messages and attachments are scanned for all viruses known. If this message 
contains password-protected or encrypted attachments, the files have NOT been 
scanned for viruses by the ING mail domain. Always scan attachments before 
opening them.

ING Direct NV is limited liability company incorporated in The Netherlands. 
Registered in England & Wales, Branch Ref BR7357, 410 Thames Valley Park Drive, 
Reading, Berkshire, RG6 1RH.
---------------------------------------------------------------------------------------------------------------

<Prev in Thread] Current Thread [Next in Thread>