Skip to Main Content
IBM Z Software


This portal is to open public enhancement requests against IBM Z Software products. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).


Shape the future of IBM!

We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:

Search existing ideas

Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updates on them if they matter to you. If you can't find what you are looking for,

Post your ideas
  1. Post an idea.

  2. Get feedback from the IBM team and other customers to refine your idea.

  3. Follow the idea through the IBM Ideas process.


Specific links you will want to bookmark for future use

Welcome to the IBM Ideas Portal (https://www.ibm.com/ideas) - Use this site to find out additional information and details about the IBM Ideas process and statuses.

IBM Unified Ideas Portal (https://ideas.ibm.com) - Use this site to view all of your ideas, create new ideas for any IBM product, or search for ideas across all of IBM.

ideasibm@us.ibm.com - Use this email to suggest enhancements to the Ideas process or request help from IBM for submitting your Ideas.

Status Future consideration
Categories EKMF Web
Created by Guest
Created on Mar 14, 2023

Enterprise Key Inventory and Reporting

Add Enterprise Key Inventory and Reporting functionality to EKMF.

This will help to remove the need for a manual key inventory that organisations often manage in spreadsheets and to automate the maintenance and reporting operations, thereby removing manual processes. This will also increase accuracy of the key inventory data and the generated reports. 

Every organisation has different requirements for the fields that they have in their key inventory. Being able to support these differences will enable the organisation to tailor their key inventory for their needs and enable effective reporting with the relevant data for the organisation.

Most organisations also have data, which is relevant for the key inventory, in external directories, such as LDAP, AD, and/or cloud IAM. Being able to link to these external directories will reduce administration, remove duplication of data, and ensure data consistency between the key inventory and the external directories.

Key Inventories also contain data whose primary source is the key inventory itself. Typically, but not limited to, information relating to lifecycle management, auditing, and compliance. Being able to manage this data through creation, update, and deletion, will enable organisations to associate keys with information that isn’t available elsewhere.

Being able to view the EKMF managed, externally managed, and directly managed data, all in one place, will enable organisations to get the full picture of the information that is relevant for their keys, without having to reference multiple systems.

A key inventory’s purpose is to provide an organisation with information about its keys. Being able to create reports from the data in the key inventory will enable organisations to leverage the key inventory to inform the business about the state of their keys and take action when necessary. This includes key owners being notified about expiring keys, compliance managers being able to get reports needed to demonstrate compliance with internal and external regulations, and key managers complying with audits.

Idea priority High
  • Guest
    Reply
    |
    Mar 17, 2023

    Reporting function is also very important as stated to know when keys are about to expire and line of business will need to know for budgeting purpose and accountability for their protected data. It is an audit requirement to produce at least annual inventory of all keys and related security items in safekeeping as well as timely renewals of keys and other artifacts that expire.

  • Guest
    Reply
    |
    Mar 17, 2023

    This makes perfect sense to integrate as EKMF has items that are used for authentication and not cryptographic keys which needs to be accounted for. For audit purposes, we need to track the names of the items, location, authorized users, and any expiry dates associated...at a minimum. Example of these items are smart cards, smart card PINs, physical keys/cards to access the EKMF secure cabinet, key letters, backup USB drives.