IBM i Encryption Key Management is evolving beyond traditional platform-bound approaches, as organizations seek stronger control over how encryption keys are generated, stored, and used. While IBM i provides robust native encryption capabilities, modern security architectures increasingly demand centralized and scalable solutions.
With the enforcement of regulatory frameworks such as the Central Bank of Sri Lanka (CBSL) guidelines and the Personal Data Protection Act (PDPA), organizations in Sri Lanka’s Banking, Financial Services, and Insurance (BFSI) sector are under increasing pressure to secure sensitive data—especially Personally Identifiable Information (PII). A key requirement emerging from these regulations is strong encryption, particularly at the database level, along with Data at REST and Data in Transit encryption.
For enterprises running mission-critical workloads on IBM i, this introduces both an opportunity and a challenge. Read my blog post titled “Navigating the New Era of Data Privacy: A Comprehensive Roadmap for Sri Lankan Banks” to delve deeper into this topic.
I’m aware that other Southeast Asian countries also have similar requirements with their respective regulations. I believe this scenario is applicable to other parts of the world as well. Therefore, this is a common challenge and an opportunity for most IBM i shops.
IBM i has long been recognized for its robust security architecture. It provides several native encryption capabilities, including:
These capabilities are powerful—but modern compliance requirements demand more than just encryption.
Organizations now require:
This is where external enterprise key management becomes essential.
Traditionally, encryption keys are stored locally within the same environment where data resides. While convenient, this model introduces several risks:
In contrast, centralized key management provides:
There are excellent solutions available, and one of the leading solutions in this space is HashiCorp Vault.
Vault is a modern secrets and encryption key management platform designed for dynamic, distributed environments. Its key strengths include:
Vault is increasingly being adopted by BFSI organizations looking to standardize their enterprise security architecture.
Despite its strengths, integrating Vault directly with IBM i is not straightforward.
From my practical experience, knowladge and current IBM i architecture, IBM i does not natively support KMIP (Key Management Interoperability Protocol) out of the box (correct me if i’m wrong).
This means:
This creates a gap between modern key management platforms and lBM i.
To address this challenge, we explored integration using Fortra Powertech Encryption for IBM i.
Powertech Encryption for IBM i is a comprehensive solution that provides:
Note1: No external key managers are required, and keys can be maintained within IBM i. This is beneficial for organizations that do not have an external key manager.

However, one of its most powerful features is: Support for external key managers via KMIP

Powertech Encryption supports communication with external key managers using the KMIP protocol, which is the industry standard for key management interoperability.

Over recent weeks, we conducted hands-on testing to validate this integration in our Test environments.













Those who have fully decrypted value access.

Those who have no access to decrypted data.

Those who have partial access to decrypted data (only last 4 digits can see).

This proves that IBM i workloads can now participate in modern enterprise key management ecosystems.
This integration directly addresses regulatory and operational requirements:
IBM i continues to be a highly secur(e)able and resilient platform—but the security landscape is evolving.
Modern enterprises require: Not just encryption, But enterprise-grade key management
By integrating IBM i with platforms like HashiCorp Vault through solutions such as Fortra Powertech Encryption for IBM i, organizations can:
Fortra Powetech Encryption for IBM i Product Page: https://power.fortra.com/products/database-encryption-software-ibm-i
Stay tuned for part 2 of this article, where we’ll delve into how Precisely Assure Encryption can assist you in integrating external key managers for centralized key management.