IBM Cloud Docs
IBM Cloud Essential Security and Observability Services

IBM Cloud Essential Security and Observability Services

This reference architecture summarizes the deployment and best practices on IBM Cloud for setting essential security services and their associated dependencies. IBM Cloud's essential security services are crucial for ensuring robust security and compliance for cloud-based applications and data. Their primary goal is to provide a framework for secure and compliant IBM Cloud workloads.

Here’s a brief overview of each service:

Key Protect: This service provides a secure and scalable way to manage encryption keys for your cloud applications. It ensures that sensitive data is protected by managing and safeguarding cryptographic keys, facilitating compliance with industry standards and regulatory requirements.

Secrets Manager: This service helps in securely storing and managing sensitive information such as API keys, credentials, and certificates. By centralizing secret management, it reduces the risk of exposure and simplifies the process of accessing and rotating secrets, thereby enhancing the security posture.

Security and Compliance Center: This platform offers a comprehensive suite of tools to assess, monitor, and maintain the security and compliance of your cloud environment. It provides insights and controls to help organizations meet regulatory requirements, adhere to best practices, and protect against threats.

IBM Cloud Security and Compliance Center Workload Protection: This service offers features to protect workloads, get deep cloud and container visibility, posture management (compliance, benchmarks, CIEM), vulnerability scanning, forensics, and threat detection and blocking.

This reference architecture showcases how these services form a foundational security layer that enhances data protection, simplifies compliance, and strengthens overall cloud security for any workload in IBM Cloud.

Architecture diagram

The following diagram represents the architecture for the IBM Cloud Essential Security and Observability Services deployable architecture on and reuses the best practices for IBM Cloud Framework for Financial Services.

Architecture.
Figure 1. Architecture diagram

The architecture is anchored by three fundamental services: Key Protect, Secrets Manager, and Security and Compliance Center. These services provide integration endpoints for any customer workload that is hosted on IBM Cloud.

  1. Key Protect

    Key Protect is responsible for centrally managing the lifecycle of encryption keys that are used by IBM Cloud Object Storage buckets, Secrets Manager, and event notification resources. Additionally, it can manage encryption keys for any customer workload that requires protection.

  2. Secrets Manager

    Secrets Manager securely stores and manages sensitive information, including API keys, credentials, and certificates. It uses encryption keys from Key Protect to encrypt sensitive data and to seal and unseal vaults that hold the secrets. It is preconfigured to send events to the Event Notifications service, allowing customers to set up email or SMS notifications. Moreover, it is automatically configured to forward all API logs to the customer's logging instance.

  3. Security and Compliance Center

    The Security Compliance Center instance is preconfigured to scan all resources provisioned by the reference architecture. It can be expanded to include IBM Cloud Security and Compliance Center Workload Protection to accomodate the unique workloads of customers.

IBM Cloud Object Storage buckets are set up to receive logs from logging and alerting services. Each bucket is configured to encrypt data at rest by using encryption keys managed by Key Protect.

Design concepts

  • Storage: Backup, Archive
  • Networking: Cloud-native connectivity
  • Security: Data security, identity and access, application security, threat detection and response, infrastructure and endpoints, governance, risk and compliance
  • Resiliency: High availability
  • Service management: Monitoring, logging, auditing and tracking, automated deployment

heatmap
Figure 2. Architecture design scope

Requirements

The following table outlines the requirements that are addressed in this architecture.

Table 1. Requirements
Aspect Requirements
Networking Provide secure, encrypted connectivity to the cloud’s private network for management purposes.
Security Encrypt all application data in transit and at rest to protect it from unauthorized disclosure.
Encrypt all security data (operational and audit logs) to protect from unauthorized disclosure.
Encrypt all data using customer-managed keys to meet regulatory compliance requirements for additional security and customer control.
Protect secrets through their entire lifecycle and secure them using access control measures.
Resiliency Support application availability targets and business continuity policies.
Ensure availability of the application during planned and unplanned outages.
Back up application data to enable recovery during unplanned outages.
Provide highly available storage for security data (logs) and backup data.
Service Management Monitor system and application health metrics and logs to detect issues that might impact the availability of the application.
Generate alerts/notifications about issues that might impact the availability of applications to trigger appropriate responses to minimize downtime.
Monitor audit logs to track changes and detect potential security problems.
Provide a mechanism to identify and send notifications about issues that are found in audit logs.

Components

The following table outlines the products or services used in the architecture for each aspect.

Table 2. Components
Aspects Architecture components How the component is used
Storage IBM Cloud Object Storage Web app static content, backups, logs (application, operational, and audit logs)
Networking Virtual Private Endpoint (VPE) For private network access to IBM Cloud services, for example, Key Protect, Key Protect, Security and Compliance Center.
Security IAM Cloud Identity and Access Management
Key Protect A full-service encryption solution that allows data to be secured and stored in IBM Cloud
Secrets Manager Certificate and Secrets Management
Security and Compliance Center Implement controls for secure data and workload deployments, and assess security and compliance posture
IBM Cloud Security and Compliance Center Workload Protection
Service Management IBM Cloud Monitoring Apps and operational monitoring
IBM Cloud Log Analysis Apps and operational logs
Activity Tracker Event Routing Audit logs

Compliance

Ensures compliance with some of the controls in the CIS IBM Cloud Foundations Benchmark profile. To view the list of added controls, follow these steps:

  1. Go the IBM Cloud catalog and search for the IBM Cloud Essential Security and Observability Services deployable architecture.
  2. Click the tile for the deployable architecture to open the details. The Security & compliance tab lists all of the controls that are included in the deployable architecture.