IBM Cloud Docs
Managing security and compliance with Hyper Protect Crypto Services

Managing security and compliance with Hyper Protect Crypto Services

IBM Cloud® Hyper Protect Crypto Services is integrated with the Security and Compliance Center to help you manage security and compliance for your organization.

With the Security and Compliance Center, you can:

  • Define rules for Hyper Protect Crypto Services that can help to standardize resource configuration.

Governing Hyper Protect Crypto Services resource configuration with config rules

As a security or compliance focal, you can use the Security and Compliance Center to define configuration rules for the Hyper Protect Crypto Services instances that you create.

This service only supports the ability to view the results of your configuration scans in the Security and Compliance Center. It is not necessary to set up a collector to use configuration rules.

Config rulesA JSON document that defines the configuration of resources and validates the compliance based on security requirements when a resource is created or modified. are used to monitor and optionally enforce the configuration standards that you want to implement across your accounts. To learn more about the available properties that you can use to create a rule for Hyper Protect Crypto Services, review the following table.

Table 1. Config rule properties and target attributes for Hyper Protect Crypto Services
Resource Kind Property Name Operator Value Description
instance allowed_network string_equals public-and-private
private-only
Specifies the type of endpoint the Hyper Protect Crypto Services instance can be accessed from. Refer to
Managing network access policies for more information.