Managing security and compliance with Hyper Protect Crypto Services
IBM Cloud® Hyper Protect Crypto Services is integrated with the Security and Compliance Center to help you manage security and compliance for your organization.
With the Security and Compliance Center, you can:
- Define rules for Hyper Protect Crypto Services that can help to standardize resource configuration.
Governing Hyper Protect Crypto Services resource configuration with config rules
As a security or compliance focal, you can use the Security and Compliance Center to define configuration rules for the Hyper Protect Crypto Services instances that you create.
This service only supports the ability to view the results of your configuration scans in the Security and Compliance Center. It is not necessary to set up a collector to use configuration rules.
Config rulesA JSON document that defines the configuration of resources and validates the compliance based on security requirements when a resource is created or modified. are used to monitor and optionally enforce the configuration standards that you want to implement across your accounts. To learn more about the available properties that you can use to create a rule for Hyper Protect Crypto Services, review the following table.
Resource Kind | Property Name | Operator | Value | Description |
---|---|---|---|---|
instance |
allowed_network |
string_equals |
public-and-private private-only |
Specifies the type of endpoint the Hyper Protect Crypto Services instance can be accessed from. Refer to Managing network access policies for more information. |