Managing compliance information for your deployable architecture
By using the ibm_cloud.json
manifest file, you can include claims that your deployable architecture meets specific compliance requirements. After you onboard and publish your deployable architecture to the catalog, users can view
which controls or Security and Compliance Center predefined profiles your product adheres to. You verify the compliance information before you onboard your deployable architecture.
Here's an example from the VSI on VPC landing zone's catalog page where the Standard variation meets the IBM Cloud Framework for Financial Services v1.6.0 profile:
The process to make a compliance claim for your deployable architecture includes steps that must be completed before and during the onboarding process to a catalog:
- Choose a Security and Compliance Center profile and set up an attachment to scan your resources
- Add compliance information to your
ibm_cloud.json
manifest file - Add your scan results to your deployable architecture when you onboard
Choosing a profile and scanning your resources
Before you onboard your deployable architecture to a catalog, verify compliance with a profile in Security and Compliance Center. To claim compliance, you scan the resources that the deployable architecture creates.
-
Create all of the resources in your account that your deployable architecture creates.
Organize the resources in a single resource group to make it easier to run a Security and Compliance Center scan against only those resources in your account.
-
In the IBM Cloud console, click the Menu icon > Security and Compliance > Profiles.
-
Select the profile name that represents the controls that are most relevant to your solution. For example, the IBM Cloud Framework for Financial Services profile is a set of controls that are built specifically for and with the financial services industry. For a list of profiles, see Available predefined profiles.
-
Select the profile from the list, and copy the profile name that displays at the beginning of the page and the version number. Save this information locally because you need these values for updating the
ibm_cloud.json
manifest file. -
Click Attachments > Create.
-
Enter a name for the attachment, and click Next
-
Verify that the profile is the one that you want to use, and click Next.
-
Select the scope. If you organized all resources into a single resource group, set the scope to that resource group.
-
Select Every 30 days as the Schedule frequency, and click Next.
A scan starts when you finish creating the attachment. To keep you from being charged for scans later, return to this setting and change it to None after you're finished onboarding your deployable architecture.
-
Review your attachment details, and click Save.
You see a status bar that indicates that a scan is in progress. If you need to start a one-off scan, use the Overflow menu to select Start scan.
When the scan is complete, you can use the Overflow menu to select View scan results to ensure that the scan on your deployable architecture resources passed the compliance checks as expected. For more information, see Scanning your resources and Viewing results.
Updating the compliance information in the manifest
After you identify the Security and Compliance profile name and version from the previous steps, you must add that information to the ibm_cloud.json
catalog manifest file in your source repo.
-
If one does not exist, create a catalog manifest file at the root of your repo. For an example catalog manifest file, see the terraform-ibm-landing-zone repo.
-
Open the
ibm_catalog.json
file. -
Find or add the
flavors.compliance
field for the variation (flavor) that you want to update. -
Set
authority
toscc-v3
. -
Find or add a
profiles[]
array:- Set
profile_name
to the profile display name you saved in the previous steps. - Set
profile_version
to the version you noted in the previous steps.
For example:
"authority": "scc-v3", "profiles": [ { "profile_name": "IBM Cloud for Financial Services", "profile_version": "1.3.0" } ]
- Set
-
Save the file.
Adding a Security and Compliance Center scan during onboarding
When you onboard your deployable architecture in the console, you add your scan results so that users can see the compliance claims when they evaluate your product in the catalog.
- On the Manage compliance page, click Add scan.
- Select the Security and Compliance Center instance that you used to complete your scan in the previous steps.
- Select the profile.
- Select your scan.
- Click Apply scan.
Now that your scan results are added, you can complete onboarding and choose to share the deployable architecture to other accounts or enterprises, or publish to the IBM Cloud catalog.
Cleaning up your resources
To add compliance claims to your deployable architecture, you had to create the resources in your account and a Security and Compliance Center instance. To reduce future costs, you can delete all of the resources that you created during this
process that you no longer need. You can keep your Security and Compliance Center instance, but set your attachment scan schedule to None
until you're ready to rerun a scan.