Skip to content

Commit 88845e6

Browse files
committed
changed URI
1 parent 1c17978 commit 88845e6

File tree

1 file changed

+12
-0
lines changed

1 file changed

+12
-0
lines changed

README.md

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,9 @@
11
> Older code versions for this tutorial can be found in the branches [archive_classic_tekton](https://github.com/IBM-Cloud/secure-file-storage/tree/archive_classic_tekton) and [classic_pipeline_RETIRED](https://github.com/IBM-Cloud/secure-file-storage/tree/classic_pipeline_RETIRED).
22
3+
This repository is used by two IBM Cloud solution tutorials:
4+
- [Apply end to end security to a cloud application](https://cloud.ibm.com/docs/solution-tutorials?topic=solution-tutorials-cloud-e2e-security)
5+
- [Enhance cloud security by applying context-based restrictions](https://cloud.ibm.com/docs/solution-tutorials?topic=solution-tutorials-cbr-security)
6+
37
# Apply end to end security to a cloud application
48

59
The repository features a sample application that enables groups of users to upload files to a common storage pool and to provide access to those files via shareable links. The application is written in Node.js and deployed as Docker container to the IBM Cloud Kubernetes service. It leverages several security-related services and features to improve app security. It includes data encrypted with your own keys, user authentication, and security auditing.
@@ -15,6 +19,14 @@ Refer to [this tutorial](https://cloud.ibm.com/docs/solution-tutorials?topic=sol
1519
5. The bucket where the files are stored is using a user-provided key to encrypt the data.
1620
6. All activities related to managing the solution are logged by [Cloud Activity Tracker with LogDNA](https://cloud.ibm.com/catalog/services/logdnaat).
1721

22+
The application can be deployed using a toolchain.
23+
24+
# Enhance cloud security by applying context-based restrictions
25+
To further enhance security, context-based restrictions are implemented on top the deployed resources as shown.
26+
![](Architecture_cbr.png)
27+
28+
Refer to the tutorial [Enhance cloud security by applying context-based restrictions](https://cloud.ibm.com/docs/solution-tutorials?topic=solution-tutorials-cbr-security) for details and instructions.
29+
1830
## Deploy with a toolchain and Terraform
1931

2032
This project comes with a partially automated toolchain capable of deploying the application to IBM Cloud. The entire environment, including the needed services and the toolchain, is set up using Terraform (Infrastructure as Code). The Terraform scripts are managed in a [Schematics workspace](https://cloud.ibm.com/schematics/workspaces).

0 commit comments

Comments
 (0)