Skip to content

Commit e7425d8

Browse files
authored
Update reference-architecture-css.md (#48)
1 parent 64500d9 commit e7425d8

File tree

1 file changed

+39
-47
lines changed

1 file changed

+39
-47
lines changed

reference-architectures/reference-architecture-css.md

Lines changed: 39 additions & 47 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22

33
copyright:
44
years: 2024
5-
lastupdated: "2024-06-14"
5+
lastupdated: "2024-06-21"
66

77
subcollection: security-services
88

@@ -11,12 +11,12 @@ authors:
1111
1212

1313
# The release that the reference architecture describes
14-
version: 1.0
14+
version: 1.0.0
1515

1616
# Use if the reference architecture has deployable code.
1717
# Value is the URL to land the user in the IBM Cloud catalog details page for the deployable architecture.
1818
# See https://test.cloud.ibm.com/docs/get-coding?topic=get-coding-deploy-button
19-
deployment-url: <url>
19+
deployment-url: https://cloud.ibm.com/catalog/architecture/deploy-arch-ibm-core-security-svcs-0294f96e-7314-48d1-a710-c08a541b2119-global
2020

2121
use-case:
2222
- CloudSecurity
@@ -52,63 +52,61 @@ https://test.cloud.ibm.com/docs/solution-as-code?topic=solution-as-code-naming-g
5252
# Core security services
5353
{: #core-security-services-pattern}
5454
{: toc-content-type="reference-architecture"}
55-
{: toc-version="1.0"}
55+
{: toc-version="1.0.0"}
5656

5757
<!--
5858
The IDs, such as {: #title-id} are required for publishing this reference architecture in IBM Cloud Docs. Set unique IDs for each heading. Also include
5959
the toc attributes on the H1, repeating the values from the YAML header.
6060
-->
6161

62-
This reference architecture summarizes the deployment and best practices on IBM Cloud for setting core security services and their associated dependencies. IBM Cloud's core security services are crucial for ensuring robust security and compliance for cloud-based applications and data. Their primary goal is to provide framework for secure and compliant IBM Cloud workloads.
62+
This reference architecture summarizes the deployment and best practices on {{site.data.keyword.cloud_notm}} for setting core security services and their associated dependencies. {{site.data.keyword.cloud_notm}}'s core security services are crucial for ensuring robust security and compliance for cloud-based applications and data. Their primary goal is to provide a framework for secure and compliant {{site.data.keyword.cloud_notm}} workloads.
6363

6464
Here’s a brief overview of each service:
6565

66-
Key Protect: This service provides a secure and scalable way to manage encryption keys for your cloud applications. It ensures that sensitive data is protected by managing and safeguarding cryptographic keys, facilitating compliance with industry standards and regulatory requirements.
66+
{{site.data.keyword.keymanagementserviceshort}}: This service provides a secure and scalable way to manage encryption keys for your cloud applications. It ensures that sensitive data is protected by managing and safeguarding cryptographic keys, facilitating compliance with industry standards and regulatory requirements.
6767

68-
Secrets Manager: This service helps in securely storing and managing sensitive information such as API keys, credentials, and certificates. By centralizing secret management, it reduces the risk of exposure and simplifies the process of accessing and rotating secrets, thereby enhancing security posture.
68+
{{site.data.keyword.secrets-manager_short}}: This service helps in securely storing and managing sensitive information such as API keys, credentials, and certificates. By centralizing secret management, it reduces the risk of exposure and simplifies the process of accessing and rotating secrets, thereby enhancing the security posture.
6969

70-
Security and Compliance Center: This platform offers a comprehensive suite of tools to assess, monitor, and maintain the security and compliance of your cloud environment. It provides insights and controls to help organizations meet regulatory requirements, adhere to best practices, and protect against threats.
70+
{{site.data.keyword.compliance_short}}: This platform offers a comprehensive suite of tools to assess, monitor, and maintain the security and compliance of your cloud environment. It provides insights and controls to help organizations meet regulatory requirements, adhere to best practices, and protect against threats.
7171

72-
IBM Cloud Security and Compliance Center Workload Protection: This service offers functionality to protect workloads, get deep cloud and container visibility, posture management (compliance, benchmarks, CIEM), vulnerability scanning, forensics, and threat detection and blocking.
72+
{{site.data.keyword.sysdigsecure_full_notm}}: This service offers features to protect workloads, get deep cloud and container visibility, posture management (compliance, benchmarks, CIEM), vulnerability scanning, forensics, and threat detection and blocking.
7373

74-
This reference architecture showcases how these services form a foundational security layer that enhances data protection, simplifies compliance, and strengthens overall cloud security for any workload in IBM Cloud.
74+
This reference architecture showcases how these services form a foundational security layer that enhances data protection, simplifies compliance, and strengthens overall cloud security for any workload in {{site.data.keyword.cloud_notm}}.
7575

7676
## Architecture diagram
7777
{: #architecture-diagram}
7878

79-
The following diagram represents the architecture for Core Security Services on IBM Cloud and reuses the [best practices](/docs/framework-financial-services?topic=framework-financial-services-about) for IBM Cloud for Financial Services.
79+
The following diagram represents the architecture for the core security services deployable architecture on {{site.data.keyword.cloud_notm}} and reuses the [best practices](/docs/framework-financial-services?topic=framework-financial-services-about) for {{site.data.keyword.framework-fs_full}}.
8080

81-
![Architecture.](core-security-services-architecture.svg "Architecture"){: caption="Figure 1. Architecture diagram" caption-side="bottom"}
81+
![Architecture.](core-security-services-architecture.svg "Architecture"){: caption="Figure 1. Architecture diagram" caption-side="bottom"}{: external download="core-security-services-architecture.svg"}
8282

83-
The architecture is anchored by three fundamental services: Key Protect, Secrets Manager, and IBM Cloud Security Services and Workload Protection. These services provide integration endpoints for any customer workload hosted on IBM Cloud.
83+
The architecture is anchored by three fundamental services: {{site.data.keyword.keymanagementserviceshort}}, {{site.data.keyword.secrets-manager_short}}, and IBM Cloud Security Services and {{site.data.keyword.sysdigsecure_full_notm}}. These services provide integration endpoints for any customer workload that is hosted on {{site.data.keyword.cloud_notm}}.
8484

85-
1. Key Protect
85+
1. {{site.data.keyword.keymanagementserviceshort}}
8686

87-
Key Protect is responsible for centrally managing the lifecycle of encryption keys used by IBM Cloud Object Storage (COS) buckets, Secrets Manager, and event notification resources. Additionally, it can manage encryption keys for any customer workload requiring protection.
87+
{{site.data.keyword.keymanagementserviceshort}} is responsible for centrally managing the lifecycle of encryption keys that are used by {{site.data.keyword.cos_full_notm}} buckets, {{site.data.keyword.secrets-manager_short}}, and event notification resources. Additionally, it can manage encryption keys for any customer workload that requires protection.
8888

89-
2. Secrets Manager
89+
2. {{site.data.keyword.secrets-manager_short}}
9090

91-
Secrets Manager securely stores and manages sensitive information, including API keys, credentials, and certificates. It utilizes encryption keys from Key Protect to encrypt sensitive data and to seal/unseal vaults holding the secrets. It is preconfigured to send events to the Event Notifications service, allowing customers to set up email or SMS notifications. Moreover, it is automatically configured to forward all API logs to the customer's logging instance.
91+
{{site.data.keyword.secrets-manager_short}} securely stores and manages sensitive information, including API keys, credentials, and certificates. It uses encryption keys from {{site.data.keyword.keymanagementserviceshort}} to encrypt sensitive data and to seal and unseal vaults that hold the secrets. It is preconfigured to send events to the {{site.data.keyword.en_short}} service, allowing customers to set up email or SMS notifications. Moreover, it is automatically configured to forward all API logs to the customer's logging instance.
9292

9393
3. Security Compliance Center
9494

9595
The Security Compliance Center instance is preconfigured to scan all resources provisioned by the reference architecture. It can be expanded to accommodate the unique workloads of customers.
9696

9797

98-
IBM Cloud Object Storage buckets are set up to receive logs from Logging and Alerting Services. Each bucket is configured to encrypt data at rest by using encryption keys managed by Key Protect.
98+
{{site.data.keyword.cos_full_notm}} buckets are set up to receive logs from logging and alerting services. Each bucket is configured to encrypt data at rest by using encryption keys managed by {{site.data.keyword.keymanagementserviceshort}}.
9999

100100
## Design concepts
101101
{: #design-concepts}
102102

103103
- Storage: Backup, Archive
104-
- Networking: Cloud native contectivity
105-
- Security: Data Security, Identity & Access, Application Security, Threat Detection and Response, Infrastructure & Endpoints, Governance, Risk & Compliance
106-
- Resiliency: High Availability
107-
- Service Management: Monitoring, Logging, Auditing / tracking, Automated Deployment
104+
- Networking: Cloud-native connectivity
105+
- Security: Data security, identity and access, application security, threat detection and response, infrastructure and endpoints, governance, risk and compliance
106+
- Resiliency: High availability
107+
- Service management: Monitoring, logging, auditing and tracking, automated deployment
108108

109-
<br>
110-
111-
![heatmap](heat-map-ccs.svg "Current diagram"){: caption="Figure 2. Architecture design scope" caption-side="bottom"}
109+
![heatmap](heat-map-ccs.svg "Current diagram"){: caption="Figure 2. Architecture design scope" caption-side="bottom"}{: external download="heat-map-ccs.svg"}
112110

113111
## Requirements
114112
{: #requirements}
@@ -118,40 +116,34 @@ The following table outlines the requirements that are addressed in this archite
118116
| Aspect | Requirements |
119117
| -------------- | -------------- |
120118
| Networking | Provide secure, encrypted connectivity to the cloud’s private network for management purposes. |
121-
| Security | Encrypt all application data in transit and at rest to protect from unauthorized disclosure. \n Encrypt all security data (operational and audit logs) to protect from unauthorized disclosure. \n Encrypt all data using customer managed keys to meet regulatory compliance requirements for additional security and customer control. \n Protect secrets through their entire lifecycle and secure them using access control measures. |
122-
| Resiliency | Support application availability targets and business continuity policies. \n Ensure availability of the application in the event of planned and unplanned outages. \n Backup application data to enable recovery in the event of unplanned outages. \n Provide highly available storage for security data (logs) and backup data. |
123-
| Service Management | Monitor system and application health metrics and logs to detect issues that might impact the availability of the application. \n Generate alerts/notifications about issues that might impact the availability of applications to trigger appropriate responses to minimize down time. \n Monitor audit logs to track changes and detect potential security problems. \n Provide a mechanism to identify and send notifications about issues found in audit logs. |
119+
| Security | Encrypt all application data in transit and at rest to protect it from unauthorized disclosure. \n Encrypt all security data (operational and audit logs) to protect from unauthorized disclosure. \n Encrypt all data using customer-managed keys to meet regulatory compliance requirements for additional security and customer control. \n Protect secrets through their entire lifecycle and secure them using access control measures. |
120+
| Resiliency | Support application availability targets and business continuity policies. \n Ensure availability of the application during planned and unplanned outages. \n Back up application data to enable recovery during unplanned outages. \n Provide highly available storage for security data (logs) and backup data. |
121+
| Service Management | Monitor system and application health metrics and logs to detect issues that might impact the availability of the application. \n Generate alerts/notifications about issues that might impact the availability of applications to trigger appropriate responses to minimize downtime. \n Monitor audit logs to track changes and detect potential security problems. \n Provide a mechanism to identify and send notifications about issues that are found in audit logs. |
124122
{: caption="Table 1. Requirements" caption-side="bottom"}
125123

126-
127124
## Components
128125
{: #components}
129126

130127
The following table outlines the products or services used in the architecture for each aspect.
131128

132129
| Aspects | Architecture components | How the component is used |
133130
| -------------- | -------------- | -------------- |
134-
| Storage | [Cloud Object Storage](https://cloud.ibm.com/docs/cloud-object-storage?topic=cloud-object-storage-about-cloud-object-storage) | Web app static content, backups, logs (application, operational, and audit logs) |
135-
| Networking | [Virtual Private Endpoint (VPE)](https://cloud.ibm.com/docs/vpc?topic=vpc-about-vpe) | For private network access to Cloud Services, e.g., Key Protect, Secrets Manaegr, SCC, etc. |
136-
| Security | [IAM](https://cloud.ibm.com/docs/account?topic=account-cloudaccess) | IBM Cloud Identity & Access Management |
137-
| | [Key Protect](https://cloud.ibm.com/docs/key-protect?topic=key-protect-about) | A full-service encryption solution that allows data to be secured and stored in IBM Cloud |
138-
| | [Secrets Manager](https://cloud.ibm.com/docs/secrets-manager?topic=secrets-manager-getting-started#getting-started) | Certificate and Secrets Management |
139-
| | [Security and Compliance Center (SCC)](https://cloud.ibm.com/docs/security-compliance?topic=security-compliance-getting-started) | Implement controls for secure data and workload deployments, and assess security and compliance posture |
140-
| | [Security and Compliance Center Workload Protection ](https://cloud.ibm.com/docs/workload-protection?topic=workload-protection-getting-started) | |
141-
| Service Management | [IBM Cloud Monitoring](https://cloud.ibm.com/docs/monitoring?topic=monitoring-about-monitor) | Apps and operational monitoring |
142-
| | [IBM Log Analysis](https://cloud.ibm.com/docs/log-analysis?topic=log-analysis-getting-started) | Apps and operational logs |
143-
| | [Activity Tracker Event Routing](https://cloud.ibm.com/docs/activity-tracker?topic=activity-tracker-getting-started) | Audit logs |
131+
| Storage | [{{site.data.keyword.cos_full_notm}}](https://cloud.ibm.com/docs/cloud-object-storage?topic=cloud-object-storage-about-cloud-object-storage) | Web app static content, backups, logs (application, operational, and audit logs) |
132+
| Networking | [Virtual Private Endpoint (VPE)](https://cloud.ibm.com/docs/vpc?topic=vpc-about-vpe) | For private network access to {{site.data.keyword.cloud_notm}} services, for example, {{site.data.keyword.keymanagementserviceshort}}, {{site.data.keyword.keymanagementserviceshort}}, {{site.data.keyword.compliance_short}}. |
133+
| Security | [IAM](https://cloud.ibm.com/docs/account?topic=account-cloudaccess) | {{site.data.keyword.iamshort}} |
134+
| | [{{site.data.keyword.keymanagementserviceshort}}](https://cloud.ibm.com/docs/key-protect?topic=key-protect-about) | A full-service encryption solution that allows data to be secured and stored in {{site.data.keyword.cloud_notm}} |
135+
| | [{{site.data.keyword.secrets-manager_short}}](https://cloud.ibm.com/docs/secrets-manager?topic=secrets-manager-getting-started#getting-started) | Certificate and Secrets Management |
136+
| | [{{site.data.keyword.compliance_short}}](https://cloud.ibm.com/docs/security-compliance?topic=security-compliance-getting-started) | Implement controls for secure data and workload deployments, and assess security and compliance posture |
137+
| | [{{site.data.keyword.sysdigsecure_full_notm}}](https://cloud.ibm.com/docs/workload-protection?topic=workload-protection-getting-started) | |
138+
| Service Management | [{{site.data.keyword.monitoringlong_notm}}](https://cloud.ibm.com/docs/monitoring?topic=monitoring-about-monitor) | Apps and operational monitoring |
139+
| | [{{site.data.keyword.loganalysislong_notm}}](https://cloud.ibm.com/docs/log-analysis?topic=log-analysis-getting-started) | Apps and operational logs |
140+
| | [{{site.data.keyword.atracker_short}}](https://cloud.ibm.com/docs/activity-tracker?topic=activity-tracker-getting-started) | Audit logs |
144141
{: caption="Table 2. Components" caption-side="bottom"}
145142

146-
147143
## Compliance
148144
{: #compliance}
149145

150-
- Ensure Object Storage encryption is enabled with BYOK
151-
- Ensure Activity Tracker data is encrypted at rest
152-
- Ensure Activity Tracker trails are integrated with Log Analysis logs
153-
- Ensure Key Protect has automated rotation enabled for customer-managed keys
154-
- Ensure that the Key Protect service instance is highly available
146+
Ensures compliance with some of the controls in the CIS IBM Cloud Foundations Benchmark profile. To view the list of added controls, follow these steps:
155147

156-
**Security and Compliance Center (SCC)** <br>
157-
This reference architecture utilizes the Security and Compliance Center, which defines policy as code, implements controls for secure data and workload deployments, and assesses security and compliance posture. For this reference architecture, the CIS IBM Cloud Foundations Benchmark is used. A profile is a grouping of controls that can be evaluated for compliance.
148+
1. Go the {{site.data.keyword.cloud_notm}} [catalog](/catalog#reference_architecture){: external} and search for the Core Security Services deployable architecture.
149+
1. Click the tile for the deployable architecture to open the details. The Security & compliance tab lists all of the controls that are included in the deployable architecture.

0 commit comments

Comments
 (0)