Skip to main content

Securing Your Critical Workloads with IBM Hyper Protect Services

An IBM Redbooks publication

thumbnail 

Published on 11 February 2022, updated 22 February 2022

  1. .EPUB (7.7 MB)
  2. .PDF (17.6 MB)

 Order hardcopy
Share this page:   

ISBN-10: 0738460338
ISBN-13: 9780738460338
IBM Form #: SG24-8469-01


Authors: Lydia Parziale, Cecilia A De Leon, Jean-Yves Girard, Carlos Guarany Gomes and Florian Schwanzara

menu icon

Abstract

Many organizations must protect their mission-critical applications in production, but security threats also can surface during the development and pre-production phases. Also, during deployment and production, insiders who manage the infrastructure that hosts critical applications can pose a threat because of their super-user credentials and level of access to secrets or encryption keys.

Organizations must incorporate secure design practices in their development operations and embrace DevSecOps to protect their applications from the vulnerabilities and threat vectors that can compromise their data and potentially threaten their business.

IBM® Cloud® Hyper Protect Services provide built-in data-at-rest and data-in-flight protection to help developers easily build secure cloud applications by using a portfolio of cloud services that are powered by IBM LinuxONE.

The LinuxONE platform ensures that client data is always encrypted, whether at rest or in transit. This feature grants customers complete authority over sensitive data and associated workloads (which restricts access, even for cloud admins) and helps them meet regulatory compliance requirements. LinuxONE also allows customers to build mission-critical applications that require a quick time to market and dependable rapid expansion.

This IBM Redbooks® publication has the following goals:

  • Introduce IBM Hyper Protect Services on IBM LinuxONE on IBM Cloud and on-premises.

  • Provide high-level architectures.

  • Describe deployment best practices.

  • Provide guides to getting started and examples of IBM Hyper Protect Services.

The target audience for this book is IBM Hyper Protect Virtual Services technical specialists, IT architects, and system administrators.

Table of Contents

Chapter 1. Introducing IBM Hyper Protect Services

Chapter 2. IBM Cloud Hyper Protect Crypto Services

Chapter 3. IBM Cloud Hyper Protect Database as a Service

Chapter 4. IBM Cloud Hyper Protect Virtual Servers

Chapter 5. IBM Hyper Protect Virtual Servers on-premises

Chapter 6. IBM Hyper Protect Virtual Servers on-premises installation

Chapter 7. IBM Hyper Protect Virtual Servers key features

Chapter 8. Secure Bitcoin Wallet: A sample use case that spans multiple IBM Hyper Protect Services

Appendix A. Configuration parameters

Appendix B. Additional material

 

Others who read this also read