Skip to main content

Securing Your Critical Workloads with IBM Hyper Protect Services

An IBM Redbooks publication

thumbnail 

Published on 11 February 2022, updated 22 February 2022

  1. .EPUB (7.7 MB)
  2. .PDF (17.6 MB)

Share this page:   

ISBN-10: 0738460338
ISBN-13: 9780738460338
IBM Form #: SG24-8469-01


Authors: Lydia Parziale, Cecilia A De Leon, Jean-Yves Girard, Carlos Guarany Gomes and Florian Schwanzara

    menu icon

    Abstract

    Many organizations must protect their mission-critical applications in production, but security threats also can surface during the development and pre-production phases. Also, during deployment and production, insiders who manage the infrastructure that hosts critical applications can pose a threat because of their super-user credentials and level of access to secrets or encryption keys.

    Organizations must incorporate secure design practices in their development operations and embrace DevSecOps to protect their applications from the vulnerabilities and threat vectors that can compromise their data and potentially threaten their business.

    IBM® Cloud® Hyper Protect Services provide built-in data-at-rest and data-in-flight protection to help developers easily build secure cloud applications by using a portfolio of cloud services that are powered by IBM LinuxONE.

    The LinuxONE platform ensures that client data is always encrypted, whether at rest or in transit. This feature grants customers complete authority over sensitive data and associated workloads (which restricts access, even for cloud admins) and helps them meet regulatory compliance requirements. LinuxONE also allows customers to build mission-critical applications that require a quick time to market and dependable rapid expansion.

    This IBM Redbooks® publication has the following goals:

    • Introduce IBM Hyper Protect Services on IBM LinuxONE on IBM Cloud and on-premises.
    • Provide high-level architectures.
    • Describe deployment best practices.
    • Provide guides to getting started and examples of IBM Hyper Protect Services.

    The target audience for this book is IBM Hyper Protect Virtual Services technical specialists, IT architects, and system administrators.

    Table of Contents

    Chapter 1. Introducing IBM Hyper Protect Services

    Chapter 2. IBM Cloud Hyper Protect Crypto Services

    Chapter 3. IBM Cloud Hyper Protect Database as a Service

    Chapter 4. IBM Cloud Hyper Protect Virtual Servers

    Chapter 5. IBM Hyper Protect Virtual Servers on-premises

    Chapter 6. IBM Hyper Protect Virtual Servers on-premises installation

    Chapter 7. IBM Hyper Protect Virtual Servers key features

    Chapter 8. Secure Bitcoin Wallet: A sample use case that spans multiple IBM Hyper Protect Services

    Appendix A. Configuration parameters

    Appendix B. Additional material

     

    Others who read this also read