Securing Your Critical Workloads with IBM Hyper Protect Services

An IBM Redbooks publication

Published 11 February 2022, updated 22 February 2022

cover image

ISBN-10: 0738460338
ISBN-13: 9780738460338
IBM Form #: SG24-8469-01
(418 pages)

More options

Rate and comment

Authors: Lydia Parziale, Cecilia A De Leon, Jean-Yves Girard, Carlos Guarany Gomes, Florian Schwanzara


Many organizations must protect their mission-critical applications in production, but security threats also can surface during the development and pre-production phases. Also, during deployment and production, insiders who manage the infrastructure that hosts critical applications can pose a threat because of their super-user credentials and level of access to secrets or encryption keys.

Organizations must incorporate secure design practices in their development operations and embrace DevSecOps to protect their applications from the vulnerabilities and threat vectors that can compromise their data and potentially threaten their business.

IBM® Cloud® Hyper Protect Services provide built-in data-at-rest and data-in-flight protection to help developers easily build secure cloud applications by using a portfolio of cloud services that are powered by IBM LinuxONE.

The LinuxONE platform ensures that client data is always encrypted, whether at rest or in transit. This feature grants customers complete authority over sensitive data and associated workloads (which restricts access, even for cloud admins) and helps them meet regulatory compliance requirements. LinuxONE also allows customers to build mission-critical applications that require a quick time to market and dependable rapid expansion.

This IBM Redbooks® publication has the following goals:

  • Introduce IBM Hyper Protect Services on IBM LinuxONE on IBM Cloud and on-premises.
  • Provide high-level architectures.
  • Describe deployment best practices.
  • Provide guides to getting started and examples of IBM Hyper Protect Services.

The target audience for this book is IBM Hyper Protect Virtual Services technical specialists, IT architects, and system administrators.

Table of contents

Chapter 1. Introducing IBM Hyper Protect Services
Chapter 2. IBM Cloud Hyper Protect Crypto Services
Chapter 3. IBM Cloud Hyper Protect Database as a Service
Chapter 4. IBM Cloud Hyper Protect Virtual Servers
Chapter 5. IBM Hyper Protect Virtual Servers on-premises
Chapter 6. IBM Hyper Protect Virtual Servers on-premises installation
Chapter 7. IBM Hyper Protect Virtual Servers key features
Chapter 8. Secure Bitcoin Wallet: A sample use case that spans multiple IBM Hyper Protect Services
Appendix A. Configuration parameters
Appendix B. Additional material

Follow IBM Redbooks

Follow IBM Redbooks