Last updated: Nov 27, 2024
Security mechanisms in Cloud Pak for Data as a Service provide protection for data, applications, identity, and resources. You can configure security mechanisms on five levels for IBM Cloud security functions.
Security levels in Cloud Pak for Data as a Service
Security for Cloud Pak for Data as a Service is configured on levels to ensure that your data, application endpoints, and identity are protected on any cloud. The security levels are:
- Network security – Network security protects the network infrastructure and the points where your database or applications interact with the cloud. For example, you can protect your network by allowing IP addresses, by connecting securely to databases and third-party clouds, and by securing endpoints.
- Enterprise security – Enterprises are multiple IBM Cloud accounts in a hierarchy. For example, your company might have many teams that require one or more separate accounts for development, testing, and production environments. Or, you can configure an enterprise to isolate workloads in separate accounts to meet compliance guidelines.
- Account security – Account security includes IAM and Access group roles, Service IDs, monitoring, and other security mechanisms that are configured on IBM Cloud for your IBM Cloud account.
- Data security – Data security protects the IBM Cloud Object Storage service instance, provides data encryption for at-rest and in-motion data, and other security mechanisms related to data.
- Collaborator security – Protect your workspaces by assigning role-based access controls to collaborators in Cloud Pak for Data as a Service.
Cloud Pak for Data as a Service conforms to IBM Cloud security requirements. See IBM Cloud docs: How do I know that my data is safe?.
Resiliency
Cloud Pak for Data as a Service is disaster resistant:
- The metadata for your projects and catalogs is stored in a three-node dedicated Cloudant Enterprise cluster that spans multiple geographic locations.
- The files that are associated with projects and catalogs are protected by the level of resiliency that is specified by the IBM Cloud Object Storage plan.
- Paid plans for IBM Knowledge Catalog plan include automatic backups of catalogs, projects, and deployment spaces.
Compliance
Learn more
- watsonx.ai Studio terms
- IBM Knowledge Catalog terms
- watsonx.ai Runtime terms
- Managing security and compliance in IBM Cloud
- Software Product Compatibility Reports: IBM watsonx.ai Studio.
- Software Product Compatibility Reports: IBM watsonx.ai Runtime service.
- Software Product Compatibility Reports: IBM Knowledge Catalog Paygo.
- Software Product Compatibility Reports: IBM Knowledge Catalog.
Parent topic: Administering your accounts and services