When planning to deploy a solution in IBM Cloud, there are several areas to carefully consider.

These include how you will set up the account, which permissions to assign to users, how to log and monitor your systems, how to design the networking configuration, which compute options to use and how to automate deployments:


Establish an enterprise account structure and standards

An important step in preparing your project is to define how you are going to structure your account. IBM Cloud introduces the concepts of Enterprise, Account, Account Group, Users, Access Groups, Resource Groups and Tags. You will want to understand these concepts to make the right decisions for your enterprise.

A common approach is to define a blueprint for all projects, as shown in “Blueprinting the Onboarding of Cloud Projects Using Terraform.” With the concepts defined above, a blueprint could be as follows:


In this example, a project maps to an Account, and a set of standard Access Groups exist in every project to bring consistency across the Enterprise. Each Access Group would have specific IAM policies assigned based on their purpose. Resource groups could be dedicated to specify environments (e.g., Development, Test, Staging, Production):


Related links

Identify and configure a set of shared services

No matter which compute options you are deploying to, there is likely a set of common shared services you are going to use. Typically, this would include services like log and metrics collection, auditing, certificate management and key management. When possible, use a dedicated resource group or account to host these services and configure compute resources to send their logs and metrics to the shared instances. Apply IAM policies to control which access groups can read/write from/to these instances:


Related links

Define your networking strategy

From IP addressing scheme to rules in network access lists and security groups, the scope of the networking configuration is not to be taken lightly. Do you need to interconnect your remote network environments with IBM Cloud? Will you go over a dedicated link? Through a virtual private network? How do you plan to isolate applications within the same account and across accounts? Which IP address ranges to use? Are there any conflicts? How to protect ingress traffic while ensuring high availability requirements are met?


Related links

Evaluate and improve security posture

Embed security checks into everyday workflows to help monitor for security and compliance. Configure Security and Compliance Center to monitor and govern the use of resources in your accounts. Set up base compliance policies, scans and schedules. Set up common approaches to the management of secrets, certificates and keys:


Related links

Automate all steps

Once you have passed the initial discovery phase of a service, using either the user interface or the command line, and you’ve made the decision to use this service as part of your solution, make sure to rely on automation to integrate, configure and operate the service. From infrastructure provisioning to production deployment, whenever possible, capture these steps as code — as repeatable and auditable processes. Tools like the IBM Cloud CLI, Terraform and Ansible will play their part in this endeavor, together with Continuous Delivery and IBM Cloud Schematics:


Related links

Feedback, questions, and suggestions

If you have feedback, suggestions or questions about this post, please reach out to me on Twitter (@L2FProd).

More from Cloud

Strengthening cybersecurity in life sciences with IBM and AWS

7 min read - Cloud is transforming the way life sciences organizations are doing business. Cloud computing offers the potential to redefine and personalize customer relationships, transform and optimize operations, improve governance and transparency, and expand business agility and capability. Leading life science companies are leveraging cloud for innovation around operational, revenue and business models. According to a report on mapping the cloud maturity curve from the EIU, 48% of industry executives said cloud has improved data access, analysis and utilization, 45% say cloud…

7 min read

Kubernetes version 1.27 now available in IBM Cloud Kubernetes Service

< 1 min read - We are excited to announce the availability of Kubernetes version 1.27 for your clusters that are running in IBM Cloud Kubernetes Service. This is our 22nd release of Kubernetes. With our Kubernetes service, you can easily upgrade your clusters without the need for deep Kubernetes knowledge. When you deploy new clusters, the default Kubernetes version remains 1.25 (soon to be 1.26); you can also choose to immediately deploy version 1.27. Learn more about deploying clusters here. Kubernetes version 1.27 In…

< 1 min read

Redefining the consumer experience: Diageo partners with SAP and IBM on global digital transformation

3 min read - In an era of evolving consumer preferences and economic uncertainties, the beverage industry stands as a vibrant reflection of changing trends and shifting priorities. Despite the challenges posed by inflation and the cost-of-living crisis, a dichotomy has emerged in consumer behavior, where individuals untouched by the crisis continue to indulge in their favorite beverages, while those directly affected pivot towards more affordable luxuries, such as a bottle of something special. This intriguing juxtaposition highlights the resilient nature of consumers and…

3 min read

IBM Cloud releases 2023 IBM Cloud for Financial Services Agreed-Upon Procedures (AUP) Report

2 min read - IBM Cloud completed its 2023 independent review of IBM Cloud services and processes. The review report demonstrates to its clients, partners and other interested parties that IBM Cloud services have implemented and adhere to the technical, administrative and physical control requirements of IBM Cloud Framework for Financial Services. What is the IBM Cloud Framework for Financial Services? IBM Cloud for Financial Services® is designed to build trust and enable a transparent public cloud ecosystem with features for security, compliance and…

2 min read