A better way to achieve cloud security and compliance goals.

As enterprises move regulated workloads to public cloud, it is essential to prove security and compliance concerns are handled better, faster, and easier than their status quo. At IBM, we recognize the magnitude of these issues for all types of clients moving workloads to public cloud, and we understand the sheer complexity they have to endure to achieve a security or compliance standard. It’s exhausting.  

So, today, we’re excited to introduce the IBM Cloud Security and Compliance Center in collaboration with IBM Research—built directly into the IBM Cloud platform and ready to use. This huge push forward for IBM Cloud delivers on our mission of creating successful cultures of continuous cloud security and compliance by making it easier to setup, manage, monitor, and audit security and compliance related activities. 

This also delivers a key component for our IBM Cloud for Financial Services initiative, allowing our Financial Services clients to deliver security and compliance goals in a better, easier way with IBM Cloud Security and Compliance Center.

What is at stake? 

According to IBM Security’s Cost of a Data Breach Report 2020

  • The average time that it takes to identify and contain a data breach is 280 days.
  • Compromised credentials and cloud misconfigurations were each responsible for 19% of malicious breaches .

In addition, the Boston Consulting Group (BCG) stated that from 2009–2017, there were an estimated $321 billion in penalties paid by banks for not meeting regulations. 

IBM Cloud’s answer: There has to be a better way. 

What is the IBM Cloud Security and Compliance Center?

The Security and Compliance Center is integrated by default into the IBM Cloud platform. With the Security and Compliance Center, users can implement controls to continuously assess their current posture or they can apply rules to enforce configuration standardization across accounts. For more information, see the video “Introducing the Security and Compliance Center“.

Security and compliance posture management

IBM recently acquired the Spanugo ASAP solution and integrated it at lightning speed into the IBM Cloud Security and Compliance Center to deliver hybrid, multicloud security and compliance posture for IBM Cloud customers. 

To begin, create a collector and add credentials to the service. Then, create a scope that defines the set of specific accounts and resources that are scannable. Scopes can be validated by predefined profiles—which contain pre-set regulatory controls and goals—or validated by custom profiles. 

Based on the configuration, the service uses the credentials and collector to scan and validate the resource configurations in the defined scope against a chosen profile. When the validation is complete, all results can be viewed including a calculated security and compliance score in the IBM Cloud Security and Compliance dashboard. If any failures come from the validation, remediation is available to quickly help resolve the failure. And, to prepare for or during an audit, granular reports can be downloaded to provide internal and external auditors exactly what has been requested within seconds.

Configuration governance

By creating config rules, IBM Cloud customers can enforce and/or monitor resource configuration across accounts. Config rules are guardrails for resources on how they are provisioned and configured. 

For example, IBM Cloud administrators can disable public access to resources in production accounts but allow it in testing accounts. Through configuration rule enforcement, you can manage account resources with confidence that the configuration of resources will adhere to the guidelines and significantly decrease the likelihood of a misconfiguration that could lead to a security vulnerability.

How can I get started?

To get started, you can use the Posture Management Quick Start found the in the Security and Compliance UI or start defining configuration rules. Or, to learn more check out “Achieving Continuous Security and Compliance on IBM Cloud for Financial Services.” 

As a reminder, organizations with fully deployed security automation already save an average of $3.58 million compared to those that do not, according to the Cost of a Data Breach Report 2020 by IBM Security. So, what are you waiting for? 

Get started today with the IBM Cloud Security and Compliance Center. 

Feedback

We are excited to offer this ground-breaking capability for our IBM Cloud customers. We’d like to hear from you to learn more about your questions, comments, raves, and concerns. Please share your feedback by using the Feedback button on any page at cloud.ibm.com. We need to know how we are helping you deliver on your own mission of creating successful cultures of continuous cloud security and compliance by making it easier to setup, manage, monitor, and audit security and compliance related activities.  

Thanks for taking the time to read and we look forward to solving future security and compliance problems together. 

More from Cloud

Sensors, signals and synergy: Enhancing Downer’s data exploration with IBM

3 min read - In the realm of urban transportation, precision is pivotal. Downer, a leading provider of integrated services in Australia and New Zealand, considers itself a guardian of the elaborate transportation matrix, and it continually seeks to enhance its operational efficiency. With over 200 trains and a multitude of sensors, Downer has accumulated a vast amount of data. While Downer regularly uncovers actionable insights from their data, their partnership with IBM® Client Engineering aimed to explore the additional potential of this vast dataset,…

Best practices for hybrid cloud banking applications secure and compliant deployment across IBM Cloud and Satellite

10 min read - Financial Services clients are increasingly looking to modernize their applications. This includes modernization of code development and maintenance (helping with scarce skills and allowing innovation and new technologies required by end users) as well as improvement of deployment and operations, using agile techniques and DevSecOps. As part of their modernization journey, clients want to have flexibility to determine what is the best “fit for purpose” deployment location for their applications. This may be in any of the environments that Hybrid…

Level up your Kafka applications with schemas

4 min read - Apache Kafka is a well-known open-source event store and stream processing platform and has grown to become the de facto standard for data streaming. In this article, developer Michael Burgess provides an insight into the concept of schemas and schema management as a way to add value to your event-driven applications on the fully managed Kafka service, IBM Event Streams on IBM Cloud®. What is a schema? A schema describes the structure of data. For example: A simple Java class…

SSD vs. NVMe: What’s the difference?

7 min read - Recent technological advancements in data storage have prompted businesses and consumers to move away from traditional hard disk drives (HDDs) towards faster, lower-latency solid-state drive (SSD) technology. In this post, we’re going to look at this new technology, as well as the fastest and most popular protocol available to connect it to a computer’s motherboard—non-volatile memory express (NVMe). While the terms SSD and NVMe are often used to describe two different types of drives, they are actually different data storage…

IBM Newsletters

Get our newsletters and topic updates that deliver the latest thought leadership and insights on emerging trends.
Subscribe now More newsletters