We’re taking another step forward in our mission to help you achieve continuous security and compliance by giving you more control over the privacy of your data.

Organizations in many industries — such as financial institutions — are required to meet policies and controls that ensure that they are abiding by regulatory compliance obligations. These highly regulated institutions, along with the providers that service them, are required to maintain a secure framework to validate the standards that they must meet. With the IBM Cloud Security and Compliance Center, you can ensure that you’re meeting the data privacy requirements set by governments and institutions by controlling the location in which your data is stored and processed.

What kind of data is gathered or generated by the service?

When you work with the Security and Compliance Center, data is gathered or generated when your resources are scanned. The data can be configuration data (information that is gathered about the configuration of your resources) or results data (the information that is generated during a scan of your resources).

Where can I store my data?

By default, the data that is generated by the Security and Compliance Center is stored and processed in the United States. If your organization needs to address specific geographical data privacy requirements, you can change the location to either the United Kingdom or the European Union:

Note: With the exception of rule and template configurations, the configurations in your current location are scheduled for removal and scans are stopped when you change your location. You must reconfigure all of your settings in the new location to continue working. Any data that is available in your current location is automatically deleted after a period of time. 

How do I get started?

If you’re already using the Security and Compliance Center to monitor your current posture, you can change your location in the Data Settings tab of the service UI. But, before you do, be sure that you have the correct IAM policies in place:

New to the Security and Compliance Center? Try walking through our step-by-step tutorial to get started. Or, to learn more about managing your locations, see “Storing your data.”


In order to ensure that we are helping you to deliver on your own mission, we’d like to hear from you with any feedback that you might have. To share your questions, comments, raves or concerns with us, use the Feedback button that can be found on any page of cloud.ibm.com.

More from Announcements

IBM and SAP unlock business and industry value with new generative AI solutions 

3 min read - IBM Consulting is delivering on our commitment to co-innovate with SAP and collaborate with our clients. As part of our Value Generation Partnership initiative announced earlier this month with SAP, we are releasing the first 10 of 100 planned AI solutions to help clients transform their industries, optimize their business processes and successfully deliver their SAP programs.  Delivering AI business and industry innovation at scale  With the recently announced Value Generation Partnership initiative, IBM and SAP are co-innovating intelligent industry…

IBM SevOne 7.0: Reaching application-centric multicloud network observability  

2 min read - As enterprises increasingly rely on network connectivity to support cloud-based applications and remote workers, network managers require new methods to monitor and safeguard connectivity across diverse environments, including corporate networks, software-defined WANs and multiple public cloud providers.   According to the recent EMA Network Megatrends Report, responding network professionals believe that 53% of network outages and performance issues could be prevented with improved network management tools, yet only 9% find it very easy to hire skilled networking personnel. This is why…

IBM Hybrid Cloud Mesh and Red Hat Service Interconnect: A new era of app-centric connectivity 

2 min read - To meet customer demands, applications are expected to be performing at their best at all times. Simultaneously, applications need to be flexible and cost effective, and therefore supported by an underlying infrastructure that is equally reliant, performant and secure as the applications themselves.   Easier said than done. According to EMA's 2024 Network Management Megatrends report only 42% of responding IT professionals would rate their network operations as successful.   In this era of hyper-distributed infrastructure where our users, apps, and data…

IBM Newsletters

Get our newsletters and topic updates that deliver the latest thought leadership and insights on emerging trends.
Subscribe now More newsletters