We’re taking another step forward in our mission to help you achieve continuous security and compliance by giving you the option to manage your own data encryption. 

Organizations in many industries — such as financial institutions — are required to meet policies and controls that ensure that they are abiding by regulatory compliance obligations. These highly regulated institutions, along with the providers that service them, require a secure framework that helps to validate the standards that they must meet, such as data security controls. Complete control of data — including the encryption and security of it — is a key requirement for organizations that run sensitive workloads and applications in the cloud. With the Security and Compliance Center, not only can you validate that your workload and application data is managed correctly, but you can also own and manage the encryption for the data that is generated by the service. 

What kind of data is generated by the service?

When you work with the Security and Compliance Center, you have the option to own encryption for the data that is generated by either Security Insights or compliance scans that are run on your resources. However, customer-managed encryption for Configuration Governance is not available at this time. 

Compliance scans

Compliance scans are run on your resources to help determine your adherence to the internal and external regulations that you must meet for your industry:

  1. To run compliance scans, you must first create and install a collector that has access to your resources.
  2. Next, you complete your set-up steps, such as determining whether to own your encryption, creating a scan by targeting a specific area of your organization, providing credentials and choosing which goals you’d like to validate your resources against.
  3. When it’s time, the Security and Compliance Center tells the collector to start scanning your resources.
  4. The scan is run and the results are returned through the collector.
  5. The collector forwards the results to a database, where they are stored for 30 days.
  6. Your results are analyzed to determine your current posture and then displayed as a summary in a dashboard.
  7. If you need to keep your results for longer, you can always download your results and store them in an IBM Cloud Object Storage bucket that you own and manage.

How does encryption work by default?

Security and Compliance Center uses a process called envelope encryption to implement IBM or customer-managed encryption keys. By default, the encryption keys that secure your data are generated on your behalf through Key Protect and managed by IBM. If you want to take advantage of Bring Your Own Key (BYOK) or Keep Your Own Key (KYOK) capabilities, you can manage your own encryption through one of the integrated key management services.

How can I enable my own encryption?

Depending on your use case and security requirements, the key management service that is most suited for your organization’s needs can vary. For a more detailed comparison of the services, see “How is Hyper Protect Crypto Services different from Key Protect?

  • IBM Key Protect for IBM Cloud: Key Protect helps you provision encrypted keys for your applications and IBM Cloud services. As you manage the lifecycle of your keys, you can benefit from knowing that your keys are secured by FIPS 140-2 Level 3 certified cloud-based hardware security modules (HSMs) that protect against the theft of information. With the service, you can wrap your data encryption keys with a highly secure root key that you can either bring yourself or generate through the service.
  • IBM Cloud Hyper Protect Crypto Services: Hyper Protect Crypto Services is a dedicated key management service and HSM that provides you with the Keep Your Own Key capability for cloud data encryption. Built on FIPS 140-2 Level 4 certified hardware, Hyper Protect Crypto Services allows you to have exclusive control of your encryption keys. In addition to the BYOK capabilities, KYOK provides technical assurance that IBM cannot access the customer keys. With KYOK, you have exclusive control of the entire key hierarchy including the master key.

How can I get started?

If you’re already using the Security and Compliance Center to monitor your current posture, you can enable your own encryption in the Data Settings tab of the service UI. But, before you do, be sure that you have the correct IAM policies in place:

New to the Security and Compliance Center? Try walking through our step-by-step tutorial to get started. Or, to learn more about how to manage encryption settings for your Security and Compliance Center data, see “Enabling customer-managed keys.”


In order to ensure that we are helping you to deliver on your own mission, we’d like to hear from you with any feedback that you might have. To share your questions, comments, raves or concerns with us, use the Feedback button that can be found on any page of cloud.ibm.com.

More from Announcements

IBM named a Leader in Gartner Magic Quadrant for SIEM, for the 14th consecutive time

3 min read - Security operations is getting more complex and inefficient with too many tools, too much data and simply too much to do. According to a study done by IBM, SOC team members are only able to handle half of the alerts that they should be reviewing in a typical workday. This potentially leads to missing the important alerts that are critical to an organization's security. Thus, choosing the right SIEM solution can be transformative for security teams, helping them manage alerts…

IBM and MuleSoft expand global relationship to accelerate modernization on IBM Power 

2 min read - As companies undergo digital transformation, they rely on APIs as the backbone for providing new services and customer experiences. While APIs can simplify application development and deliver integrated solutions, IT shops must have a robust solution to effectively manage and govern them to ensure that response times and costs are kept low for all applications. Many customers use Salesforce’s MuleSoft, named a leader by Gartner® in full lifecycle API management for seven consecutive times, to manage and secure APIs across…

IBM Consulting augments expertise with AWS Competencies: A win-win for clients 

3 min read - In today's dynamic economic landscape, businesses demand continuous innovation and speed of execution. At IBM Consulting®, our unwavering focus on partnerships and shared commitment to delivering enterprise-level solutions to mutual clients have been core to our success.   We are thrilled to announce that IBM® has recently gained five competencies from Amazon Web Services (AWS) in vital domains including Cloud Operations, Internet of Things (IoT), Life Sciences, Mainframe Modernization, and Telecommunications. With these credentials, IBM further establishes its position as a…

IBM Newsletters

Get our newsletters and topic updates that deliver the latest thought leadership and insights on emerging trends.
Subscribe now More newsletters