Explore the security features built into IBM Cloud for Education Application Lab.

Information technology (IT) infrastructure security is one of the most challenging tasks for any operations, administration and management (OAM) team in an enterprise. When the infrastructure that needs to be secured includes a virtual lab with multiple OS images, software and underlying infrastructure, the task is only further complicated.

IBM Cloud for Application Lab, leveraging Apache VCL, is a virtual lab solution built from the ground up with infrastructure security in mind. The following are a selection of the security features built into IBM Cloud for Education Application Lab to ease the burden of the OAM team looking to support a virtual lab.

Security features

Configuration security

Configuration management process is key to maintain consistency of systems and software for a wide variety of applications in virtual labs. A multi-tenant public cloud system has an inherent configuration management system. IBM Cloud for Education uses the cloud configuration management infrastructure to maintain and secure configuration, perform health checks and log any config changes. 

Vulnerability management

Vulnerable systems and software are one of the biggest threats to the IT admins. The need for virtual labs to support a wide variety of applications and multiple operating systems (OS) for different courses, means the possibility of vulnerabilities increases exponentially. It can take just one vulnerability in one OS or application to lead to a cyber-attack via malicious software. 

IBM Cloud for Education leverages the IBM Cloud vulnerability management framework to scan all the infrastructure devices in the network. Processes are defined to identify, log and remediate the vulnerability. All systems are also patched with latest updated as per the patch policy.

Access control

Educational institutions face a unique challenge every semester to update the access for admins and instructors for their courses. On top of the built-in VCL capabilities, the IBM Cloud for Education solution leverages IBM Cloud Identity and Access Management (IAM) to add new users with valid permissions and maintain appropriate and approved access to the environment.

Logging and alerting

The IT admin needs to maintain system, activity, compliance, anomaly and remediation logs for various reasons. IBM Cloud for Education Application Lab keeps logs for infrastructure devices, maintains compliance reports, identifies anomalies or unusual activity in audit logs and alerts admins as per the policy. The incidence reporting framework of IBM Cloud ensures all security incidents are identified and tracked.

IBM Cloud for Education Application Lab combines the strong foundation of Apache VCL with hosting on the IBM Cloud platform to provide a secure and robust infrastructure for a managed virtual lab. This enables the IT admin to focus on customization and enhancements on top of an already secured infrastructure.

Try out the free trial

Take the scientific approach. When you get started with IBM Cloud for Education, there’s a free trial plan so you can experiment with the IBM Cloud for Education Applications Lab. Try it now.

More from Cloud

Using advanced scan settings in the IBM Cloud Security and Compliance Center

5 min read - Customers and users want the ability to schedule scans at the timing of their choice and receive alerts when issues arise, and we’re happy to make a few announcements in this area today: Scan frequency: Until recently, the IBM Cloud® Security and Compliance Center would scan resources every 24 hours, by default, on all of the attachments in an account. With this release, users can continue to run daily scans—which is the recommended option—but they also have the option for…

5 min read

Modernizing child support enforcement with IBM and AWS

7 min read - With 68% of child support enforcement (CSE) systems aging, most state agencies are currently modernizing them or preparing to modernize. More than 20% of families and children are supported by these systems, and with the current constituents of these systems becoming more consumer technology-centric, the use of antiquated technology systems is archaic and unsustainable. At this point, families expect state agencies to have a modern, efficient child support system. The following are some factors driving these states to pursue modernization:…

7 min read

IBM Cloud Databases for Elasticsearch End of Life and pricing changes

2 min read - As part of our partnership with Elastic, IBM is announcing the release of a new version of IBM Cloud Databases for Elasticsearch. We are excited to bring you an enhanced offering of our enterprise-ready, fully managed Elasticsearch. Our partnership with Elastic means that we will be able to offer more, richer functionality and world-class levels of support. The release of version 7.17 of our managed database service will include support for additional functionality, including things like Role Based Access Control…

2 min read

Connected products at the edge

6 min read - There are many overlapping business usage scenarios involving both the disciplines of the Internet of Things (IoT) and edge computing. But there is one very practical and promising use case that has been commonly deployed without many people thinking about it: connected products. This use case involves devices and equipment embedded with sensors, software and connectivity that exchange data with other products, operators or environments in real-time. In this blog post, we will look at the frequently overlooked phenomenon of…

6 min read