Announcing IBM Cloud Data Shield Beta at Think 2019

Share this post:

Announcing IBM Cloud Data Shield beta

We announced IBM Cloud Data Shield experimental in November 2018. Since then, we have been hard at work helping our early adopters (Irene Energy and iExec) develop their Zero Trust platforms and building the next version of IBM Cloud Data Shield. Today, we are excited to announce IBM Cloud Data Shield beta!

IBM Cloud Data Shield, powered by Fortanix, provides data-in-use protection for your container workloads running on the IBM Cloud Kubernetes Service. It leverages Intel® Software Guard Extensions (SGX) technology to run code and data in CPU-hardened “enclaves” or a Trusted Execution Environment (TEE). The enclave is a trusted area of memory where critical aspects of the application functionality are protected, helping keep code and data confidential and unmodified.

IBM Cloud Data Shield provides DevOps tools that integrate with your existing build pipelines to convert your container images to shielded (Intel® SGX) counterparts with little to no code changes. It runs on the IBM Cloud Kubernetes Service to bring scalability and high availability to your sensitive workloads.

What’s new in Data Shield?

  • Container conversion tool in the UI enables you to quickly shield your application containers
  • Intel Attestation Report details in the UI
  • Integration with Identity and Access Management (IAM) service and Role Based Access Control (RBAC)
  • Integration with ingress on IBM Cloud Kubernetes Service gives you secure access to IBM Cloud Data Shield UI and API
  • Newly redesigned Enclave Manager UI
  • Integration with IBM Logging Service
  • Enhanced deployment experience with IBM Cloud Data Shield container image

You can now start your IBM Cloud Data Shield journey with the IBM Cloud docs. The “Getting Started” tutorial presents you with steps to get an application protected with IBM Cloud Data Shield. The documentation also gives you simple steps to install and manage your IBM Cloud Data Shield instance.

You now also have an option to install IBM Cloud Data Shield either through native Helm commands or the provided container to install Data Shield to your IBM Cloud Kubernetes Cluster.

IBM Cloud Data Shield UI and APIs are now exposed through your IBM Cloud Kubernetes Service cluster’s ingress and TLS enabled. It is also integrated and secured through your IAM tokens.

Data Shield login page exposed through ingress

NOTE: Users with multiple IBM accounts, please make sure you are logged in with the right IBM account where you installed your IBM Cloud Data Shield instance.

The new and redesigned Enclave Manager UI brings focus to the things that matter most and presents you with the controls to manage your shielded applications deployed on IBM Cloud Data Shield.

Redesigned Data Shield Enclave Manager UI

The UI now enables you to add users with roles scoped to your instance of IBM Cloud Data Shield—manager, reader, writer, or a combination of the three.

Role Based Access Controls

The Tools tab in the Enclave Manager UI helps you quickly convert your container images to shielded counterparts.

Data Shield UI conversion service

The UI now gives you a glimpse into your attestation report in addition to allowing you to download it as an x.501 certificate.

Intel Attestation Report

Finally, all your logs from IBM Cloud Data Shield are seamlessly exported to IBM logging service. You can enable it in your cluster’s landing page.

Enable logging through IBM Cloud Kubernetes Service

All these new features will further enhance your overall user experience with IBM Cloud Data Shield while bringing you our industry-leading runtime memory encryption technology.

Get started with IBM Cloud Data Shield beta

To request a demo, get a Slack invite for the IBM Cloud Data Shield workspace, or ask any questions, please email

Software Architect (Innovation)

Karna Bojjireddy

Program Director, Security Offering Management and Strategy - Cloud Developer Services

More Security stories
April 9, 2019

Track Your Cloud Activities Using IBM Cloud Activity Tracker with LogDNA

With IBM Cloud Activity Tracker with LogDNA, you can improve the security monitoring of your application by setting alerts for user access patterns and gain greater trackability for how your Cloud Service and Cloud Account is being used, configured, and accessed.

Continue reading

March 29, 2019

Adding Sign In to Multicloud Applications Without Code Changes

In this post, we will explore a proof of concept illustrating how we can leverage identity federation using a single IBM Cloud App ID instance along with common operational patterns, such as Kubernetes and Istio, to create a centralized identity and access management model that can transparently secure applications/services across cloud environments.

Continue reading

March 28, 2019

Sign In Your App Users With Any Identity Provider Using App ID

We're going to explain App ID’s custom identity flow and walk you through an example of how you can use it to integrate a third-party identity provider with App ID—specifically, LinkedIn.

Continue reading