Announcing Bring Your Own Image (BYOI) for IBM Cloud Hyper Protect Virtual Servers

2 min read

You want complete authority over your workloads without sacrificing flexibility when deploying in the public cloud; Bring Your Own Image grants just that.

There are countless ways to use virtual servers. From governmental use cases to the IBM Hyper Protect Digital Assets Platform or any other enterprise workload, clients are finding that IBM Cloud Hyper Protect Virtual Servers provide the infrastructure they need to host highly regulated, mission critical applications.

As you deal with highly confidential and sensitive customer data, you need to ensure its protection by minimizing the threat of attack vectors. At the same time, you want to have the flexibility to deploy what you want and use configurations tailored specifically to your use case. You need an option to deploy a Hyper Protect Virtual Server to your own specifications.

What are IBM Cloud Hyper Protect Virtual Servers?

Designed to address the topmost security concerns, Hyper Protect Virtual Servers provide a confidential computing environment to protect data and applications. Hyper Protect Virtual Servers provide technical assurance that workloads are protected in the cloud, meaning there is technology that prevents access by unauthorized users. Not even IBM Cloud administrators have access, which has been a major selling point for many of our clients. There is more than just an operational assurance, or promise, that IBM will not access the virtual server. All of this comes without sacrificing on performance or scalability.

What is Bring Your Own Image?

Bring Your Own Image (BYOI) allows you to deploy an Open Container Initiative (OCI) Image from a container registry, such as IBM Cloud Container Registry or Docker Hub. You also have the option to build one from scratch. You no longer need to use provided images — you now have flexibility to build your own and incorporate your own software, putting more power in the hands of developers and reducing risk of internal and external threats.

A major advantage to using BYOI is the ability to run on the Operating System of your choice and use it with Hyper Protect Virtual Servers. You can choose from a variety of open Linux distributions and deploy to a Hyper Protect Virtual Server. This opens a world of possibility to have countless options beyond the base image. In addition, BYOI enables you to bundle your own software with the image and build from the ground up to your exact specifications.

There are thousands of compatible preconfigured images on Docker Hub alone, and now you have the option to use any of these with your Hyper Protect Virtual Server.

Easy to deploy

With four easy steps, you can deploy your custom image:

  • Step 1: Create a custom image using a base OCI Image.
  • Step 2: Push image to a container registry (such as IBM Cloud Container Registry or Docker Hub).
  • Step 3: Create a registration definition file and encrypt the file using the Virtual Server public key.
  • Step 4: Deploy the image to a Hyper Protect Virtual Server.

For more details, please visit the BYOI Documentation.

Get started today

All users can get started with a 30-day free trial period to evaluate a Hyper Protect Virtual Servers instance. Try it now!

IBM Cloud Hyper Protect Virtual Servers are available today in Dallas, Washington D.C., Frankfurt, and Sydney multizone regions (MZRs).

Additional resources

Be the first to hear about news, product updates, and innovation from IBM Cloud