Home

Cloud

Compliance

ENS (Spain)

Esquema Nacional de Seguridad (ENS)
Illustration showing two people standing on platforms, with one person looking at a map display and the other regarding a security shield
What is the ENS?

Spain’s National Security Framework—in Spanish, Esquema Nacional de Seguridad or ENS—is a set of basic principles and minimum requirements for information security and data protection established by the Spanish government.

The ENS was established by Royal Decree 311/2022, of 3 May. That royal decree was intended to modernize Spain’s information security policy for both public sector agencies and private sector entities that provide services to government agencies.

ENS High Certification for IBM® Cloud

Adherence to ENS High enables a high level of cybersecurity measures—safeguarding against potential threats and vulnerabilities. By aligning with these comprehensive security guidelines, IBM Cloud demonstrates a commitment to protecting sensitive data, mitigating risks, and contributing to the larger national security agenda. This adherence is a strategic investment in establishing a robust and reliable cloud ecosystem that meets the rigorous standards set forth by the Spanish government for safeguarding critical information assets.

IBM Cloud services have received ENS High certification. IBM Service Descriptions (SDs) indicate if a given offering maintains ENS compliance status. Services below are assessed every two years by an independent assessor.

Accelerate compliance using IBM Cloud services

ENS has controls aligned to following the NIST domains.  These domains cover various areas of an organization’s security posture, from risk management, incident response to data protection.

IBM Cloud offers following suite of services that will help you meet specific ENS technical requirements and accelerate your compliance journey.

1. Access Control

Mobile Device Management (MDM) Solutions

Security

Create visibility, management and security for endpoints and users  

See the service

Unified Endpoint management (UEM) Solutions

Security

 Take an open cloud, AI approach to secure and manage any device with a UEM solution 

See the service

IBM Key Protect for IBM Cloud

Security

The IBM® Key Protect for IBM Cloud® service helps you provision and store encrypted keys for apps across IBM Cloud services, so you can see and manage data encryption and the entire key lifecycle from one central location.

See the service

IBM Cloud App ID

Security

IBM Cloud App ID allows you to easily add authentication to web and mobile apps. You no longer have to worry about setting up infrastructure for identity, ensuring geo-availability, and confirming compliance regulations. Instead, you can enhance your apps with advanced security capabilities like multifactor authentication and single sign-on. 

See the service

IBM Cloud Secrets Manager

Security

With IBM Cloud® Secrets Manager, you can create secrets dynamically and lease them to applications while you control access from a single location. Built on open source HashiCorp Vault, Secrets Manager helps you get the data isolation of a dedicated environment with the benefits of a public cloud.

See the service

IBM Security Verify

Security

The modernized, modular IBM® Verify solution provides deep, AI-powered context for both consumer and workforce identity and access management (IAM).

See the service

IBM Cloud Privileged Access Gateway

Security

Privileged Access Gateway (PAG) is a managed service used to provide a secure way for operators to remotely administer servers and clusters within the IBM Cloud. It does this by providing a Bastion gateway server, which is a single point of entry to a set of customer servers and clusters. In addition to this restricted gateway access, PAG records operator sessions, and these recordings can be used for investigations of system misuse.

See the service

IBM Cloud Identity and Access Management (IAM)

Security

IBM Cloud Identity and Access Management (IAM) service securely authenticates users and controls access to all resources consistently in the IBM Cloud Platform.

See the service

IBM Cloud Container Registry

Containers

Store and distribute container images in a fully managed private registry. Push private images to conveniently run them in the IBM Cloud® Kubernetes Service and other runtime environments. Images are checked for security issues so you can make informed decisions about your deployments.

See the service

2. Assessment, Authorization, and Monitoring

IBM Cloud Privileged Access Gateway

Security

Privileged Access Gateway (PAG) is a managed service used to provide a secure way for operators to remotely administer servers and clusters within the IBM Cloud. It does this by providing a Bastion gateway server, which is a single point of entry to a set of customer servers and clusters. In addition to this restricted gateway access, PAG records operator sessions, and these recordings can be used for investigations of system misuse.

See the service

IBM Cloud Identity and Access Management (IAM)

Security

IBM Cloud Identity and Access Management (IAM) service securely authenticates users and controls access to all resources consistently in the IBM Cloud Platform.

See the service

IBM Cloud observability solutions

Logging & monitoring

Observability provides deep visibility into modern distributed applications for faster, automated problem identification and resolution.

See the service

IBM Cloud Flow Logs for VPC

Network

IBM Cloud® Flow Logs for VPC enable the collection, storage, and presentation of information about the Internet Protocol (IP) traffic going to and from network interfaces within your Virtual Private Cloud (VPC).

See the service

IBM Security Verify

Security

The modernized, modular IBM® Verify solution provides deep, AI-powered context for both consumer and workforce identity and access management (IAM).

See the service

3. Audit and Accountability

IBM Cloud Flow Logs for VPC

Network

IBM Cloud® Flow Logs for VPC enable the collection, storage, and presentation of information about the Internet Protocol (IP) traffic going to and from network interfaces within your Virtual Private Cloud (VPC).

See the service

 IBM QRadar Suite

Security

IBM Security® QRadar® Suite is a modernized threat detection and response solution designed to unify the security analyst experience and accelerate their speed across the full incident lifecycle. The portfolio is embedded with enterprise-grade AI and automation to dramatically increase analyst productivity, helping resource-strained security teams work more effectively across core technologies.

With a common user interface, shared insights and connected workflows, it offers integrated products for: Endpoint security (EDR, XDR, MDR),  Log management , SIEM,  SOAR

See the service

IBM Security Guardium

Security

IBM Security® Guardium® is a family of data security software in the IBM Security portfolio that uncovers vulnerabilities and protects sensitive on-premises and cloud data.

See the service

IBM Cloud observability solutions

Logging & monitoring

Observability provides deep visibility into modern distributed applications for faster, automated problem identification and resolution.

See the service

4. Configuration Management 

IBM Cloud Security and Compliance Center - Workload Protection

Security

In architectures that are focused on container and microservices, you can use IBM Cloud® Security and Compliance Center Workload Protection to find and prioritize software vulnerabilities, detect and respond to threats, and manage configurations, permissions, and compliance from source to run.

See the service

IBM Cloud Container Registry

Containers

Store and distribute container images in a fully managed private registry. Push private images to conveniently run them in the IBM Cloud® Kubernetes Service and other runtime environments. Images are checked for security issues so you can make informed decisions about your deployments.

See the service

Continuous Delivery

Developer Tools

Embrace enterprise-ready DevOps. Create secure toolchains that support your app delivery tasks. Automate builds, tests, deployments and more. 

See the service

 IBM Cloud Schematics

Developer Tools

Schematics is an IBM Cloud service, that delivers Infrastructure as Code (IaC) tools as a service. You can use the capabilities of Schematics to consistently deploy and manage your cloud infrastructure environments.

See the service

IBM Wazi as a Service

Compute

Accelerate cloud native development and testing of z/OS applications with z/OS Virtual Server in IBM Cloud® Virtual Private Cloud (VPC)

See the service

5. Contingency Planning

IBM Cloud Storage Services

Storage

Our cloud storage services offer a scalable, security-rich and cost-effective home for your data while supporting traditional and cloud-native workloads. Provision and deploy services such as access object, block and file storage. Adjust capacity and optimize performance as requirements change. Pay only for the cloud storage you need.

See the service

 IBM Cloud Backup

Storage

IBM Cloud® Backup is a full-featured, agent-based backup and recovery system managed through a web interface. Back up data between IBM Cloud servers in one or more IBM Cloud global data centers.

See the service

DevSecOps Application Lifecycle Management

Developer Tools

The DevSecOps Application Lifecycle Management Deployable Architecture creates a set of DevOps toolchains and pipelines. DevSecOps uses continuous delivery (CD) (Git Repos and Issue Tracking, Tekton Pipelines, IBM Cloud® DevOps Insights, and Code Risk Analyzer), Secrets Manager, IBM® Key Protect, IBM Cloud® Object Storage, IBM Cloud® Container Registry, and Vulnerability Advisor.

See the service

6. Identification and Authentication

IBM Cloud App ID

Security

IBM Cloud App ID allows you to easily add authentication to web and mobile apps. You no longer have to worry about setting up infrastructure for identity, ensuring geo-availability, and confirming compliance regulations. Instead, you can enhance your apps with advanced security capabilities like multifactor authentication and single sign-on. 

See the service

IBM Cloud Secrets Manager

Security

With IBM Cloud® Secrets Manager, you can create secrets dynamically and lease them to applications while you control access from a single location. Built on open source HashiCorp Vault, Secrets Manager helps you get the data isolation of a dedicated environment with the benefits of a public cloud.

See the service

IBM Security Verify

Security

The modernized, modular IBM® Verify solution provides deep, AI-powered context for both consumer and workforce identity and access management (IAM).

See the service

IBM Cloud Privileged Access Gateway

Security

Privileged Access Gateway (PAG) is a managed service used to provide a secure way for operators to remotely administer servers and clusters within the IBM Cloud. It does this by providing a Bastion gateway server, which is a single point of entry to a set of customer servers and clusters. In addition to this restricted gateway access, PAG records operator sessions, and these recordings can be used for investigations of system misuse.

See the service

IBM Cloud Identity and Access Management (IAM)

Security

IBM Cloud Identity and Access Management (IAM) service securely authenticates users and controls access to all resources consistently in the IBM Cloud Platform.

See the service

7. Incident Response

 IBM QRadar Suite

Security

IBM Security® QRadar® Suite is a modernized threat detection and response solution designed to unify the security analyst experience and accelerate their speed across the full incident lifecycle. The portfolio is embedded with enterprise-grade AI and automation to dramatically increase analyst productivity, helping resource-strained security teams work more effectively across core technologies.

With a common user interface, shared insights and connected workflows, it offers integrated products for: Endpoint security (EDR, XDR, MDR),  Log management , SIEM,  SOAR

See the service

8. Media Protection

IBM Key Protect for IBM Cloud

Security

The IBM® Key Protect for IBM Cloud® service helps you provision and store encrypted keys for apps across IBM Cloud services, so you can see and manage data encryption and the entire key lifecycle from one central location.

See the service

IBM Cloud Hardware Security Module

Security

IBM Cloud Hardware Security Module (HSM) 7.0 from Gemalto protects cryptographic infrastructure by more securely managing, processing and storing cryptographic keys inside a tamper-resistant hardware device. It helps you solve complex security, compliance, data sovereignty and control challenges migrating and running workloads on the cloud.

See the service

IBM Cloud Storage Services

Storage

Our cloud storage services offer a scalable, security-rich and cost-effective home for your data while supporting traditional and cloud-native workloads. Provision and deploy services such as access object, block and file storage. Adjust capacity and optimize performance as requirements change. Pay only for the cloud storage you need.

See the service

 IBM Cloud Backup

Storage

IBM Cloud® Backup is a full-featured, agent-based backup and recovery system managed through a web interface. Back up data between IBM Cloud servers in one or more IBM Cloud global data centers.

See the service

IBM Cloud Database services

Databases

IBM Cloud® Database-as-a-Service (DBaaS) services free developers and IT from complex and time-consuming tasks including deployment of infrastructure and database software, infrastructure operations, database software updates, and backup. IBM Cloud® Database SMEs deliver and maintain ready-to-use, highly available, database instances freeing developer and IT staff time to focus on other priorities.

See the service

9. Risk Assessment

IBM Cloud Security and Compliance Center - Workload Protection

Security

In architectures that are focused on container and microservices, you can use IBM Cloud® Security and Compliance Center Workload Protection to find and prioritize software vulnerabilities, detect and respond to threats, and manage configurations, permissions, and compliance from source to run.

See the service

IBM QRadar Suite

Security

IBM Security® QRadar® Suite is a modernized threat detection and response solution designed to unify the security analyst experience and accelerate their speed across the full incident lifecycle.

See the service

IBM Security Guardium

Security

IBM Security® Guardium® is a family of data security software in the IBM Security portfolio that uncovers vulnerabilities and protects sensitive on-premises and cloud data.

See the service

10. System and Communications Protection

IBM Cloud Internet Services (CIS)

Network

IBM Cloud Internet Services brings market-leading security and performance to your external web content and internet applications before they reach the cloud.

See the service

IBM Cloud VPN for VPC

Network

IBM Cloud VPN for VPC provides a simple, yet powerful solution for highly scalable and robust site-to-site VPN gateways

See the service

IBM Cloud Direct Link

Network

The IBM Cloud Direct Link solution is designed to seamlessly connect your on-premises resources to your cloud resources. The speed and reliability of IBM Cloud Direct Link helps enable you to extend your organization’s data center network and provides consistent, higher-throughput connectivity—without touching the public internet. 

See the service

 IBM Cloud DNS Services

Network

IBM Cloud® DNS Services offers public and private authoritative DNS services with fast response time, unparalleled redundancy and advanced security

See the service

IBM Cloud Gateway Appliances

Network

Gateway appliances are devices that give you enhanced control over network traffic, let you accelerate your network’s performance, and give your network a security boost. Manage your physical and virtual networks for routing multiple VLANs, for firewalls, VPN, traffic shaping and more.

See the service

 IBM Cloud Transit Gateway 

Network

IBM Cloud Transit Gateway helps you connect and manage your IBM Cloud Virtual Private Cloud (VPC) networks. 

See the service

FortiGate Security Appliance

Network

The FortiGate Security Appliance (FSA) 10 Gbps is a hardware firewall that can be configured to protect traffic on multiple VLANs for both public and private networks.

See the service

Hardware Firewall

Network

The Hardware Firewall provides customers with an essential layer of security that is provisioned on demand without service interruptions. It prevents unwanted traffic from hitting your servers, reducing your attack surface, and allowing your server resources to be dedicated for their intended use.

See the service

IBM Key Protect for IBM Cloud

Security

The IBM® Key Protect for IBM Cloud® service helps you provision and store encrypted keys for apps across IBM Cloud services, so you can see and manage data encryption and the entire key lifecycle from one central location.

See the service

IBM Cloud Secrets Manager

Security

With IBM Cloud® Secrets Manager, you can create secrets dynamically and lease them to applications while you control access from a single location. Built on open source HashiCorp Vault, Secrets Manager helps you get the data isolation of a dedicated environment with the benefits of a public cloud.

See the service

 IBM QRadar Suite

Security

IBM Security® QRadar® Suite is a modernized threat detection and response solution designed to unify the security analyst experience and accelerate their speed across the full incident lifecycle. The portfolio is embedded with enterprise-grade AI and automation to dramatically increase analyst productivity, helping resource-strained security teams work more effectively across core technologies.

With a common user interface, shared insights and connected workflows, it offers integrated products for: Endpoint security (EDR, XDR, MDR),  Log management , SIEM,  SOAR

See the service

IBM Cloud Pak for Security

Security

Integrate existing security tools to gain deeper insights into threats and risks, orchestrate actions and automate responses.

See the service

IBM Cloud Hardware Security Module

Security

IBM Cloud Hardware Security Module (HSM) 7.0 from Gemalto protects cryptographic infrastructure by more securely managing, processing and storing cryptographic keys inside a tamper-resistant hardware device. It helps you solve complex security, compliance, data sovereignty and control challenges migrating and running workloads on the cloud.

See the service

IBM Security Guardium

Security

IBM Security® Guardium® is a family of data security software in the IBM Security portfolio that uncovers vulnerabilities and protects sensitive on-premises and cloud data.

See the service

IBM Cloud Storage Services

Storage

Our cloud storage services offer a scalable, security-rich and cost-effective home for your data while supporting traditional and cloud-native workloads. Provision and deploy services such as access object, block and file storage. Adjust capacity and optimize performance as requirements change. Pay only for the cloud storage you need.

See the service

 IBM Cloud Backup

Storage

IBM Cloud® Backup is a full-featured, agent-based backup and recovery system managed through a web interface. Back up data between IBM Cloud servers in one or more IBM Cloud global data centers.

See the service

IBM Cloud Database services

Databases

IBM Cloud® Database-as-a-Service (DBaaS) services free developers and IT from complex and time-consuming tasks including deployment of infrastructure and database software, infrastructure operations, database software updates, and backup. IBM Cloud® Database SMEs deliver and maintain ready-to-use, highly available, database instances freeing developer and IT staff time to focus on other priorities.

See the service

IBM Cloud Container Registry

Containers

Store and distribute container images in a fully managed private registry. Push private images to conveniently run them in the IBM Cloud® Kubernetes Service and other runtime environments. Images are checked for security issues so you can make informed decisions about your deployments.

See the service

IBM Cloud Compute solutions

Compute

 Cloud Computing Services and Solutions 

See the service

 IBM Cloud for VMware Solutions 

Compute

IBM Cloud for VMware Solutions enables you to seamlessly migrate and modernize VMware workloads to the cloud

See the service

IBM Power Virtual Server

Compute

IBM® Power® Virtual Server is a family of configurable multi-tenant virtual IBM Power servers with access to IBM Cloud® services.

See the service

IBM Cloud Kubernetes Service 

Containers

Deploy secure, highly available clusters in a native Kubernetes experience

See the service

11. System and Information Integrity

IBM Cloud Internet Services (CIS)

Network

IBM Cloud Internet Services brings market-leading security and performance to your external web content and internet applications before they reach the cloud.

See the service

IBM Cloud Gateway Appliances

Network

Gateway appliances are devices that give you enhanced control over network traffic, let you accelerate your network’s performance, and give your network a security boost. Manage your physical and virtual networks for routing multiple VLANs, for firewalls, VPN, traffic shaping and more.

See the service

FortiGate Security Appliance

Network

The FortiGate Security Appliance (FSA) 10 Gbps is a hardware firewall that can be configured to protect traffic on multiple VLANs for both public and private networks.

See the service

Hardware Firewall

Network

The Hardware Firewall provides customers with an essential layer of security that is provisioned on demand without service interruptions. It prevents unwanted traffic from hitting your servers, reducing your attack surface, and allowing your server resources to be dedicated for their intended use.

See the service

IBM Cloud Security and Compliance Center - Workload Protection

Security

In architectures that are focused on container and microservices, you can use IBM Cloud® Security and Compliance Center Workload Protection to find and prioritize software vulnerabilities, detect and respond to threats, and manage configurations, permissions, and compliance from source to run.

See the service

 IBM QRadar Suite

Security

IBM Security® QRadar® Suite is a modernized threat detection and response solution designed to unify the security analyst experience and accelerate their speed across the full incident lifecycle. The portfolio is embedded with enterprise-grade AI and automation to dramatically increase analyst productivity, helping resource-strained security teams work more effectively across core technologies.

With a common user interface, shared insights and connected workflows, it offers integrated products for: Endpoint security (EDR, XDR, MDR),  Log management , SIEM,  SOAR

See the service

IBM Security Guardium

Security

IBM Security® Guardium® is a family of data security software in the IBM Security portfolio that uncovers vulnerabilities and protects sensitive on-premises and cloud data.

See the service

IBM Cloud Storage Services

Storage

Our cloud storage services offer a scalable, security-rich and cost-effective home for your data while supporting traditional and cloud-native workloads. Provision and deploy services such as access object, block and file storage. Adjust capacity and optimize performance as requirements change. Pay only for the cloud storage you need.

See the service

 IBM Cloud Backup

Storage

IBM Cloud® Backup is a full-featured, agent-based backup and recovery system managed through a web interface. Back up data between IBM Cloud servers in one or more IBM Cloud global data centers.

See the service

IBM Cloud Database services

Databases

IBM Cloud® Database-as-a-Service (DBaaS) services free developers and IT from complex and time-consuming tasks including deployment of infrastructure and database software, infrastructure operations, database software updates, and backup. IBM Cloud® Database SMEs deliver and maintain ready-to-use, highly available, database instances freeing developer and IT staff time to focus on other priorities.

See the service

IBM Cloud observability solutions

Logging & monitoring

Observability provides deep visibility into modern distributed applications for faster, automated problem identification and resolution.

See the service

12. System and Services Acquisition

IBM Cloud Internet Services (CIS)

Network

IBM Cloud Internet Services brings market-leading security and performance to your external web content and internet applications before they reach the cloud.

See the service

IBM Cloud Container Registry

Containers

Store and distribute container images in a fully managed private registry. Push private images to conveniently run them in the IBM Cloud® Kubernetes Service and other runtime environments. Images are checked for security issues so you can make informed decisions about your deployments.

See the service

IBM Cloud Compute solutions

Compute

 Cloud Computing Services and Solutions 

See the service

 IBM Cloud for VMware Solutions 

Compute

IBM Cloud for VMware Solutions enables you to seamlessly migrate and modernize VMware workloads to the cloud

See the service

IBM Power Virtual Server

Compute

IBM® Power® Virtual Server is a family of configurable multi-tenant virtual IBM Power servers with access to IBM Cloud® services.

See the service

IBM Wazi as a Service

Compute

Accelerate cloud native development and testing of z/OS applications with z/OS Virtual Server in IBM Cloud® Virtual Private Cloud (VPC)

See the service

Continuous Delivery

Developer Tools

Embrace enterprise-ready DevOps. Create secure toolchains that support your app delivery tasks. Automate builds, tests, deployments and more. 

See the service

DevSecOps Application Lifecycle Management

Developer Tools

The DevSecOps Application Lifecycle Management Deployable Architecture creates a set of DevOps toolchains and pipelines. DevSecOps uses continuous delivery (CD) (Git Repos and Issue Tracking, Tekton Pipelines, IBM Cloud® DevOps Insights, and Code Risk Analyzer), Secrets Manager, IBM® Key Protect, IBM Cloud® Object Storage, IBM Cloud® Container Registry, and Vulnerability Advisor.

See the service

IBM Cloud® Code Engine

Developer Tools

IBM Cloud® Code Engine is a fully managed, serverless platform. Bring your container images, batch jobs, source code or function together in one place and let IBM Cloud Code Engine manage and help secure the underlying infrastructure.

See the service

 IBM Cloud Schematics

Developer Tools

Schematics is an IBM Cloud service, that delivers Infrastructure as Code (IaC) tools as a service. You can use the capabilities of Schematics to consistently deploy and manage your cloud infrastructure environments.

See the service

IBM Cloud Kubernetes Service 

Containers

Deploy secure, highly available clusters in a native Kubernetes experience

See the service
Take the next step

Questions about a compliance program? Need a protected compliance report? We can help.

See more compliance programs