Preparing to secure your cluster

When you install IBM® Cloud Private, you create a secure connection from the boot node to all other nodes in your cluster. You can either set up SSH or set up password authentication in your cluster. For installation steps, see Installing IBM Cloud Private Cloud Native, Enterprise, and Community editions.

After you install, you can secure the access to your cluster through role-based access control (RBAC), single sign-on (SSO), and Lightweight Directory Access Protocol (LDAP). You can manage Helm repositories, and create namespaces, teams, and security policies for pods and containers. For more information, see the Security guide.

Security considerations

As you design your security for IBM Cloud Private, you must understand the following information:

Interacting with IBM Cloud Private

Understanding who and how people interact with the cluster helps you to configure IAM. To determine the access and authorizations, you must understand the target operations model for the clusters that you are using. Ask the following questions:

Pay special attention to the different integration points, such as the continuous integration and continuous delivery (CICD), as these points determine the different service accounts and the authorizations that the accounts need.

When you use a CICD deployment tool with permissions to deploy containers, you must limit access and deployments with a service account and not allow any other user to create these deployments.

For more information, see Configuring LDAP connection and Pod isolation in the Security guide.

Handling certificates

Certificates are used for the following interactions:

Certificate lifecycle is managed either manually or by using the IBM Cloud Private Certificate manager (cert-manager) service:

For more information, see the following topics:

Data encryption

Data in transit:

Data at rest:

You can encrypt the file systems that are used by IBM Cloud Private with Linux® Unified Key Setup (LUKS) encryption in Linux. Ensure that your system has available disk space. dm-crypt provides transparent encryption of block devices. You can access the data immediately after you mount the device. By default, data in transit encryption is disabled in your IBM Cloud Private cluster.

For more information, see the following topics:

Securing your images

IBM Cloud Private has a private image repository that is based on the Docker registry within the cluster. The following list highlights some of the benefits of using IBM Cloud Private to secure your images:

You can restrict which repository images can be deployed from. You can also enforce Vulnerability Advisor policies. If an image does not meet defined policy requirements, the pod is not deployed. If you use the Vulnerability Advisor, the internal image repository needs to be used.

Securing your containers

When you secure your containers, the main goal is to provide visibility, control, and analytics to access and enforce security and compliance on your applications and data that are running in the private cloud. You can achieve these goals with Vulnerability Advisor and Mutation Advisor.

Vulnerability Advisor benefits:

Are your containers unmutable?

With IBM Cloud Private, you can track changes of a container on files and processes. System integrity monitoring is an important part of several compliance and audit requirements, including Payment Card Industry Data Security Standard (PCI/DSS).

The Mutation Advisor continuously monitors containers for the state of files and processes at a given sampling. It reports modular changes in the state on the Mutation Advisor user interface that is in the profile whitelist, as normal changes for the container. The reports can be viewed as notifications of mutations on a container by container basis, and a timeline for each container. Mutation Advisor fills an existing gap in requirements for container integrity monitoring.

For more information, see Vulnerability Advisor.