Enhancing security for instances on IBM Cloud

Securing your IBM watsonx Orchestrate instance on IBM Cloud is essential for protecting sensitive data, maintaining compliance, and ensuring operational integrity. IBM provides a suite of security features and configurations that allow you to tailor protection to your organization’s needs.

This section outlines key security capabilities and how to implement them effectively.

Activity tracking

Enable auditing and monitoring by routing system-generated events to an activity tracker. This helps you:

  • Monitor user actions and system events
  • Maintain audit trails for compliance
  • Detect anomalies and unauthorized access

For more information, see Activity tracking events for IBM watsonx Orchestrate on IBM Cloud.

IP allowlisting

Control access to your instance by specifying which IP addresses are permitted or blocked. This helps:

  • Prevent unauthorized access
  • Enforce network-level security policies
  • Support secure integration with trusted systems

For more information, see Allowing specific IP addresses.

High availability & disaster recovery

Learn how IBM® watsonx Orchestrate® ensures resilience through:

  • Redundant infrastructure
  • Automated failover mechanisms
  • Recovery strategies for unexpected outages

For more information, see High availability, business continuity, and disaster recovery for watsonx Orchestrate.

TLS tunnel configuration

Secure data in transit by setting up a TLS tunnel. This ensures:

  • Encrypted communication between services
  • Protection against man-in-the-middle attacks
  • Compliance with enterprise-grade security standards

For more information, see Configuring TLS tunnel.