copyright | lastupdated | subcollection | keywords | ||
---|---|---|---|---|---|
|
2024-11-17 |
pattern-sap-on-powervs |
{{site.data.keyword.attribute-definition-list}}
{: #security-design}
Security should be applied at all layers of the solution for defense in depth depending on requirements, for example at the network edge, VPCs, and at every compute instance as well as at the application and database layers. In addition, data should be protected both in transit and at rest according to data classification and controls should be in place to eliminate the need for direct access to the environment(s), and when direct access is needed, all access should be logged and monitored.
It is a best practice to isolate, secure, manage and monitor all ingress and egress traffic to the environment and to centralize these functions in a hub and spoke model through an VPC Landing Zone. As a result, it’s recommended that security and isolation is established using a combination of Security Groups (SG), Network Access Control Lists (NACL) and routing/FW rules defined in the VPC Landing Zone. This is in addition to the cloud account level protection provided in IBM Cloud Identity Services.
Implementation of firewall(s) in the Transit/Edge can secure and route traffic to the IBM Cloud environment as well as from the Customer network.
Enable logging to facilitate the firewall activity analysis if needed to meet client security IPS/IDS requirements.
All traffic, both public and private, should route through the Edge/Transit VPC for routing, isolation, and logging.
To restrict, log and monitor administrative access to the environment, a bastion (jump) host is recommended in the VPC Landing Zone for all administrative access. In addition, all Bastion access and activity should be logged and monitored through Privileged Access Management (PAM) services.
Security is a shared responsibility between cloud provider and customer at both the infrastructure and application layers.