IBM Cloud Docs
Security and compliance overview

Security and compliance overview

IBM® Event Streams for IBM Cloud® is built on the best industry standards and provides tools and options to manage security, compliance, encryption, authentication, and restrictions that might be required.

The following topics guide you through all of the security resources for the service:

  • Understanding security and compliance: The service's certifications and security standards are listed and explained.
  • Managing authentication: Event Streams offers two authentication methods and lets you manage access to your resources.
  • Managing encryption: For use cases that require a higher level of security than the default data encryption, you can use different IBM Cloud® key management services to control encryption with customer-managed keys.
  • Restricting network access: Event Streams instances are accessible over the public internet by default. However, you can can use network type or context-based restrictions to restrict the network connectivity.
  • Using IAM IP address access restrictions: Learn how to enable IAM IP address access restrictions.
  • Managing security and compliance: Use the Security and Compliance Center to help you manage security and compliance for your organization.