IBM Cloud Docs
Securing your service

Securing your service

  1. Context-based restrictions give account owners and administrators the ability to define and enforce access restrictions for IBM Cloud resources based on the context of access requests. Access to Cloud Databases resources can be controlled with context-based restrictions and Identity and Access Management (IAM) policies. For more information, see Protecting your Cloud Databases instance with context-based restrictions.
  2. To restrict access to your databases, allowlist specific IP addresses or ranges of IP addresses on your deployment. Using IBM Cloud's native context-based restrictions is recommended over using the allowlist, which is deprecated. For more information, see Allowlisting.
  3. Disaster recoveryThe ability of IT services to recover from rare but major incidents and non-transient, wide-scale failures, such as service disruption that affects an entire geographical area. The impact of such an incident exceeds the ability of the high availability design to handle it. See also high availability, recovery time objective, recovery point objective. involves a set of policies, tools, and procedures for returning a system, an application, or an entire data center to full operation after a catastrophic interruption. It includes procedures for copying and storing an installed system's essential data in a secure location, and for recovering that data to restore normalcy of operation. For more information, see Understanding business continuity and disaster recovery for Cloud Databases.

Next steps

You've now provisioned a Cloud Databases service instance, set up notifications and monitoring, and secured it. Next, jump into the specific Getting Started documentation for your chosen service.