IBM Cloud Docs
Securing your service

Securing your service

  1. Context-based restrictions give account owners and administrators the ability to define and enforce access restrictions for IBM Cloud resources based on the context of access requests. Access to Cloud Databases resources can be controlled with context-based restrictions and Identity and Access Management (IAM) policies. For more information, see Protecting your Cloud Databases instance with context-based restrictions.
  2. To restrict access to your databases, allowlist specific IP addresses or ranges of IP addresses on your deployment. Using IBM Cloud's native context-based restrictions is recommended over using the allowlist, which is deprecated. For more information, see Allowlisting.
  3. Disaster recoveryThe ability of a service or workload to recover from rare, major incidents and wide-scale failures, such as service disruption. This includes a physical disaster that affects an entire region, corruption of a database, or the loss of a service contributing to a workload. The impact exceeds the ability of the high availability design to handle it. involves a set of policies, tools, and procedures for returning a system, an application, or an entire data center to full operation after a catastrophic interruption. It includes procedures for copying and storing an installed system's essential data in a secure location, and for recovering that data to restore normalcy of operation. For more information, see Understanding business continuity and disaster recovery for Cloud Databases.

Next steps

You've now provisioned a Cloud Databases service instance, set up notifications and monitoring, and secured it. Next, jump into the specific Getting Started documentation for your chosen service.