IBM Cloud Docs
Protecting Code Engine resources with context-based restrictions

Protecting Code Engine resources with context-based restrictions

Context-based restrictions give account owners and administrators the ability to define and enforce access restrictions for IBM Cloud® resources based on the context of access requests. Access to IBM Cloud® Code Engine resources can be controlled with context-based restrictions and identity and access management policies.

These restrictions work with traditional IAM policies, which are based on identity, to provide an extra layer of protection. Unlike IAM policies, context-based restrictions don't assign access. Context-based restrictions check that an access request comes from an allowed context that you configure. Because both IAM access and context-based restrictions enforce access, context-based restrictions offer protection even in the face of compromised or mismanaged credentials. For more information, see What are context-based restrictions.

You must have the Administrator role on a service to create, update, or delete rules. Additionally, you must have either the Editor or Administrator role to create, update, or delete network zones.

Any IBM Cloud Activity Tracker or audit log events generated comes from the context-based restrictions service and not Code Engine. For more information, see Monitoring context-based restrictions.

To get started protecting your Code Engine resources with context-based restrictions, see the tutorial for Leveraging context-based restrictions to secure your resources.

Context-based restrictions for Code Engine can be scoped to a location (region), project, or resource group. You can also limit which of your services can be accessed from Code Engine.