Protecting Code Engine resources with context-based restrictions
Context-based restrictions give account owners and administrators the ability to define and enforce access restrictions for IBM Cloud® resources based on the context of access requests. Access to IBM Cloud® Code Engine resources can be controlled with context-based restrictions and identity and access management policies.
These restrictions work with traditional IAM policies, which are based on identity, to provide an extra layer of protection. Unlike IAM policies, context-based restrictions don't assign access. Context-based restrictions check that an access request comes from an allowed context that you configure. Because both IAM access and context-based restrictions enforce access, context-based restrictions offer protection even in the face of compromised or mismanaged credentials. For more information, see What are context-based restrictions.
You must have the Administrator
role on a service to create, update, or delete rules. Additionally, you must have either the Editor
or Administrator
role to create, update, or delete network zones.
Any IBM Cloud Activity Tracker or audit log events generated comes from the context-based restrictions service and not Code Engine. For more information, see Monitoring context-based restrictions.
To get started protecting your Code Engine resources with context-based restrictions, see Creating context-based restrictions.
Context-based restrictions for Code Engine can be scoped to a location (region), project, or resource group. You can also limit which of your services can be accessed from Code Engine.