IBM Cloud Docs
Compliance monitoring

Compliance monitoring

You are required to continuously monitor for possible security flaws and changes in baseline configurations for which you should take corrective action. With Security and Compliance Center you can embed security checks into your every day workflows to help monitor for security and compliance. By monitoring for risks, you can identify security vulnerabilities and quickly work to mitigate the impact and fix the issue. By using Security and Compliance Center along with external integrations (such as, OpenShift Compliance Operator (OSCO), Tanium, NeuVector, and so on), you can build a robust approach for monitoring for security and compliance issues.

Using Security and Compliance Center

Security and Compliance Center provides a number of pre-defined profiles. Each profile is a collection of controlsA technical, administrative, or physical safeguard designed to meet a set of defined security and privacy requirements. Controls exist to prevent, detect, or lessen the ability of a threat to exploit a vulnerability. , and each control has one or more goals. Goals are pre-defined automated tests used to evaluate your posture against a control.

Running a scan against a specific profile does not ensure regulatory compliance. The scan is intended to provide a point in time statement of your current posture for a specific group of resources.

The IBM Cloud for Financial Services profile provides a tailored set of goals that are mapped to the IBM Cloud Framework for Financial Services control requirements. This profile should always be used when leveraging the VPC reference architecture.

In addition, if you are using Red Hat OpenShift on IBM Cloud (whether in the VPC reference architecture or the Satellite reference architecture), then you should leverage the Red Hat OpenShift on IBM Cloud Compliance Operator (OSCO) (OSCO) via the OSCO integration with SCC.

To start evaluating your resources, see the Getting started with Security and Compliance Center

Next steps


  1. Includes VPC, Dedicated hosts for VPC, Auto Scale for VPC, Application Load Balancer for VPC, VPN for VPC, DNS Services, and VPE for VPC. ↩︎

  2. Satellite-enabled service which runs in your Satellite location. ↩︎