IBM Cloud Docs
Tagging IBM Cloud resources and managing access with tags

Tagging IBM Cloud resources and managing access with tags

All IBM Cloud resources in your account should be tagged with security attributes that you define. Apply user tags to organize your resources and easily find them later, to help you with identifying specific team usage or cost allocation, and to control access to your resources without requiring updates to your IAM policies.

For more information, see:

Example tagging scheme

The IBM Cloud Framework for Financial Services doesn't require a specific set of tags that must be used, but they should be meaningful for your application. For illustration, you might use a scheme such as the one outlined.

In this example, it is suggested that you use one the following impact levels from Federal Information Processing Standards Publication 199:

  • fips199-high: The loss of confidentiality, integrity, or availability could be expected to have a severe or catastrophic adverse effect on organizational operations, organizational assets, or individuals.
  • fips199-moderate: The loss of confidentiality, integrity, or availability could be expected to have a serious adverse effect on organizational operations, organizational assets, or individuals.
  • fips199-low: The loss of confidentiality, integrity, or availability could be expected to have a limited adverse effect on organizational operations, organizational assets, or individuals.

In addition, for services that store data, it is suggested that you use one or more of these tags corresponding to different kinds of data:

  • audit: Audit logs or archives
  • public: Publicly accessible, such as Cloud Object Storage buckets that hold public documentation or samples
  • consumer-owned-data: Data owned by the consumer
  • consumer-metadata: Metadata owned by the consumer
  • regulated-data: Data that is regulated

Next steps

If using the VPC reference architecture, then see:

If using the Satellite reference architecture, then see: