IBM Cloud Docs
Getting started with IBM Cloud Security and Compliance Center Data Security Broker

Getting started with IBM Cloud Security and Compliance Center Data Security Broker

Overview

Protect your data in the cloud with the IBM Cloud Data Security Broker, which is a complete data encryption solution that secures sensitive data in enterprise databases by integrating with key management and databases to provide application-level encryption.

Data Security Broker is a software that makes data breaches irrelevant by ensuring data remains encrypted, not only when it is stored but also when it is being processed by databases and applications.

Data Security Broker offers Data encryption services which consists of two main components, namely:

IBM Cloud Security and Compliance Center Data Security Broker Manager is the administrative console for the solution that integrates with enterprise key managers and databases and manages the Data Security Broker solution components.

IBM Cloud Security and Compliance Center Data Security Broker Shield is the SQL proxy that functions to encrypt and decrypt data at the field or record level.

Data Security Broker Manager enforces encryption policies and configurations by:

  • Communicating with key management solutions, the Data Security Broker Shield, and databases.
  • Orchestrating configuration and deployment.

Data Security Broker Shield is a stateless proxy that intercepts and encrypts application data sent to the database and decrypts encrypted data.

Data Security Broker provide a range of data encryption services such as data encryption, data tokenization, record level encryption, and data masking.

Data Security Broker supports only PostgreSQL database.

Setting up your environment

Before you begin

Before you begin installing and configuring the Data Security Broker, ensure that you have met the following requirements:

  • Create an IBM Cloud account.
  • Set up your environment.
  • Set up the minimum permissions required in the IBM Cloud account.

Ensure that your environment meets the following minimum system level and resource level requirements:

Table 1. Resource level requirements for Data Security Broker
Cluster Operating System Number of Worker nodes required
Red Hat® OpenShift® cluster RHEL7/RHEL8 and CoreOS 2
IBM Cloud Kubernetes cluster Ubuntu 18 2

Minimum permissions required to install, set up, and access Data Security Broker

As an IBM Cloud user, you need to set the follwoing minimum permissions to install, set up and access Data Security Broker. By using the following steps and the information in the table, assign the required permissions:

  1. Log into your IBM Cloud account and click Manage -> Access (IAM).
  2. In the Manage access and users dashboard, click View all in the My user details section.
  3. In the Access tab, click Assign access +. From the Table 2, select a service and click Next.
  4. In the Roles and actions section, select the specified permissions that are required.
  5. Click Add and Assign to assign the permissions required.
Table 3. Permissions required for Data Security Broker
Service Name Permission level
Key Protect Writer
IBM Cloud® Object Storage Manager
Kubernetes Service Manager, Editor
IBM Red Hat OpenShift Kubernetes Service Editor
Schematics Manager, Administrator

You can find details about platform roles and the actions mapped to each of the role in the table below:

Table 4. Platform roles and their actions
Platform Roles Description
Administrator As an administrator, you can perform all platform actions based on the resource this role is being assigned, including assigning access policies to other users.
Editor As an editor, you can perform all platform actions except for managing the account and assigning access policies.
Operator As an operator, you can perform platform actions required to configure and operate service instances, such as viewing a service's dashboard.
Viewer As a viewer, you can view service instances, but you can't modify them.

Sizing Guidelines

The factors that affect the sizing of the Data Security Broker deployments consist of the Data Security Broker Manager management console and one or more Data Security Broker Shield proxies. Each component has its own resource needs depending on the anticipated workloads.

Data Security Broker Manager

In general, resources allocated to a Data Security Broker Manager deployment needs to be scaled with the number of managed Data Security Broker Shields and the number of concurrent users using the Data Security Broker Manager.

Data Security Broker Shield

The general rule for Data Security Broker Shield sizing, to handle peak utilization scenarios, is to match the sum of all Data Security Broker Shield's memory and CPU allocations to that of the database instance. The initial vCPU and memory requests for the pod installation can start low and can be scaled up based on utilization, based on pod scaling policies, and depending on the workload in a particular installation. Resource allocation to Data Security Broker Shield deployments typically scales with the expected maximum number of concurrent connections.

Data Security Broker Shield consists of a single container that runs in its own pod. The Data Security Broker Shield pod can be in the same or different cluster but must have network connectivity to Data Security Broker Manager.

Minimum system requirements for deploying in IBM Cloud Kubernetes cluster (IKS) or Red Hat® OpenShift® Kubernetes (ROKS) cluster:

Table 2. Sizing guidelines
Product Container/service IKS/ROKSVersion vCPU Memory Disk Space
Data Security Broker (DSB) Manager DSB-manager IKS v 1.17+, ROKS v 4.8.54+ 4 8 GB 5 GB
Data Security Broker (DSB) Shield DSB-shield IKS v 1.17+, ROKS v 4.8.54+ 2 8 GB (No persistent volume necessary)

After the environment is set up and you have the required roles and permissions, and sizing guidelines defined, you can start setting installing the Data Security Broker by following the instructions in the Installing Data Security Broker section.

Next Steps

Now that you have an understanding of the various entities that exist within Data Security Broker, and that you have setup the environment to install the Data Security Broker, the following diagram details the user flows that you might be helpful when you are working with Data Security Broker.

Encryption flow
Figure 1. User Workflow