Security design for VPC virtual servers
Security is a foundational component of any cloud architecture, encompassing identity and access management, data protection, network security, and compliance. IBM Cloud provides a comprehensive security framework for both VPC Virtual Server Instances, implementing defense-in-depth strategies across multiple layers of the infrastructure stack.
The key security architecture elements are shown in the following diagram.
For workload migration and deployment, robust security capabilities are essential to maintain confidentiality, integrity, and availability while meeting regulatory and compliance requirements. IBM Cloud's security services integrate with native platform capabilities to provide end-to-end protection for virtualization and container workloads.
Identity and Access Management
IBM Cloud Identity and Access Management (IAM) provides centralized access control for IBM Cloud resources, enabling organizations to manage users, service IDs, access groups, and policies across the entire IBM Cloud platform.
IAM Components
| IAM features | Description |
|---|---|
| Users and Services IDs |
|
| Access groups |
|
| IAM policies |
|
Data Encryption
IBM Cloud provides comprehensive encryption capabilities to protect data at rest and in transit across VPC environments. The following table details each encryption service and the encryption capabilities available with that service.
| Service | Description |
|---|---|
| VPC Block Storage Encryption |
|
| IBM Key Protect |
|
| IBM Hyper Protect Crypto Services |
|
| Service | Description |
|---|---|
| VPC Network Encryption |
|
Network Security
IBM Cloud VPC provides multiple layers of network security controls to protect workloads and control traffic flow.
| VPC security control | Description | Key features |
|---|---|---|
| VPC Security Groups | Security Groups are stateful firewall controls that protect virtual instances on IBM Cloud VPC, with stateful rules where responses are automatically allowed when a request is permitted. |
|
| VPC Access Control Lists (ACLs) | ACLs control traffic to and from subnets, acting as built-in virtual firewalls at the subnet level. |
|
Compliance and Governance
IBM Cloud provides comprehensive compliance capabilities and certifications to meet regulatory requirements across industries.
IBM Cloud Security and Compliance Center Workload Protection
| Feature | Description |
|---|---|
| Posture Management |
|
| Compliance monitoring |
|
| Workload protection |
|
Activity Tracking and Logging
| Feature | Description |
|---|---|
| IBM Cloud Activity Tracker |
|
| VPC Flow Logs |
|
Next steps
Now that you understand the security design for VPC virtual servers, explore these related topics:
- Networking: Review networking security controls including security groups and ACLs
- Compliance: Learn about observability and compliance monitoring
- Storage: Explore storage encryption options for data protection
- Reference architecture: Review the complete VPC virtual server reference architecture