Skip to content

Security for hybrid cloud/mainframe applications

Application and data running on the IBM zSystems platform are often mission-critical to the business, and they require the highest levels of security available. As public cloud applications increasingly need to access mainframe applications and data, the expectation is for the same level of enterprise-grade security across a hybrid multicloud platform.

IBM Cloud is designed for enterprise and regulated workloads and has developed many security services based on IBM Z platform security features to support both IBM Cloud’s own platform architecture and offered as cloud services to clients.

Challenges

Client face several challenges:

  • Data security in the public cloud
  • Hybrid multi-cloud security
  • Protection from cloud admins and other privileged users
  • Absolute control of data even from authorities/agencies

This article describes how you can integrate your mainframe applications in the cloud and provide security of your data and its access.

Key

Mainframe app modernization in IBM Cloud

  • Built-in confidential computing and zero trust feature support
  • Identification of security vulnerabilities
  • Unique service, Unified Key Orchestrator (UKO), to handle keys in a secure way across clouds and on-prem with the highest possible security

Security architecture pillars

IBM Cloud platform offers multiple security services across IaaS, PaaS, and SaaS layers to implement these three pillars:

  • Platform security control. Identity and application security services will allow authenticated users and services access to only authorized resources.
  • Data protection. Protect the data while it

    • Traverses on hybrid cloud network (data-in-transit)
    • Is being processed in the compute subsystem (data-in-use)
    • Is stored across multiple places (data-at-rest)
  • Compliance visibility and control using:

    • Key Management Services (KMS) such as Key Protect (KP) and Hyper Protect Crypto Services (HPCS)
    • Confidential computing features such as Hyper Protect Family of services including IBM Cloud Hyper Protect Virtual Servers (HPVS)
    • Secure, comply and manage cloud and containerized application ecosystems with a comprehensive Cloud-Native Application Protection Platform (CNAPP) solution suite, IBM Cloud Security and Compliance Center
    • Unique security posture management services to enable easier logging, monitoring, auditing, and regulatory compliance management

Security architecture

The following diagram shows how network traffic to the enterprise workloads in IBM Cloud is controlled through network threat protection services to block external attacker, segment internal networks, and provide context-based network segregation.

network flow security

In addition, identity and application security services will allow authenticated users and services access to only authorized resources.

Compliance visibility and control

IBM Cloud provides two types of Key Management Services (KMS) to protect enterprise workload’s data through encryption.

Key Protect

Key Protect (KP) which provides ‘Bring-Your-Own-Key (BYOK)’ offering based on a multi-tenant crypto card hardware (Hardware Security Module (HSM)). This provides the operational assurance to enterprise encryption needs in line with most of the other hyperscalers like Azure and AWS. This is FIPS 140-2 Level 3 certified. See Key Protect

Cloud Hyper Protect Crypto Services

IBM Cloud Hyper Protect Crypto Services manages client in IBM Cloud, and it is FIPS 140-2 Level 4 certified, which is the industry’s highest certification for a Hardware Security Module (HSM). With the functionality of Keep Your Own Key (KYOK), keys are solely owned and managed by the clients.

Technical assurance

Hyper Protect Crypto Services provides technical assurance to enterprise encryption needs which is based on confidential computing and FIPS 140-2 Level 4 certified HSMs.

The ‘technical assurance’ is ensured as even IBM Cloud administrators cannot access the encryption keys,

The feature is unique to IBM Cloud.

The following diagram shows high-level reference architecture of a modern mainframe application being secured both at the development and production phases using HPCS centric KYOK feature.

kyok

The diagram illustrates:

  • Custom image built using Wazi builder to provision a z/OS VSI for dev/test within IBM Cloud VPC is protected by Hyper Protect Crypto Service using KYOK.
  • As the mainframe application brought from an on-premises LPAR which are used to develop and test mainframe applications within IBM Cloud are encrypted using an encryption key owned and managed exclusively by the enterprise owner which assures full data security.
  • HPCS service can also be used to provide the additional protection through TLS server certification offload mechanism to help protect the mainframe application on the wire.
  • The protection of mainframe application residing in databases and storage is done using HPCS integrations to these services.
  • The applications and data during compute runtime are also protected through Hyper Protect services within IBM Cloud VPC, VPC may also include VMWare for IBM Cloud workloads, container workloads and other virtual machine-based workloads.
  • The compliance checks and validation of the solution can be done using IBM Cloud based service called Security and Compliance Center (SCC), both during development within IBM Cloud VPC and during pre-prod testing of these enterprise applications in on-premises IBM zSystem LPARs.

For more information, see Hyper Protect Crypto Services.

Unified Key Orchestrator

IBM Cloud’s security services can also be extended to hybrid-cloud-centric enterprise workloads through the Unified Key Orchestrator.

The following illustration shows the key management enterprise applications deployed across this hybrid multicloud platform can be provided by HPCS/UKO service with single pane of glass.

Multi cloud data security

For more information, see Unified Key.

Cloud Security and Compliance Center

Address hybrid cloud, multicloud and containerized application security from code to cloud with a comprehensive Cloud-Native Application Protection Platform (CNAPP) solution suite. Centrally manage your organization’s security, risk and compliance to regulatory standards, enable security and DevOps teams, secure sensitive data and protect workloads with real-time threat detection and vulnerability management.

For more information, see IBM Cloud Security and Compliance Center product page.

To get started, sign in to your IBM Cloud account to Manage the security and compliance of your workloads.

Quantum-safe crytopgraphy

As cyberattacks continue to increase, the cost and reputation impacts of data breaches remain a top concern across all enterprises. Even if sensitive data is encrypted and is of no use now, cybercriminals are harvesting that data because they might gain access to a quantum computer that can break classical cryptographic algorithms sometime in the future. Therefore, organizations must start protecting their sensitive data today by using quantum-safe cryptography.

This IBM® Redbooks® publication reviews some potential threats to classical cryptography by way of quantum computers and how to make best use of today’s quantum-safe capabilities on the IBM Z platform. This book also provides guidance about how to get started on a quantum-safe journey and step-by-step examples for deploying IBM Z® quantum-safe capabilities.

This publication is intended for IT managers, IT architects, system programmers, security administrators, and anyone who needs to plan for, deploy, and manage quantum-safe cryptography on the IBM Z platform. The reader is expected to have a basic understanding of IBM Z security concepts.

See Redbook: Transitioning to Quantum-Safe Cryptography on IBM Z

Next steps

See:

Reference