IBM Cloud Data Shield

A security solution for protecting sensitive data in multicloud environments.

Multi-Cloud Proprietary Cloud Service Only
Category Data Security & Encryption
This page updated a month ago
Pricing Details Contact IBM for pricing details.
Target Audience Organizations using multicloud environments that require enhanced data security.

IBM Cloud Data Shield is designed to protect sensitive data both at rest and in use, particularly in multicloud environments. The solution leverages a stateless reverse proxy architecture, known as Data Security Broker - Shield, which intercepts and encrypts application data sent to the database, and decrypts the encrypted data upon retrieval. This approach ensures that even cloud administrators cannot access the sensitive data, enhancing security and compliance.

The technical architecture of Data Shield integrates with Intel Software Guard Extensions (SGX) to create hardware-based trusted execution environments, or enclaves, which protect data in use. This allows for the conversion of container images to SGX counterparts without requiring any code changes, making it seamless to adopt confidential computing within existing DevOps workflows and Kubernetes strategies.

Operationally, Data Shield provides centralized management of encryption keys and policies, enabling granular access controls and auditing of data access across various data sources. This is achieved through non-intrusive integration, eliminating the need for application changes or additional coding. However, it's important to note that managing these encryption keys and policies can introduce complexity, particularly in multi-account or hybrid multicloud setups, where key lifecycle management and auditing must be carefully managed to avoid potential overheads.

From a technical standpoint, Data Shield ensures real-time encryption and decryption with minimal performance impact, but the use of SGX enclaves can impose certain limitations on resource utilization and scalability. Additionally, the solution provides technical assurance through attestation reports, which are crucial for verifying the integrity of the secure enclaves and ensuring compliance with regulatory requirements.

Improve this page