copyright | lastupdated | keywords | subcollection | content-type | account-plan | completion-time | ||
---|---|---|---|---|---|---|---|---|
|
2024-06-07 |
object storage, tutorial, secure stored content, store, content, secure, secure content store |
cloud-object-storage |
tutorial |
standard |
15m |
{{site.data.keyword.attribute-definition-list}}
{: #secure-content-store} {: toc-content-type="tutorial"} {: toc-completion-time="15m"}
Are you looking to store content securely (locally or globally) at an affordable cost, for things like cloud native apps, media storage, backup storage and archive data? IBM Secure Content Store powered by {{site.data.keyword.cos_full}} provides unparalleled agility in supporting fast, highly consistent application deployment around the world to help customers securely expand their business into new regions, from business-critical data to video archive solutions. It also offers immutable storage, immutable backup, and archive data with industry-leading security and controls for regulatory/compliance requirements.
- Gain security and control over your data with encryption options, governance policy, access permissions, and context-based restrictions.
- Have immediate consistency across regions or locations for cloud-native apps, disaster recovery, storage backup, video content and delivery, and so on.
- Leverage your own encryption keys (BYOK) with Key Protect.
- Monitor and retain your account & data activity with Activity Tracker and IBM Monitoring.
- APIs & SDKs, Static Web Hosting, High Speed Transfer, Tagging, Replication.
{: #overview-secure-stored-content}
This tutorial is for customers looking to set up a Secure Content Store using {{site.data.keyword.cos_short}}, Activity Tracker, and Key Protect. In this tutorial, you are guided through the process of quickly getting started with these essential services to ensure the security and integrity of your content. Secure Content Store is comprised of the following services:
- {{site.data.keyword.cos_short}}: a scalable and flexible storage solution that allows you to store and manage your data securely.
- Activity Tracker: a powerful tool that provides comprehensive visibility into the activities happening within your IBM Cloud environment and allows for ease of audit observability.
- Monitoring: to provide insights and information about what is happening with your data in your Secure Content Store.
- Key Protect: a Key Management Service that enables you to manage and protect your encryption keys in a secure and centralized manner.
Throughout the tutorial, you are provided with step-by-step instructions, along with helpful tips and best practices, which can help you set up a Secure Content Store more efficiently. So, let's get started!
{: #high-level-steps} {: steps}
- Set up {{site.data.keyword.cos_short}} to store and manage your data securely.
- Configure Activity Tracker for audit observability of relevant events.
- Add Monitoring for insights and information about what is happening with your data.
- Finally, use Key Protect to manage encryption keys to secure your data stored in {{site.data.keyword.cos_short}}.
{: #secure-content-prereqs}
For this tutorial, you need:
- An {{site.data.keyword.cloud}} Platform account{: external}
- An instance of IBM Cloud Object Storage (must be a paid service plan instance)
{: #create-cos-bucket}
{: #navigate-cos-instance} {: step}
- Go to your instance of IBM Cloud Object Storage.
{: #create-cos-bucket-step} {: step}
-
Select the Customize your bucket tile, and click the right arrow.
- Name the new bucket. It must start and end in alphanumeric characters (from 3 to 63) that is limited to using lowercase, numbers and nonconsecutive dots, and hyphens.
- Choose your desired region and storage class, based on your activity (for example, chose “Standard” storage class for hot data, “Vault” or “Cold Vault” for cold data, or “Smart Tier” for blended or variable data activity.)
-
Add the following services during the bucket creation by scrolling down to Service integrations (optional).
Before you get started, you need:
- An instance of IBM Cloud™ Key Protect
- Grant service authorization to {{site.data.keyword.cos_short}} in IBM Key Protect.
- Toggle Key management disabled to enable encryption and click on Create new instance.
- Choose a region that corresponds with the bucket, give it a memorable name, and click Create and continue.
- Give the
root key
a name and click Create and continue.
Activity Tracker
Before you get started, you need:
- An instance of Activity Tracker
- A user ID with administrator platform permissions and the service access writer role.
- Scroll down to the Monitoring and activity tracking section and toggle the radio button to Activity tracking enabled. Select an appropriate plan, and give the new instance a memorable name. As you may likely want to create the Activity Tracker instance in the same region as the bucket (for example,
us-east
) you could name the instance something likeUS East AT
so that you can easily find it later. - Click to enable Track data events and select both read & write from the drop-down list.
Monitoring
Before you start, you need:
- An instance of IBM Cloud™ Monitoring
- A user ID with administrator platform permissions and the service access writer role.
- Scroll down to the Monitoring and activity tracking section and toggle the radio button to Monitoring enabled. Select an appropriate plan, and give the new instance a memorable name. For example, if you are creating the instance in the same region as the bucket (for example,
us-east
) you could name the instanceUS East MM
so that you can easily find it later. - Enable monitoring for both usage and request metrics.
{: #verify-cos-bucket} {: step}
{: #click-cos-bucket} {: step}
After your bucket is created with Activity Tracker and Monitoring, it may take a few minutes for the rules to take effect. {: attention}
You are now ready to store data in a secure content store with encryption, monitoring, and audit observability!
{: #upload-data}
- See uploading data for more information.
{: #add-capabilities}
Add capabilities to protect objects from ransom-ware and accidental deletion such as versioning and immutable retention polices for supporting immutable storage, and immutable backup and archive data.
{: #cos-tutorials}
Check out the IBM Cloud Tutorials library for more tutorials when deploying solutions with Cloud Object Storage.