by Henrik Loeser (data_henrik) | Oct 4, 2023 | administration, IBM, ibmcloud, IT, security
Cleaning up unused cloud privilegesRegular account cleanup is part of account administration and security best practices, not just for cloud environments. So it is great when your cloud provider offers functionality to analyse the security setup and to detect unused...
by Henrik Loeser (data_henrik) | Jul 5, 2023 | administration, DB2, ibmcloud, IT, security
Security feature in action: Trusted ProfileI trust you to know my old blog post about trusted contexts. Some years ago, I explained how to secure your Db2 database using trusted contexts. By establishing a trusted relationship based on specified attributes, the Db2...
by Henrik Loeser (data_henrik) | May 9, 2023 | administration, ibmcloud, IT, json, Kubernetes, linux, security
Today, it is once again time for one of those “let’s document it” blog posts. Lately, I looked into one of the IBM Cloud security features, trusted profiles based on compute resources. I described how to turn your container into a trusted identity....
by Henrik Loeser (data_henrik) | Apr 20, 2023 | bluemix, cloudfoundry, IBM, ibmcloud, IT, Python
One of my first cloud appsRecently, I tried out a feature of IBM Cloud Code Engine: Deploying my app directly from source code. It was a simple app, but it failed. I was stunned and investigated the problem. To my surprise, I could have known it because it was...
by Henrik Loeser (data_henrik) | Mar 30, 2023 | cloud, IBM, ibmcloud, IT, terraform
I am a regular user of the IBM Cloud provider plugin for Terraform. I use Terraform with the command line on my local machine or with IBM Cloud Schematics as managed service. Often, I am testing and evaluating new features. Sometimes, I face the situation where not...
by Henrik Loeser (data_henrik) | Mar 24, 2023 | administration, github, IBM, ibmcloud, IT, Python, security
ER diagram for cloud security dataRecently, I looked into how to analyze the access management setup of my IBM Cloud account. I wanted to better understand what kind of access policies exist, what service instances are covered by rules and policies, etc. In the past,...
Recent Comments