by Henrik Loeser (data_henrik) | Oct 4, 2023 | administration, IBM, ibmcloud, IT, security
Cleaning up unused cloud privilegesRegular account cleanup is part of account administration and security best practices, not just for cloud environments. So it is great when your cloud provider offers functionality to analyse the security setup and to detect unused...
by Henrik Loeser (data_henrik) | Jul 5, 2023 | administration, DB2, ibmcloud, IT, security
Security feature in action: Trusted ProfileI trust you to know my old blog post about trusted contexts. Some years ago, I explained how to secure your Db2 database using trusted contexts. By establishing a trusted relationship based on specified attributes, the Db2...
by Henrik Loeser (data_henrik) | May 9, 2023 | administration, ibmcloud, IT, json, Kubernetes, linux, security
Today, it is once again time for one of those “let’s document it” blog posts. Lately, I looked into one of the IBM Cloud security features, trusted profiles based on compute resources. I described how to turn your container into a trusted identity....
by Henrik Loeser (data_henrik) | Mar 24, 2023 | administration, github, IBM, ibmcloud, IT, Python, security
ER diagram for cloud security dataRecently, I looked into how to analyze the access management setup of my IBM Cloud account. I wanted to better understand what kind of access policies exist, what service instances are covered by rules and policies, etc. In the past,...
by Henrik Loeser (data_henrik) | Oct 25, 2022 | administration, DB2, IBM, IT, json, security
JSON Web Token support in Db2Right now, I am at the IDUG 2022 EMEA Db2 Tech Conference in Edinburgh, Scotland. It’s great to have an in-person event again, to network and to discuss. This year, there are many sessions covering Db2 security and they are...
by Henrik Loeser (data_henrik) | Sep 6, 2022 | administration, data in action, IBM, ibmcloud, IT, json, Python, security
Custom role for operating Code EngineCybersecurity is always in a state of change. There are new security features and new attack methods – or was it the other way? Over the past months, several new security features were added to IBM Cloud. In this blog post, I...
Recent Comments