copyright | lastupdated | keywords | subcollection | ||
---|---|---|---|---|---|
|
2022-11-05 |
byok and kyok, schematics byok, schematics kyok, key management service |
schematics |
{{site.data.keyword.attribute-definition-list}}
{: #secure-data}
Review what data is stored and encrypted when you use {{site.data.keyword.bplong_notm}}, and how you can delete any personal data. {: shortdesc}
To ensure that you can securely manage your data when you use {{site.data.keyword.bpshort}}, it is important to know exactly what data is stored and encrypted and how you can delete any stored data. Data encryption by using customer-managed keys is supported by using {{site.data.keyword.keymanagementserviceshort}} and {{site.data.keyword.hscrypto}} with {{site.data.keyword.bpshort}}. {: shortdesc}
{: #data-storage}
All data, user inputs and the data generated at runtime during execution of automation code, are stored in {{site.data.keyword.cos_full_notm}}. This data is encrypted at rest by envelope encryption{: term} technique by using a root key that is selected for each geographical location. The root keys are secured by FIPS 140-2 Level 3
certified cloud-based hardware security modules (HSMs){: term}. {{site.data.keyword.bpshort}} support encryption with the root keys by using following encryption.
- {{site.data.keyword.bpshort}} owned root key.
- Bring your own key (BYOK) by integrating with Key Protect.
- Keep your own key (KYOK) by integrating with Hyper Protect Crypto Services (HPCS)
Key protect offers manual and automatic key rotation. When you rotate a root key, the registered key is used to re-encrypted {{site.data.keyword.bpshort}} resources with a new key version. You can access the {{site.data.keyword.bpshort}} resources metadata such as details until the rotation completes. {: shortdesc}
{: #key-delete}
Key Deletion is a destructive action. When you disable or delete a root key that is used to encrypt your {{site.data.keyword.bpshort}} resources, you cannot access transactional data such as activity or job logs, resource list, variable store. However, you can access the metadata details. Furthermore any subsequent deployment or configuration operation through {{site.data.keyword.bpshort}} result in failure. Key deletion or disable events are sent to the {{site.data.keyword.la_full_notm}} {{site.data.keyword.at_short}}. {: shortdesc}
{: #key-enable}
When you can enable or restore a root key, the {{site.data.keyword.bpshort}} resources transactional data that is inaccessible due to disabled or deleted root key is now accessible. You can also use {{site.data.keyword.bpshort}} resources for deployment or configuration operations. Key enable or restore events are sent to the {{site.data.keyword.la_full_notm}} {{site.data.keyword.at_short}}. {: shortdesc}
{: #pi-data}
The following details are stored when you create and use an {{site.data.keyword.bpshort}} Workspace:
- Workspace details
- Workspace variables
- Terraform configuration files that your workspace points to
- Terraform state files
- Terraform log files
- User activity logs
{: #pi-location}
By default, all information that is stored in {{site.data.keyword.bpshort}} is encrypted in transit and at rest. To make your data highly available, all data is stored in one location and replicated to another location in the same geography. Make sure that your data can be stored in these locations before you start {{site.data.keyword.bpshort}}. {: shortdesc}
Geography/ location | API endpoint | Data stored | Data replicated |
---|---|---|---|
North America | Public https://us.schematics.cloud.ibm.com https://cloud.ibm.com/schematics/overview Private https://private-us.schematics.cloud.ibm.com (Deprecated) |
Workspaces that are created with this endpoint and all associated data are stored in the US. | Data is replicated between two locations in the US. |
Dallas | Public https://us-south.schematics.cloud.ibm.com Private https://private-us-south.schematics.cloud.ibm.com |
Workspaces that are created with this endpoint and all associated data are stored in the Dallas location. | Data is replicated between two locations in the US. |
Washington | Public https://us-east.schematics.cloud.ibm.com Private https://private-us-east.schematics.cloud.ibm.com |
Workspaces that are created with this endpoint and all associated data are stored in the Washington location. | Data is replicated between two locations in the US. |
Europe | Public https://eu.schematics.cloud.ibm.com Private https://private-eu.schematics.cloud.ibm.com (Deprecated) |
Workspaces that are created with this endpoint and all associated data are stored in Europe. | Data is replicated between two locations in Europe. |
Frankfurt | Public https://eu-de.schematics.cloud.ibm.com Private https://private-eu-de.schematics.cloud.ibm.com |
Workspaces that are created with this endpoint and all associated data are stored in Frankfurt. | Data is replicated between two locations in Europe. |
London | Public https://eu-gb.schematics.cloud.ibm.com Private https://private-eu-gb.schematics.cloud.ibm.com |
Workspaces that are created with this endpoint and all associated data are stored in London. | Data is replicated between two locations in Europe. |
{: caption="Location information" caption-side="bottom"} |
{: #pi-encrypt}
The following image shows the main {{site.data.keyword.bplong_notm}} components, how they interact with each other, and how customer-managed Key Protect, and {{site.data.keyword.hscrypto}} are used to encrypt the data? {: shortdesc}
{: caption="{{site.data.keyword.bplong_notm}} architecture and data encryption process" caption-side="bottom"}
- A user sends a request to create an {{site.data.keyword.bpshort}} Workspaces to the {{site.data.keyword.bpshort}} API server.
- The API server retrieves the Terraform template and input variables from your GitHub or GitLab source repository, or a tape archive file (
.tar
) that you uploaded from your local machine. - All user-initiated actions, such as creating a workspace, generating a Terraform execution plan, or applying a plan are sent to RabbitMQ and added to the internal queue. RabbitMQ forwards requests to the {{site.data.keyword.bpshort}} engine to execute the action.
- The {{site.data.keyword.bpshort}} engine starts the process for provisioning, modifying, or deleting {{site.data.keyword.cloud_notm}} resources.
- To protect customer data at rest, {{site.data.keyword.bplong_notm}} integrates with {{site.data.keyword.keymanagementserviceshort}} and {{site.data.keyword.hscrypto}}. {{site.data.keyword.bpshort}} uses the customer owned {{site.data.keyword.keymanagementserviceshort}} or {{site.data.keyword.hscrypto}} and {{site.data.keyword.bpshort}} owned {{site.data.keyword.keymanagementserviceshort}} to generate and encrypt data encryption keys (DEK). This DEK is used to encrypt transactional data, such as logs, or the Terraform
tf.state
file at rest. - Workspace transactional data is stored in an {{site.data.keyword.cos_full_notm}} bucket and encrypted by using Server-Side Encryption with {{site.data.keyword.keymanagementserviceshort}} at rest.
- Workspace operational data, such as the workspace variables and Terraform template information, is stored in {{site.data.keyword.cloudant}} and encrypted at rest by using the default service encryption. For more information, see Security.
{: #delete-data}
To remove your data from {{site.data.keyword.bplong_notm}}, choose among the following options:
- Delete the workspace: When you delete your workspace, all data that is related to a workspace is permanently deleted.
- Open an {{site.data.keyword.cloud_notm}} support case: Contact IBM Support to remove your workspaces and any associated data by opening a support case. For more information, see Getting support.
- End your {{site.data.keyword.cloud_notm}} subscription: A {{site.data.keyword.bpshort}} cleanup job runs multiple times a day to verify that all workspaces that are stored with IBM belong to an active {{site.data.keyword.cloud_notm}} account. If no active account is found, the workspace and all associated data are deleted.