The Strategic Elements Flashcards
(46 cards)
What are the three elements of the value proposition for IBM Cloud?
- Open Hybrid Cloud
- Security Leadership
- Enterprise grade
Explain Business Framing
- Aligns your vision and desired business outcomes
- Confirm executive sponsor, product owner
- Select candidate app workloads
What are the 6 stages of IBM garage client journey?
- Business Framing
- Technical Discovery
- Design Thinking
- Architecture
- Minimum Viable Product build
- Build Out
What is the IBM garage methodology?
A single seamless set of proven agile practices that integrate user experience, implementation & cultural change to guide solutions from idea to enterprise scale adoption
Explain Technical Discovery
- Explore technical areas of interest and nonfunctional requirements, for example applications, security, integration, and edge
- Recommend technical next steps and further discovery as needed to build proposal
Explain Design Thinking
- Business and IT alignment on user experience to meet your business outcome
- Identification of risks and assumptions in your modernization approach such as data security
- A series of minimum viable products and agreement on the next MVP experiment
Explain Architecture (IBM Cloud)
- Define a secure minimum viable architecture that mitigrates risk
- Architect and create an implementation roadmap for a hybrid, multicloud platform and DevOps adoption
Explain Minimum Viable Product Build
- Modernize, deploy and test application on the cloud environment
- Test hypothesis using learning-driven production release against the state business outcome
Explain Build Out
- Iterate across multiple minimum MVPs, refine solution until you achieve the stated business out come
- Become self-sufficient in achieving business results with the IBM Garage Method
- Scale production environment and applications
Why use IBM Cloud for Financial Services?
Only public cloud platform with the framework in place to support regulatory workloads with automated security and industry leading encryption service
What is unique about keep-your-own-key (KYOK)?
Only the IBM Cloud Hyper Protect Crypto Services offering features keep your own key encryption capabilities back by the highest level of security certification FIPS 140-2 Level 4- commercially available
What is the IBM Cloud Framework for Financial Services?
- VMware
- Cloud Native
- Red Hat Open Shift
Explain IBM’s secure and enterprise-grade public cloud
has extensive service deployment options like VMware and Red Hat OpenShift as a service
Why use IBM Cloud for VMware Regulated Workloads?
- Effectively implement and govern security controls in the cloud
- Ensure auditing of all cloud administration
- Protect business critical data assets
- Prioritize meeting IT compliance for various national or industrial entities
What do clients gain with IBM Cloud for VMware Regulated Workloads?
Rapid scalability
Deployment in global data centers
Disaster recovery
Backup & Security
Compliance Solutions
The IBM Cloud for VMware Regulated Workloads uses what policy for framework?
IBM Cloud for Financial Services Policy
which deploys a shared-responsibility model for implementing controls
Name the key attributes and enabling technologies of IBM Cloud for VMware Regulated Workloads
Isolation
Access Restrictions- IAM, Role Based Admin
Policies
Encryption - Key management (BYOK & KYOK)
Compliance
Backup and Data Recovery
Management
Why use IBM Cloud Security Portfolio?
You can:
Manage Access
Protect Data
Gain Visibility-
Optimize Operations
Explain Manage Access as it pertains to IBM Cloud Security
when you create secure cloud enabled solutions you must enable identity and access management so that you can authenticate and authorize a user.
when you’re using infrastructure from the cloud it’s important to manage the identities that are associated with privileged activities, such as tasks done by cloud administrators
You also must track the activities of the people who are involved in development and operations.
You must also manage user and customer access to your cloud applications
Explain Protecting Infrastructure, Application, and Data as it pertains to IBM Security Cloud
In traditional data centers you must provide tenant- specific network and isolation to protect the cloud infrastructure
For application protection you must design a secure development and operation process ( SecDevOPs or DevSecOps) * process includes steps to manage vulnerabilities in VMs, container, and application code
For data protection, your solution must cover techniques to encrypt data at rest, such as files, objects, and storage
* must also include steps for how to monitor data activity and processes to verify and audit data that is outsource
Explain Gain Visibily as it pertains to IBM Securtiy Cloud
You need end to end visibility and integration of security processes and tooling throughout your organization
- You can build improved security and visibility into virtual infrastructure by collecting and analyzing logs in real time across the various components and services in cloud
What two environments can you implement security monitoring and intelligence?
IBM Cloud Foundry Environment - multi tenant public cloud instance
IBM Cloud Kubernetes Service Environment - multi tenant control plane and a single tenant compute node
Explain the architecuture of Security on the cloud
Identity and Access Application Security - App Scanning, Threat Protection Data Security- Activity Monitoring Infrastructure Security Security Intelligence
To secure data protection, what should you consider?
Data Encryption
Block and File Storage
Key Management Services (KMS)
Security Key Lifecycle Manager (SKLM)
Object Storage
Data Services
Certificate Management
Crypto Services