Protect your Code Engine functions |
Henrik's thoughts on life in IT, data and information management, cloud computing, cognitive computing, covering IBM Db2, IBM Cloud, Watson, Amazon Web Services, Microsoft Azure and more.
Friday, March 15, 2024
Authentication for your IBM Cloud Code Engine functions
Thursday, January 25, 2024
Tutorial on cloud end-to-end security - an overview
Cloud solution architecture |
Recently, my team updated our tutorial on applying end-to-end security to a cloud application. The tutorial features a typical app with an attached NoSQL database and object storage. Moreover, it leverages other services for increased security and to provide observability. Even better, all components can be automatically deployed, including a Tekton-based delivery pipeline. In this blog post, I am going to provide an overview and discuss some implementation details.
Wednesday, October 4, 2023
Blog series on cloud security and account cleanup
Cleaning up unused cloud privileges |
Regular account cleanup is part of account administration and security best practices, not just for cloud environments. So it is great when your cloud provider offers functionality to analyse the security setup and to detect unused (inactive) identities and privileges in your account. Over the past year, I looked at those features and thereby created a mini series on cloud security and account cleanup. Here is an overview.
Wednesday, July 5, 2023
Trusted Contexts for enhanced security: Both in Db2 and IBM Cloud
Security feature in action: Trusted Profile |
I trust you to know my old blog post about trusted contexts. Some years ago, I explained how to secure your Db2 database using trusted contexts. By establishing a trusted relationship based on specified attributes, the Db2 feature of a trusted context allows you to switch to another user ID or role, typically with more associated privileges. It is a great security tool to limit direct user privileges and still allow a user to perform tasks requiring more privileges.
Tuesday, May 9, 2023
Decode JWTs in bash
Friday, March 24, 2023
Analyze your IBM Cloud access management setup
ER diagram for cloud security data |
Tuesday, October 25, 2022
Things I learned at IDUG on JSON Web Token support in Db2
JSON Web Token support in Db2 |
Tuesday, September 6, 2022
New IBM Cloud security features you should know
Custom role for operating Code Engine |
Wednesday, April 6, 2022
Required IAM privileges for a service ID to update Code Engine app
Remember the steps |
Wednesday, February 23, 2022
Get certified for IBM Cloud, new certifications available
In this blog post, I want to give you a quick overview of IBM Cloud certifications and what it topics are covered for the IBM Cloud Security Engineer certification.
Monday, January 31, 2022
Simple, quick and secure cloud onboarding for workshops and hackathons
Create an external Identity Provider |
- similar privileges for everyone on the project,
- only few IAM (Identity and Access Management) roles,
- preferred simple administration (setup, running it, cleanup) over tightest security.
Additionally, such projects often are repeated with similar setup, but other participants. So, how do you onboard them efficiently and securely?
With that question in mind, I published two blog posts on the IBM side along with code on GitHub:
The articles utilize features and services like access groups and trusted profiles, external identity providers based on IBM Cloud App ID. The code is in Terraform and Python for full automation where possible. Enjoy.
If you have feedback, suggestions, or questions about this post, please reach out to me on Twitter (@data_henrik) or LinkedIn.
Wednesday, July 28, 2021
Password expiration and vacation planning
Ready for vacation: Passwords |
Monday, July 26, 2021
How to connect from Python to Db2
One of the recurring questions I have seen is "how to connect from Python to Db2". I have blogged about Python and Db2 a couple times before. Recently, the question has been popping up again more frequently. From my view, the increased security with mandatory SSL/TLS encryption and the use of Python-based Jupyter notebooks for data science and AI / ML projects are the drivers behind that increase. Moreover, there is Db2 on-premises and the Db2 on Cloud / Db2 Warehouse on Cloud plus container-based offerings. Today, I am trying to sort this out and answer that question. Again.... :)
Tuesday, July 20, 2021
Cloud Security: BYOK vs. KYOK explained
Keep and bring your own key |
Monday, July 12, 2021
Cloud-based HSM with PKCS #11 for Db2 Native Encryption
Manage your encryption keys |
Today, I want to point you to a tutorial in the IBM Cloud documentation. It discusses using Hyper Protect Crypto Services PKCS #11 for Db2 native encryption.
Friday, May 28, 2021
IBM Cloud: Send out alert emails using SMTP
Thursday, May 13, 2021
Wireshark with Lua on RHEL / CentOS
Wireshark with Lua-based dissector |
What do you do on a rainy public holiday with COVID19 restrictions in place? Finally get Wireshark to work with Lua support to have custom dissectors. Dissectors are useful to turn binary garbage into readable TCP or UDP packet content. Lua is a scripting language and a supported way of adding dissectors in Wireshark. Unfortunately, the install package for Red Hat Enterprise Linux does not include Lua support. Compiling Wireshark on my RHEL 8.3 does not simply work because it requires Lua version 5.2 for my scripts to work. And RHEL either has version 5.3 or 5.1 which both are incompatible (long story). So, let's get going.
Friday, March 5, 2021
Pseudo-decorators for my Python Flask app
Secured Python Flask app on Code Engine |
Monday, March 1, 2021
JWT token authentication in Db2 runtimes like Python or Node.js
Python script connecting to Db2 with JWT |
Monday, January 18, 2021
Follow-up to Db2 and JWT: What is JOSE...?
JWT: Encoded or decoded security claims |
Some JWT history and standards
The first draft for JSON Web Tokens, JWTs, is already 10 years old. It is from December 2010. The early draft states: