If you came here and wondered about the blog title, then read on. I plan to write about a couple of mixed, seemingly random topics. Why not express that in today's blog title...? :) It is almost end of the year and here is some news I wanted to share with you before the holidays.
Henrik's thoughts on life in IT, data and information management, cloud computing, cognitive computing, covering IBM Db2, IBM Cloud, Watson, Amazon Web Services, Microsoft Azure and more.
Showing posts with label compliance. Show all posts
Showing posts with label compliance. Show all posts
Thursday, December 12, 2019
Monday, August 19, 2019
Track API key usage by combining IBM Cloud IAM and LogDNA search
![]() |
Which key is still in use...? |
Thursday, January 31, 2019
Enterprise digitalization and cybersecurity: How companies struggle
![]() |
Cybersecurity Workshop at Zeppelin University |
Last Friday, 25.01.2019, I attended the Cybersecurity workshop of the "Bodensee Innovationscluster Digitaler Wandel" (digitalization). The innovation cluster is organized by the Zeppelin University in Friedrichshafen. It tries to bring together companies from the wider Lake Constance region that are impacted by digitalization. The researchers have identified four topics that will be addressed:
Thursday, October 11, 2018
Use a custom domain, manage TLS certificates and apply e2e security to cloud app
![]() |
End to end security for a cloud app on IBM Cloud |
Friday, April 13, 2018
IBM Cloud and Watson security questionnaires

The three available security documents cover IBM Cloud Infrastructure (IaaS), IBM Cloud Platform (PaaS), and the IBM Watson Services with their cognitive / AI capabilities. Using the provided material, you can learn about application security, audits, compliance, how business continuity and operational resilience are handled, procedures for change control, data and data center security, IAM (identify and access management) and much more. The answers include many links to references, documentation and other valuable information. Just for that it is worth going over the security questionnaires for IBM Cloud.
If you have feedback, suggestions, or questions about this post, please reach out to me on Twitter (@data_henrik) or LinkedIn.
Saturday, November 11, 2017
Latest News on Bluemix and IBM Cloud
![]() |
IBM Cloud News |
- IBM Cloud is the new name for the former IBM Bluemix offering. It combines the Platform- (PaaS), Infrastructure- (IaaS), Function- (FaaS) and Software-as-a-Service (SaaS) offerings under the new, simple name: "The IBM Cloud is the cloud for the enterprise. Yours."
- IBM announced the roll-out of a new support model and enhanced capabilities for IBM Cloud, giving clients full control over their data. Support will be provided be EU-based staff.
- A new, enhanced version of IBM Cloud Private is available. It allows to run Kubernetes-based containers, Cloud Foundry apps and much more in your data center and enables the journey to cloud.
- A new IBM Cloud support portal has been made available. It serves as a single entry point for anything related to the cloud services, regardless whether it is public, dedicated or private cloud.
- A new tutorial section has been introduced in the documentation for IBM Cloud. They help developers get to know services and tools together to build, deploy and scale real world solutions. Read more about the tutorials in this blog.
Wednesday, November 8, 2017
EU Cloud: IBM gives client full control over their data
![]() |
IBM Cloud: Have full control over your data |
In my spare time, I am teaching "Introduction to Data Management" at a cooperative state university. I tell the students that, today, data is the / a core asset of any business. It is a critical resource that needs to be protected and managed with care. Hence, putting data security at the core of platform design is important. The blog "Why a data-first approach is critical to designing and building secure cloud services" gives a great introduction into what needs to be considered for building a secure cloud platform. It touches everything from the isolation and encryption of resources and access control to monitoring, audit and governance. I covered some of the same aspects in my blog "Securing Workloads on IBM Cloud".
That's all for now. I can't wait to give a test drive once it is available. If you have feedback, suggestions, or questions about this post, please reach out to me on Twitter (@data_henrik) or LinkedIn.
Friday, February 24, 2017
Securing Workloads on IBM Cloud - Some Resources
![]() |
Security Guides for IBM Cloud |
Thursday, February 23, 2017
Location and Intent Matter: Data Privacy vs. US Government
![]() |
Some data is locked away |
Friday, February 3, 2017
Security and Compliance for IBM dashDB and Cloudant
![]() |
Database Security & Compliance |
Tuesday, November 22, 2016
DB2/dashDB Security: Implicit Privileges Through Group Membership
![]() |
DB2 Data Security |
To look up which groups a specific user belongs to, DB2 offers the table function AUTH_LIST_GROUPS_FOR_AUTHID. The returned groups are not necessarily used within the database and can be any operating system group. The following query returned several of those typical Linux groups:
SELECT * FROM TABLE (SYSPROC.AUTH_LIST_GROUPS_FOR_AUTHID('HLOESER')) as T
An administration view that comes handy is SYSIBMADM.AUTHORIZATIONIDS. It lists all authorization IDs along their respective type, i.e., groups, users and roles. When combined with another view, SYSIBMADM.PRIVILEGES, which lists all explicit privileges for all authorization IDs (that is for users, groups and roles), it allows to filter, e.g., for specific group or role privileges. Joining in the groups for a specific user and not forgetting to factor in PUBLIC privileges, I came up with the following query. It should list all the implicit privileges I have.
SELECT distinct p.AUTHID, p.PRIVILEGE, p.OBJECTNAME, p.OBJECTSCHEMA, p.OBJECTTYPE
FROM SYSIBMADM.PRIVILEGES P, SYSIBMADM.AUTHORIZATIONIDS A,
TABLE (SYSPROC.AUTH_LIST_GROUPS_FOR_AUTHID('HLOESER')) as U
WHERE p.privilege='CREATEIN' AND a.authidtype='G'
AND a.authid=p.authid
AND (u.group=a.authid or a.authid='PUBLIC')
If you want to know all your privileges, just UNION the result above with a query on SYSIBMADM.PRIVILEGES for your authid:
SELECT distinct p.AUTHID, p.PRIVILEGE, p.OBJECTNAME, p.OBJECTSCHEMA, p.OBJECTTYPE
FROM SYSIBMADM.PRIVILEGES P, SYSIBMADM.AUTHORIZATIONIDS A, TABLE (SYSPROC.AUTH_LIST_GROUPS_FOR_AUTHID('HLOESER')) as U
WHERE p.privilege='CREATEIN' and a.authidtype='G' and a.authid=p.authid
AND (u.group=a.authid or a.authid='PUBLIC')
UNION
SELECT distinct p.AUTHID, p.PRIVILEGE, p.OBJECTNAME, p.OBJECTSCHEMA, p.OBJECTTYPE
FROM SYSIBMADM.PRIVILEGES P
WHERE p.authid='HLOESER'
Monday, April 11, 2016
Data Protection, Privacy, Security and the Cloud
![]() |
Protecting your bits |
(This is the first post in a planned series on data protection, security, and privacy related to DB2/dashDB in the cloud and IBM Bluemix)
As a data/database guy from Germany, security and data protection and privacy have been high on my list of interests for many, many years. As a banking customer I would hate it when someone not authorized would access my data. I also don't like to go through the hassle of replacing credit cards, changing passwords, take up a new name (user name only :), or more because a system my data is or was on had been hacked. With more and more data being processed "in the cloud" it is great to know how much effort has been put into designing secure cloud computing platforms, into operating them according to highest security standards, and how international and local data protection standards and laws are followed for legal compliance.
Subscribe to:
Posts (Atom)