Skip to content

Latest commit

 

History

History
70 lines (46 loc) · 6.68 KB

service-comparison.md

File metadata and controls

70 lines (46 loc) · 6.68 KB
copyright lastupdated keywords subcollection
years
2020, 2024
2024-10-15
secrets management in IBM Cloud, differences between {{site.data.keyword.secrets-manager_short}} and Key Protect, when to use {{site.data.keyword.secrets-manager_short}}, {{site.data.keyword.secrets-manager_short}} use cases, single tenant, multi-tenant
security-hub

{{site.data.keyword.attribute-definition-list}}

Which secrets management product should you use?

{: #manage-secrets-ibm-cloud}

With {{site.data.keyword.cloud_notm}}, you can choose from various secrets management and data protection offerings that help you to protect your sensitive data and centralize your secrets. If you need to integrate general-purpose secrets to authenticate your apps, you can use {{site.data.keyword.secrets-manager_short}} to create dynamic secrets{: term} and manage their lifecycle. But for other application secrets, such as encryption keys, your business might require a higher level of control that relies on highly secure, customer-controlled cryptographic hardware. {: shortdesc}

For example, consider the following scenarios and how they map to secrets management offerings and data protection offerings in {{site.data.keyword.cloud_notm}}.

The image describes three use cases for secrets management and how they map to available services in {{site.data.keyword.cloud_notm}}. The content is explained fully in the surrounding text.{: caption="Figure 1. Secrets management use cases" caption-side="bottom"}

Which data protection service is best for me?

{: #which-data-protection-service}

The following table lists the different offerings that you can use with {{site.data.keyword.cloud_notm}} to protect your application secrets.

Scenario What to use
As a DevOps team contributor, you need to create, lease, and manage API keys, credentials, database configurations, and other secrets for your services and applications. With {{site.data.keyword.secrets-manager_short}}, you can manage secrets of various types in a dedicated instance.
You need to generate, renew, and manage SSL/TLS certificates for your deployments. You can also manage your SSL/TLS certificates and private keys in dedicated instance of {{site.data.keyword.secrets-manager_short}}.
You need to create and manage encryption keys that are backed by FIPS 140-2 Level 3 validated hardware. You can use {{site.data.keyword.keymanagementserviceshort}} to generate and import encryption keys by using a multi-tenant service with shared hardware.
You are an admin in an industry, such as finance or legal, that must adhere to governance over how data is protected and isolated. You need to create and manage encryption keys by using a dedicated, FIPS 140-2 Level 4 hardware security module that you control and manage. With {{site.data.keyword.hscrypto}}, you can manage encryption keys in a single-tenant service with dedicated hardware.
You need a way to offload TLS handshake encryption to a dedicated, FIPS 140-2 Level 4 hardware security module that you control and manage. You can also use {{site.data.keyword.hscrypto}} to control your TLS/SSL keys in a dedicated HSM.
{: caption="Data protection scenarios" caption-side="top"}

What are key secret types supported by each data protection service?

{: #key-features}

As you plan your data protection strategy, some differences between services to consider include the level of data isolation that your workload requires, and the secret types that you can use.

For a higher level of security and control, your business might benefit from the data isolation that a single-tenant offering provides, such as {{site.data.keyword.secrets-manager_short}} or {{site.data.keyword.hscrypto}}. You might also decide that the reduced cost and scalability benefits of a multi-tenant service, such as {{site.data.keyword.keymanagementserviceshort}}, are better suited to your needs. The following table lists key features for each service.

Service Secret types Multi-tenant1 Single-tenant2 HSM backed3
{{site.data.keyword.secrets-manager_short}} Arbitrary secrets \n IAM credentials \n Service credentials \n Key-value secrets \n SSL/TLS certificates \n User credentials Checkmark icon
{{site.data.keyword.keymanagementserviceshort}} Symmetric encryption keys Checkmark icon Checkmark icon
{{site.data.keyword.hscrypto}} Symmetric and asymmetric encryption keys Checkmark icon Checkmark icon
{: caption="Table 2. Key features for {{site.data.keyword.cloud_notm}} data protection services" caption-side="top"}
{: summary="The table compares features across {{site.data.keyword.secrets-manager_short}}, {{site.data.keyword.cloudcerts_short}}, {{site.data.keyword.keymanagementserviceshort}}, and {{site.data.keyword.hscrypto}}. The first column lists the names of the services. The second column lists the types of secrets that are supported by each service. The third column uses checkmarks to indicate whether a service is multi-tenant. The fourth column uses checkmarks to indicate whether a service is single-tenant. The last column uses checkmarks to indicate whether a service is backed by a hardware security module (HSM)."}
{: class="comparison-table"}

How do I get started?

{: #get-started-data-protection}

Each service supports either a Lite plan or a Trial trial that you can use to try its service capabilities for free. Get started by creating an instance of a service from the {{site.data.keyword.cloud_notm}} catalog.

Footnotes

  1. A multi-tenant service uses a single instance of its software (and its underlying database and hardware) to serve multiple tenants. Learn more{: external}.

  2. A single-tenant service creates a dedicated instance of its software (and its underlying database and hardware) for each individual tenant.

  3. A service that is backed by a hardware security module (HSM) uses tamper-resistant, FIPS-validated physical hardware as its root of trust for cryptographic storage and processing of encryption keys.