We’ve made it our mission to help you achieve continuous security and compliance as you build and develop on IBM Cloud.

Today, we’re taking the next step by announcing beta availability of IBM Cloud Secrets Manager.

As a security admin, your teams are often creating API keys and digital credentials of different types as they interact with the systems that require them. You’re actively looking for solutions that might help you to adhere to strict guidelines for running sensitive workloads in the public cloud. But, as your teams move data to the cloud, you’re not comfortable with storing sensitive application secrets in a multi-tenant environment. You’re concerned that with a multi-tenant secrets management service, your business won’t meet the data isolation requirements that are required for regulatory compliance.

According to the Cost Of Data Breach Report 2020 by IBM Security, compromised credentials are responsible for 19% of all data breaches that have occurred in the last year. You can help to mitigate the potential damages that are associated with compromised secrets by getting a full view of your credentials and who has access to them. And, by storing your secrets in an isolated environment, you gain the confidence that your data at rest remains isolated and secure.

What is IBM Cloud Secrets Manager?

With Secrets Manager, you can centrally manage your secrets in a single-tenant, dedicated service that is managed by both you and IBM Cloud. Built on open-source HashiCorp Vault, Secrets Manager helps you get the data isolation of a dedicated environment with the benefits of a public cloud. 

As shown in the previous image, you can create a Secrets Manager instance that maps to a dedicated Vault formation where your requests are handled and processed. If you’re already developing on IBM Cloud, you can save time with native cloud integrations that help you dynamically create and retrieve secrets while you work with supported IBM Cloud offerings. 

In this beta release, Secrets Manager offers support for the following types of secrets:

  • IAM credentials, which consist of a service ID and API key that are generated dynamically on your behalf.
  • Arbitrary secrets, such as custom credentials that can be used to store any type of structured or  unstructured data.
  • User credentials, such as usernames and passwords that you can use to log in to applications.

How can Secrets Manager help me?

There are several exciting use cases for Secrets Manager. As a security admin or DevOps team contributor, you can accelerate your development and security strategy by taking advantage of the following service capabilities:

  • Centralize your secrets at scale: Manage a variety of secret types from a single service.
  • Define access with secret groups: Assign granular access to a group of secrets in your instance so that you can control who on your team has access to them. 
  • Create secrets dynamically: Limit the lifespan of your secrets by creating and leasing them on-demand as you use supported IBM Cloud services.
  • Protect your secrets at rest: Manage your own encryption with your root key in IBM Key Protect to enhance the security of your stored secrets.
  • Monitor and audit activity: Track how users and applications interact with secrets in your instance by using IBM Cloud Activity Tracker with LogDNA.

How can I get started?

Ready to try IBM Cloud Secrets Manager? Check out the following links to get started today:

Questions and feedback

We’d love to hear your feedback! If you have questions or comments, you can use the Feedback button on any page at cloud.ibm.com to help us learn more about your particular use case. 

More from Announcements

Success and recognition of IBM offerings in G2 Summer Reports  

2 min read - IBM offerings were featured in over 1,365 unique G2 reports, earning over 230 Leader badges across various categories.   This recognition is important to showcase our leading products and also to provide the unbiased validation our buyers seek. According to the 2024 G2 Software Buyer Behavior Report, “When researching software, buyers are most likely to trust information from people with similar roles and challenges, and they value transparency above other factors.”  With over 90 million visitors each year and hosting more than 2.6…

Manage the routing of your observability log and event data 

4 min read - Comprehensive environments include many sources of observable data to be aggregated and then analyzed for infrastructure and app performance management. Connecting and aggregating the data sources to observability tools need to be flexible. Some use cases might require all data to be aggregated into one common location while others have narrowed scope. Optimizing where observability data is processed enables businesses to maximize insights while managing to cost, compliance and data residency objectives.  As announced on 29 March 2024, IBM Cloud® released its next-gen observability…

Unify and share data across Netezza and watsonx.data for new generative AI applications

3 min read - In today's data and AI-driven world, organizations are generating vast amounts of data from various sources. The ability to extract value from AI initiatives relies heavily on the availability and quality of an enterprise's underlying data. In order to unlock the full potential of data for AI, organizations must be able to effectively navigate their complex IT landscapes across the hybrid cloud.   At this year’s IBM Think conference in Boston, we announced the new capabilities of IBM watsonx.data, an open…

IBM Newsletters

Get our newsletters and topic updates that deliver the latest thought leadership and insights on emerging trends.
Subscribe now More newsletters