April 6, 2022 By Naomi Scott 3 min read

Security on the MQ Appliance just got even better.

Securing your business is just good business sense. We lock our doors to protect our homes and belongings, but what about protecting data? Businesses have the responsibility to protect the data that flows through them — not only to protect themselves but also to protect and serve their customers.

Cybersecurity is a pervasive theme and one of business owners’ top concerns. We’ve all heard of companies that have been victims of ransomware or lost data. Their names have been dragged through the mud, confidence lost and fines issued. Not all survive, and those that do can incur great damage.

And, of course, that is just the external threat. A disgruntled employee can also be a danger if they abuse their access. They can take a company down from the inside and make a tidy profit for themselves at the same time.

Building end-to-end security into your infrastructure

That is why security is a key part of planning your infrastructure. Data must be protected when it is on the move and also when it is at rest. Many vendors claim end-to-end security/encryption, but this all varies in meaning when you look at the details. Most offer protection ‘on the wire’ using TLS. This is useful for securing against the external threat. Authentication and authorization help to ensure that only those with the correct permissions can access data. All variants of IBM MQ have these features as standard, but there is an additional capability that sets IBM MQ apart from other options on the market.

Protecting data at rest

When vendors claim protection of data at rest, they could mean a variety of implementations. When IBM MQ uses that phrasing, it typically refers to Advanced Message Security (AMS), which encrypts at the message-level. To view the message, the receiving application must use the correct key. Without it, the message remains encrypted. This approach is included in most implementations of IBM MQ — including the IBM MQ Appliance — and also covers file data moving over the MQ network.

However, when most vendors claim at-rest protection, they refer to encryption of the disk, which is great, as long as nobody gets disk access. If they do, the messages are unencrypted and available for exploitation.

MQ Appliance enhanced encryption

That said, the nature of the MQ Appliance means that disk encryption is valuable, and when paired with message-level encryption, it is even more secure. The requirement for disk encryption appears on many implementation checklists, and because appliances are physical hardware, there persists a concern about disks that could be removed or still contain data at the end of the appliance’s life. The MQ Appliance has always had the message-level encryption from AMS, but now it offers an additional level of security to satisfy businesses with those concerns.

We listened to our customers and added another level of protection in addition to what TLS and AMS already provide. As part of the MQ 9.2.5 firmware level, disk encryption is available through the encryption of individual queue managers. Encrypting at this level — rather that at the appliance level — provides the flexibility to select which queue managers are encrypted, rather than automatically applying encryption to everything at the same time. This can help if you wish to encrypt individual queue managers as part of a gradual migration or if you wish to only encrypt those with sensitive data. The data that is mirrored to a paired HA/DR appliance is encrypted on the active appliance before transfer, meaning that that it does not need to be encrypted a second time on the standby appliance. Moreover, because the data is protected before transfer that means that protection is now provided between HA/DR appliances.

Update your MQ Appliance firmware today, and tell us what you think.

More information

More from Announcements

Success and recognition of IBM offerings in G2 Summer Reports  

2 min read - IBM offerings were featured in over 1,365 unique G2 reports, earning over 230 Leader badges across various categories.   This recognition is important to showcase our leading products and also to provide the unbiased validation our buyers seek. According to the 2024 G2 Software Buyer Behavior Report, “When researching software, buyers are most likely to trust information from people with similar roles and challenges, and they value transparency above other factors.”  With over 90 million visitors each year and hosting more than 2.6…

Manage the routing of your observability log and event data 

4 min read - Comprehensive environments include many sources of observable data to be aggregated and then analyzed for infrastructure and app performance management. Connecting and aggregating the data sources to observability tools need to be flexible. Some use cases might require all data to be aggregated into one common location while others have narrowed scope. Optimizing where observability data is processed enables businesses to maximize insights while managing to cost, compliance and data residency objectives.  As announced on 29 March 2024, IBM Cloud® released its next-gen observability…

Unify and share data across Netezza and watsonx.data for new generative AI applications

3 min read - In today's data and AI-driven world, organizations are generating vast amounts of data from various sources. The ability to extract value from AI initiatives relies heavily on the availability and quality of an enterprise's underlying data. In order to unlock the full potential of data for AI, organizations must be able to effectively navigate their complex IT landscapes across the hybrid cloud.   At this year’s IBM Think conference in Boston, we announced the new capabilities of IBM watsonx.data, an open…

IBM Newsletters

Get our newsletters and topic updates that deliver the latest thought leadership and insights on emerging trends.
Subscribe now More newsletters