Skip to the content.

Guardium

This is a “landing page” for Guardium. Look here for links to high value technical content specific for this service.

Guardium Insights

Guardium Insights is a lightweight-but-powerful platform that can flexibly deploy wherever an organization needs - aligning to data security goals without hindering business objectives in the cloud. Guardium Insights will centralize data security visibility to discover data security and compliance insights across multiple cloud resources. Insights will provide near real-time data activity monitoring and protection capabilities, agentlessly stream from Database-as-a-Service (DBaaS) sources, such as AWS Kinesis and Azure Event Hubs, and connect to data sources supported by IBM Security Guardium Data Protection central managers. You can define compliance policy to dictate how and what data is monitored and specifying audit milestones. All of this can feed data security and compliance reports in seconds, using out-of-the box and advanced, customizable reports and content.

Fianlly, you are able to collaborate across the security operations center (SOC) by sharing data security event data with other security platforms and opening cases in IBM Cloud Pak for Security. Insights doesn’t really DO any of the monitoring and protection, but it gathers the audit trails and reports from your other services which DO perform those functions, and puts it into a common format which it can then report on, alert teams to, and search for suspicious patterns.

Installing Guardium Insights 3.0.1

These are my notes on installation of Guardium Insights 3.0.1 on ROKS (OpenShift Cluster on IBM Cloud). This installation is interactive, no Ansible (or similar) scripting is used. Information regarding scripting may be included in a later revision

Hardware and Operating System requirements

Before beginning the installation of Guardium Insights, you will first need to provision a Redhat Openshift cluster.
For Guardium Insights version 3.0.x the version of Openshift needs to be v4.6.x.
View IBM documentation for hardware requirements for Guardium Insights
View IBM documentation for software requirements for Guardium Insights

I have used a very small cluster for testing. Your cluster may have many more nodes according to sizing requirements. Consult with your IBM contact and/or Knowledge Base documentation on sizing for your specific case.

Guardium Insights Cluster Requirements

Entitlement Key

You will need to get your entitlement key, as described in Obtain your entitlement key.

Installation instructions

If any of the following steps fails, please consult the Knowledge Base installation Details at - See IBM Documentation on Guardium Insights 3.0.x Installation

Guardium Data Protection

IBM Security Guardium Data Protection supports a zero trust approach to security. It discovers and classifies sensitive data from across the enterprise, providing real-time data activity monitoring and advanced user behavior analytics to help discover unusual activity around sensitive data. Uncover regulated data in your data stores and use pre-built templates for regulations such as PCI DSS, SOX, HIPAA, GDPR, CCPA and many more, to streamline and automate compliance workflows. Using a single interface, you can set access policies, monitor user access to protected data and discover, investigate and remediate vulnerabilities and threats as they occur in real time across your data environment.

Find out who is accessing data, when they are accessing it, and easily determine if data is being improperly accessed.

Guardium Data Encryption

IBM Security Guardium Data Encryption (GDE) consists of a unified suite of products built on a common infrastructure. These highly scalable solutions provide data encryption, tokenization, data masking and key management capabilities to help protect and control access to data across the hybrid multicloud environment. Address data security and privacy regulations such as GDPR, CCPA, PCI DSS and HIPAA by employing methods to de-identify data, such as tokenization and data masking, and managing the encryption key lifecycle with secure key generation and automated key rotation.

Guardium Vulnerability Assessment

To meet compliance requirements, counter insider and external threats and achieve the principles of zero trust, it’s critical that you understand where vulnerabilities in your database infrastructure lie. IBM Security™ Guardium® Vulnerability Assessment scans data infrastructures such as databases, data warehouses and big data environments to detect vulnerabilities and suggest remedial actions. This vulnerability assessment tool identifies exposures such as missing patches, weak passwords, unauthorized changes and misconfigured privileges. Full reports are provided as well as suggestions to address all vulnerabilities. Guardium Vulnerability Assessment detects behavioral vulnerabilities such as account sharing, excessive administrative logins and unusual after-hours activity. It identifies threats and security gaps in databases that could be exploited by hackers.

Data Risk Manager

IBM Data Risk Manager provides executives and their teams a business-consumable data risk control center that helps to uncover, analyze, and visualize data-related business risks so they can take action to protect their business. It’s a way to visualize and consume everything that the rest of the Guardium products are telling you.

References for Further Reading