Skip to content

Latest commit

 

History

History
32 lines (19 loc) · 2.25 KB

File metadata and controls

32 lines (19 loc) · 2.25 KB
copyright
years
2026
lastupdated 2026-02-25
keywords disaster recovery, restrict, context-based restrictions
subcollection cloud-databases-gen2

{{site.data.keyword.attribute-definition-list}}

Securing your service

{: #cdb-secure-service}

[Gen 2]{: tag-purple}

  1. Context-based restrictions give account owners and administrators the ability to define and enforce access restrictions for {{site.data.keyword.cloud_notm}} resources based on the context of access requests. Access to {{site.data.keyword.databases-for}} resources can be controlled with context-based restrictions and Identity and Access Management (IAM) policies. For more information, see Protecting your {{site.data.keyword.databases-for}} instance with context-based restrictions.
  2. To restrict access to your databases, allowlist specific IP addresses or ranges of IP addresses on your deployment. Using IBM Cloud's native context-based restrictions is recommended over using the allowlist, which is deprecated. For more information, see Allowlisting.
  3. Disaster recovery{: term} involves a set of policies, tools, and procedures for returning a system, an application, or an entire data center to full operation after a catastrophic interruption. It includes procedures for copying and storing an installed system's essential data in a secure location, and for recovering that data to restore normalcy of operation. For more information, see Understanding business continuity and disaster recovery for {{site.data.keyword.databases-for}}.

Next steps

{: #cdb-secure-service-next-steps}

You've now provisioned a {{site.data.keyword.databases-for}} service instance, set up notifications and monitoring, and secured it. Next, jump into the specific Getting Started documentation for your chosen service.