Reference architectures are high-level blueprints created by IBM to show customers how to design regulated workloads correctly.
They are aligned with the IBM Cloud Framework for Financial Services, which means they already incorporate the necessary security and compliance controls.
You can think of them as:
“Pre-approved design patterns”
for regulated workloads on IBM Cloud.
There are three main reference architectures you must understand.
This is the most common architecture for financial workloads.
It uses:
IBM Cloud VPC (Virtual Private Cloud)
Virtual Server Instances (VSIs)
Red Hat OpenShift clusters (if using containers)
Financial institutions need:
Strong network isolation
Control over traffic
Custom routing
Secure subnets for different components
Integration with on-prem systems
A VPC provides all of this.
Each VPC is logically isolated from others.
You can create private subnets for sensitive systems.
Security groups and ACLs support least-privilege connectivity.
Flow Logs, Activity Tracker, and IAM policies support audit and compliance.
OpenShift clusters running inside the VPC allow cloud-native workloads with security built-in.
In exam situations, when you see regulated workloads + cloud-native + IBM Cloud,
the answer is usually VPC-based architecture.
This architecture uses IBM Cloud Satellite.
Satellite lets IBM Cloud run services in:
On-prem data centers
Other clouds
Edge locations
This is extremely useful when data residency or latency requirements prevent moving data to IBM Cloud regions.
Some regulators require:
“Data must NOT leave the country / facility.”
Some systems interact with ultra-low-latency networks (e.g., trading systems).
Satellite allows you to:
Keep data local
Deploy IBM Cloud services near the workloads
Maintain compliance while using IBM Cloud capabilities
Local processing of regulated data
Edge analytics
Hybrid cloud designs
Workloads with strict latency constraints
Whenever the exam mentions:
“Data cannot leave the customer facility”
“Must meet data residency rules”
“Workload must remain close to on-prem systems”
→ the answer is often Satellite-based architecture.
Many financial institutions still run large VMware environments.
Migrating them to containers is a long journey.
This architecture is designed for:
VMware-based workloads
That must run in regulated environments
And need enhanced security and compliance
Financial institutions often have:
Legacy systems
Mainframe-connected VMs
Proprietary applications
Vendors who only support VMware
So IBM Cloud provides a secure, hardened VMware environment aligned with the Financial Services framework.
Supports existing VMware tools and processes
Adds hardening layers for compliance
Integrates with FS controls (logging, encryption, IAM)
Supports hybrid migration paths (vMotion, HCX)
In the exam:
If a question says the customer has large VMware estates, needs cloud migration, and must meet financial regulations,
the correct answer is often:
“IBM Cloud for VMware Regulated Workloads architecture.”
A landing zone is a foundational, pre-configured environment that follows best practices for security, networking, logging, and compliance.
Think of it as:
“A ready-made, secure cloud environment you deploy BEFORE running workloads.”
Landing zones are essential for regulated workloads because:
They enforce consistent security controls
They reduce the chance of misconfiguration
They speed up cloud adoption
They provide a standard pattern for audits
This is a special version of a landing zone tailored for OpenShift workloads.
There are two variations:
Fast deployment
Designed for demo, POC, development
Simplified architecture
Not meant for full production
Lower compliance strictness
Useful when:
You need a quick test environment
You want to validate app compatibility
You want to show cloud-native functionality
Fully compliant
Designed for regulated workloads
Follows Financial Services reference architecture
Includes:
Private subnets
Strong network boundaries
Centralized logging
Key management
IAM policies
Flow logs
Activity Tracker
Secure OpenShift configuration
This is the version required for real financial production workloads.
In exam questions:
If they ask for a “production-ready, compliant OpenShift environment,”
the answer is:
“Landing Zone for OpenShift – Financial Services edition (Standard).”
IBM offers Terraform modules to deploy:
Compliant VPCs
Secure subnets
IAM policies
Flow Logs
Activity Tracker
Key Protect
Optional Edge VPC
Routing configurations
Terraform-based landing zones:
Speed up deployment
Ensure reproducible configuration
Reduce human error
Automatically implement early-stage compliance controls
Are essential for large-scale, multi-account deployments
In exam contexts, if the question mentions:
“Automation”
“Infrastructure-as-code (IaC)”
“Consistent deployment”
“Secure-by-default foundation”
The correct answer is usually:
“Use IBM Cloud Landing Zone Terraform modules.”
This is one of the most exam-heavy topics.
Financial workloads require extremely strong network isolation and security.
A zone is like a separate physical area inside a cloud region.
Using multiple zones helps protect against zone-level failures.
Financial workloads often require:
High availability (HA)
Fault tolerance
Zero downtime
A multi-zone design ensures:
If Zone A fails, Zone B still runs
Services stay online
Customer impact is minimized
In IBM Cloud VPC, multi-zone designs apply to:
Load balancers
VSIs
OpenShift clusters
Databases
Exam questions often refer to:
"Resilient design"
"Availability requirements"
"Mission-critical workloads"
→ the answer: multi-zone VPC.
Segmentation divides networks into separate areas.
Financial workloads need segmentation to:
Prevent lateral movement during attacks
Limit the blast radius of incidents
Meet regulatory isolation requirements
Apply least-privilege network access
Typical subnet types:
Only for internet-facing workloads
Must be tightly controlled
Usually placed in an Edge VPC
For internal workloads
No direct internet access
Access via NAT or private endpoints
For admin tools
Restricted access
Protected by IAM + CBR + VPN/Direct Link
Public-facing endpoints should be in an Edge VPC
Traffic flows through:
Load balancers
Firewalls
WAF (if needed)
This prevents unauthorized direct access.
Outbound traffic must be controlled:
To avoid data exfiltration
To enforce compliance rules
To prevent apps from reaching unapproved endpoints
Common methods:
Private endpoints
Egress allow lists
NAT gateways
CBR restrictions
Zero-trust means:
“Never trust by default. Always verify. Apply least privilege everywhere.”
Key concepts:
IBM Cloud IAM
Service ID
API keys
Access groups
Role-based access control (RBAC)
Essential for privileged access
Reduces credential-based attacks
Granular permissions
Only allow access necessary for job functions
Restrict access based on:
Source network
IP address
Region
Service identity
CBR is a major exam topic.
Financial workloads process extremely sensitive data.
This section ensures data confidentiality, integrity, and compliance.
Two main IBM services:
Cloud-based key management
Good for most workloads
Supports:
Key rotation
Key import
Key policies
HSM-backed
Uses FIPS 140-2 Level 4 hardware
Strongest security IBM offers
Provides customer-controlled keys (CCK)
Prevents IBM from accessing customer keys
In regulated workloads, exam questions often favor HPCS.
Required for:
Block storage
File storage
Databases
Object Storage
Cluster storage
Usually implemented with:
IBM Key Protect
HPCS
Use:
TLS for internal/external connections
Private endpoints
VPN or Direct Link for on-prem access
Regulators often require:
Customer-managed encryption keys
Periodic key rotation
Validation of encryption algorithms
Separation of duties
Auditability
Internal policies may specify:
Minimum encryption strength
Mandated HSM usage
Logging requirements
You must design encryption that satisfies both.
Financial systems must stay available even during failures.
This section corresponds to:
SLO/SLA requirements
Risk classifications
Business impact assessments
Protects against zone-level outages.
Recommended for nearly all regulated workloads.
Protects against regional failures.
Used for:
Disaster recovery
High-impact workloads
Both regions serve traffic simultaneously
Zero-downtime failover
More complex and expensive
Standby region is idle or partially active
Lower cost
Higher RTO
How long the system can be down
Lower RTO → more complex architecture
How much data loss is acceptable
Zero RPO requires synchronous replication
Critical financial workloads often demand:
RTO < minutes
RPO ≈ zero
Components include:
DR region
Backup and restore strategy
Database replication
Failover automation
Periodic DR testing
Regulators require:
Documented DR plans
DR test evidence
Clear responsibilities
Architectures must align with:
SLAs
Regulatory expectations
Internal risk classification
A compliant architecture must draw a clear line between each required control and the architectural element that satisfies it. This ensures that the solution design directly reflects regulatory expectations. Examples include mapping:
Network isolation controls to VPC segmentation and ACL structures
Encryption controls to key management services and encrypted storage
Identity controls to IAM roles and CBR policies
Audit controls to Activity Tracker and centralized logging pipelines
This mapping step is essential for demonstrating compliance during design reviews, audits, and regulatory inspections.
Platform services provide inherited compliance features such as physical security, hypervisor protection, or default encryption. However, the customer must still implement workload-specific controls, including:
Application-level access rules
Encryption key ownership and lifecycle decisions
Logging configuration for their workloads
Data classification and retention policies
Solution designs must clearly distinguish between inherited platform controls and customer-owned controls.
Many compliance requirements can be satisfied through specific architecture choices. For example:
Using multi-zone VPCs to meet availability and resilience controls
Using HPCS to satisfy strict key custody requirements
Using private endpoints to satisfy “no public internet exposure” regulations
Architectural decisions are therefore part of the compliance story, not just technical design.
Guardrails apply automated policies that enforce secure-by-default configurations, such as:
Mandatory encryption for all storage
Mandatory logging for all workloads
Denial of non-approved network exposure
Guardrails prevent accidental misconfigurations that would violate regulatory expectations.
Guardrails prevent the creation of resources or configurations that fail security or compliance checks. These may include:
Disallowing unencrypted object storage
Blocking insecure security group rules
Restricting deployment of services not on the eligible list
This ensures architectural consistency across teams and environments.
Guardrails apply to all environments, accounts, and workloads, ensuring consistent adherence to:
IAM principles
Network isolation
Logging and monitoring baselines
Encryption standards
This uniformity is essential for highly regulated organizations with large scale cloud adoption.
Eligible services are those approved for use in financial regulated workloads. They meet baseline requirements but have not undergone deep validation.
Validated services undergo detailed compliance assessments that confirm:
Secure configuration options
Alignment with control framework requirements
Availability of audit documentation
Strict lifecycle and update processes
Proper support for encryption, logging, IAM, and network controls
Validated services are a subset of eligible services.
Services not listed as eligible cannot be used for regulated workloads under any circumstances, even if they appear technically suitable. This prohibition protects customers from compliance risk.
IAM architecture must enforce:
Roles with minimal permissions
Separate administrative domains for production and non-production
Clear separation between security, operations, and development teams
Separation of duties is a regulatory expectation.
Administrative access must meet strict standards:
Multi-factor authentication (MFA)
Access from approved networks only
Logging of all privileged actions
Time-bound or just-in-time privileges for sensitive operations
Enterprises typically use centralized identity providers such as Active Directory or LDAP. Federated IAM ensures:
Centralized authentication policy enforcement
Unified identity lifecycle management
Consistent MFA and password policies
A controlled emergency-access process must exist, covering:
Temporary elevation
Full logging and justification
Post-event review
This is a regulatory requirement for operational resilience.
Regulated workloads must produce logs including:
IAM activity logs
API audit logs
Network flow logs
System logs for compute, storage, and containers
Application logs
These logs support compliance, forensics, and monitoring.
Logs must be forwarded to centralized SIEM platforms where:
Correlation with on-prem and multi-cloud events occurs
Alerts support detection of security incidents
Regulatory and audit reporting is generated
Retention periods are dictated by regulatory and internal requirements. Log retention must be:
Tamper-resistant
Auditable
Accessible to security and compliance teams
Retention periods can span several years depending on jurisdiction.
Sensitive data used for testing or development must be:
Masked
Tokenized
Pseudonymized
Regulated data cannot be used unmodified in non-production environments.
Data sharing across systems must follow minimization principles:
Collect and retain only what is required
Limit exposure to the minimum necessary fields
Avoid unnecessary replication
This reduces risk and aligns with privacy regulations.
Data must remain within approved trust boundaries, which are defined by:
VPC segmentation
Encryption boundaries
Identity governance
Regional residency requirements
Crossing trust boundaries triggers additional control requirements.
Pipelines must include:
Static code analysis
Dependency scanning
Image vulnerability scans
Infrastructure-as-code policy checks
These ensure the system remains secure as it evolves.
Container images must be signed and verified before deployment. This prevents the use of compromised or unauthorized images.
Build and deployment systems must follow:
Isolated build runners
Minimal privileges
Controlled secrets management
Strict network restrictions
This prevents pipeline compromise, which is a major attack vector.
Critical workloads require:
Dual Direct Link circuits
Independent network paths
Failover routing policies
This protects against connectivity failures.
Connectivity must enforce:
Segmentation by environment (prod vs non-prod)
Segmentation by sensitivity level
Restricted egress routes
Segmentation prevents accidental or malicious cross-environment contamination.
All traffic must remain encrypted, including:
On-prem to cloud links
Inter-zone traffic
Service-to-service traffic
Encryption is a regulatory requirement.
Organizations should use multiple IBM Cloud accounts to isolate:
Production workloads
Non-production workloads
Shared platform services
This limits the blast radius of mistakes or compromises.
Policies must apply consistently across all accounts via:
Standard IAM frameworks
Centralized guardrails
Landing zone enforcement
Shared logging standards
Account-level separation provides strong boundaries for administrative control and auditing.
Solution teams must perform threat modeling to identify:
Attack surfaces
Trust boundaries
Potential misconfigurations
High-risk components
This is required for regulated workloads.
Penetration tests must:
Follow regulated testing guidelines
Be performed under approved scopes
Generate evidence for remediation and auditing
Scanning must occur at:
Build time (pipeline)
Deployment time
Runtime
This ensures continuous security posture alignment.
Why are reference architectures important when designing financial services cloud environments?
They provide validated design patterns that meet security and regulatory requirements.
Reference architectures act as standardized templates for building cloud environments. These architectures incorporate best practices for networking, identity management, encryption, and compliance controls.
For financial institutions, using validated reference architectures reduces design complexity and helps ensure that infrastructure aligns with regulatory expectations. IBM Cloud for Financial Services provides reference architectures tailored specifically for regulated financial workloads, allowing organizations to deploy solutions more quickly while maintaining compliance.
Demand Score: 81
Exam Relevance Score: 90
What is the main purpose of architecture building blocks in IBM Cloud financial services environments?
To provide modular components that can be combined to create secure and compliant cloud solutions.
Architecture building blocks are standardized infrastructure components that form the foundation of a cloud solution. Examples include networking services, identity and access management, encryption services, and monitoring tools.
Using modular building blocks allows architects to assemble complex cloud environments while maintaining consistency across deployments. In regulated industries like financial services, these components are designed to satisfy security and compliance requirements.
Demand Score: 79
Exam Relevance Score: 87
What is the key security benefit of Hyper Protect Crypto Services (HPCS)?
It allows customers to maintain exclusive control of encryption keys using hardware security modules.
Hyper Protect Crypto Services provides encryption key management using dedicated hardware security modules (HSMs). These modules ensure that cryptographic keys are generated, stored, and managed within secure hardware environments.
The key advantage is that customers maintain sole ownership of their encryption keys, meaning even cloud administrators cannot access them. This level of control is critical for financial institutions that must meet strict data protection regulations.
Demand Score: 85
Exam Relevance Score: 92
Why is encryption critical when designing cloud architectures for financial services?
Because financial systems handle highly sensitive data that must remain protected from unauthorized access.
Financial institutions store and process sensitive information including transaction records, personal data, and financial statements. Encryption ensures that this data remains unreadable if intercepted or accessed without authorization.
Cloud environments must support encryption for data at rest, data in transit, and sometimes data in use. Strong encryption practices help organizations meet regulatory requirements and maintain customer trust.
Demand Score: 80
Exam Relevance Score: 88
What role does identity and access management play in financial cloud architectures?
It controls who can access resources and ensures only authorized users interact with sensitive systems.
Identity and access management (IAM) defines authentication and authorization policies for cloud resources. In financial environments, strict access controls are necessary to prevent unauthorized activity and maintain regulatory compliance.
IAM policies determine which users or services can access particular resources and what actions they are allowed to perform. Properly configured IAM reduces insider threats, limits accidental misuse of resources, and supports audit requirements.
Demand Score: 78
Exam Relevance Score: 85