IBM BYOL: What It Is and What It Is Not
IBM's Bring Your Own Software Licence (BYOSL) policy allows customers with existing IBM software entitlements to deploy that software on approved public cloud infrastructure rather than purchasing cloud-specific licences from the cloud provider's marketplace. The policy is designed to protect the value of existing IBM Passport Advantage agreements when organisations move workloads to cloud environments.
The critical distinction is that BYOL is not an automatic right inherent to IBM software ownership. It is a policy-governed permission that requires the deployment to occur on an Eligible Public Cloud (EPC) as defined in IBM's BYOSL policy documentation, the software to be on the BYOSL eligible products list, ILMT or IBM License Service to be deployed and maintained as required for the specific product and environment, and the deployment to occur under the terms of the existing Passport Advantage agreement without modifications that would require a separate cloud licensing arrangement.
This distinction matters enormously in practice. Organisations that assume they can freely deploy any IBM software on any cloud provider under their existing licences are operating on an incorrect interpretation of IBM's policy. IBM has been explicit in audit proceedings that BYOL rights do not extend to cloud environments that are not on the eligible cloud list, to software products that require separate cloud licensing arrangements, or to scenarios where compliance tool requirements have not been met.
Eligible Public Clouds Under IBM's BYOSL Policy
IBM maintains an official Eligible Public Cloud (EPC) list that defines which cloud infrastructure providers are authorised hosts for BYOSL deployments. The major cloud providers — Amazon Web Services (AWS), Microsoft Azure, Google Cloud Platform (GCP), IBM Cloud itself, and a small number of additional approved providers — are on this list. However, being on the EPC list does not mean that all IBM software can be deployed on all EPC providers without restriction. Some IBM products have cloud-specific licensing requirements that override the standard BYOSL policy for certain EPC providers.
For the major cloud providers, the general BYOSL approach works as follows: AWS supports IBM BYOSL for PVU and VPC-based products when ILMT is deployed. Microsoft Azure similarly supports BYOSL for eligible IBM products. Google Cloud supports BYOSL for products on the eligible list. IBM Cloud naturally supports BYOSL as the native IBM cloud environment. Each provider has specific technical constraints around how ILMT deploys and reports within their infrastructure, and IBM's BYOSL guidance includes provider-specific requirements for meeting the compliance tool obligations.
Products Not Eligible for BYOSL
Not all IBM software is eligible for BYOSL deployment on third-party cloud infrastructure. Certain IBM products are sold exclusively as cloud services, require cloud-specific licensing metrics that do not map to Passport Advantage entitlements, or are explicitly excluded from the BYOSL eligible products list by IBM. Before migrating any IBM software to a cloud environment under an assumed BYOL approach, organisations should verify product-level eligibility against IBM's current BYOSL eligible products list. This list is updated periodically, and products move on and off it as IBM's cloud strategy evolves.
Common categories of IBM products that require special attention in BYOSL assessments include IBM Db2 (which has specific cloud licensing provisions depending on deployment model and cloud provider), IBM MQ (where container deployment under Cloud Pak for Integration has different rules from standalone server deployment), and IBM Watson products (where cloud-native SaaS deployments are typically sold as separate cloud subscriptions rather than BYOL entitlements).
ILMT in Cloud Environments: The Compliance Tool Obligation
The IBM License Metric Tool (ILMT) remains mandatory for IBM software deployed in cloud environments under the BYOSL policy when those products use capacity-based licensing metrics — PVU (Processor Value Unit) or VPC (Virtual Processor Core). For cloud deployments, ILMT fulfils the same function it does in on-premises virtualised environments: it measures the sub-capacity licensing footprint, generates compliance reports, and provides the data record that supports sub-capacity licensing claims in IBM audit scenarios.
Sub-capacity licensing is the mechanism that makes cloud deployment of capacity-based IBM software economically viable. Without it, IBM's audit position defaults to full physical capacity of the cloud host — in public cloud terms, this means counting the full processor capacity of the underlying physical host infrastructure, not just the vCPUs allocated to the customer's VM. In major cloud providers' multi-tenant environments, this physical host capacity can be ten to twenty times larger than the allocated instance size. An organisation running IBM software on a 4 vCPU cloud instance that does not deploy ILMT could face IBM audit claims based on the full physical capacity of the multi-tenant host — potentially 40 to 80 PVU-equivalent entitlements rather than the 4 they expected to need.
Deploying ILMT in cloud environments requires specific configuration. The major public cloud providers all support ILMT deployment, but the installation approach, required permissions, and reporting configuration differ by provider. IBM provides cloud-specific ILMT deployment guidance, and organisations that deploy ILMT using on-premises configuration assumptions rather than cloud-specific guidance frequently produce incomplete or non-compliant compliance reports.
Moving IBM software to cloud? Verify ILMT coverage first.
We assess BYOL eligibility and ILMT deployment requirements before cloud migrations begin — preventing compliance exposure before it occurs.The PVU-to-VPC Transition in Cloud Contexts
IBM's PVU licensing model assigned per-core PVU values based on processor type, creating a pricing structure where more powerful processors cost more. In on-premises environments, this model rewarded organisations that standardised on commodity processors by delivering lower per-core PVU costs. In cloud environments, the PVU model became problematic: public cloud providers do not always expose processor type information in a form that IBM's PVU tables can directly interpret, and the virtualisation layers in cloud infrastructure complicate the mapping between physical processors and IBM's PVU tables.
IBM's response to this cloud PVU complexity was to introduce the VPC metric for containerised and cloud-native deployments. VPC provides a simpler, cloud-compatible metric: one vCPU equals one VPC, regardless of underlying processor type. For organisations migrating IBM workloads from on-premises PVU-based deployments to cloud environments, this transition has two important implications.
First, the transition from PVU to VPC is not a like-for-like conversion. PVU entitlements do not automatically convert to an equivalent number of VPC entitlements. IBM's standard conversion basis is 70 PVU per core, but conversion ratios in specific scenarios — particularly for ELA holders transitioning to Cloud Pak VPC licensing — are negotiated on a case-by-case basis without a public standard table. Organisations that assume their existing PVU entitlements automatically cover cloud VPC deployments are typically incorrect, and the gap represents undisclosed compliance exposure.
Second, the PVU-to-VPC transition creates a timing compliance risk. Organisations that containerise or cloud-migrate IBM workloads under existing PVU ELAs — particularly before formal agreement on the VPC entitlement conversion — are technically in a compliance grey zone until the transition is formally documented. IBM's audit approach treats the deployed metric as the compliance test: if your deployed software uses VPC counting in a cloud container, IBM expects VPC entitlements, regardless of what your historic PVU agreement says.
IBM Cloud Native Services vs BYOL: Choosing the Right Model
For many IBM software products, organisations face a genuine choice between deploying using existing BYOL entitlements or purchasing IBM-managed cloud services directly from IBM or through cloud marketplace listings. Understanding the total cost and compliance implications of each approach is essential for making the right decision.
BYOL: Lower Variable Cost, Higher Compliance Overhead
Deploying IBM software under BYOL on a public cloud provider typically delivers lower per-unit cost than purchasing cloud-native service instances, particularly for large-scale deployments where existing Passport Advantage agreements include significant volume discounts not available in marketplace pricing. However, BYOL requires the organisation to manage ILMT deployment and maintenance, cloud infrastructure provisioning, IBM software installation and patching, and compliance reporting — all activities that consume internal resources and introduce compliance risk if not managed correctly.
BYOL also requires active management of the sub-capacity licensing obligation. The economic case for BYOL rests almost entirely on sub-capacity licensing: if ILMT is not properly deployed, the cost benefit of BYOL evaporates and the organisation faces worse economics than purchasing cloud-native services while also having full compliance exposure.
IBM Cloud-Native Services: Higher Unit Cost, Managed Compliance
IBM Cloud-native services — whether IBM-managed SaaS offerings or IBM software deployed as managed services in IBM Cloud — transfer the compliance management obligation to IBM. IBM tracks entitlement consumption within its own cloud infrastructure, and the organisation's licensing obligation is the contracted service subscription, not a PVU or VPC count. For organisations that lack internal SAM capability to manage ILMT in cloud environments, or that have historically had compliance issues with IBM's on-premises compliance tools, cloud-native services can deliver lower total risk even at a higher unit cost.
The transition from BYOL to cloud-native services for specific IBM products also has commercial implications for existing Passport Advantage agreements. IBM typically offers migration credits — applying the residual value of existing BYOL entitlements toward cloud-native service subscriptions — but these credits are negotiated, not automatic, and the terms vary significantly by product and deal size.
IBM Cloud Pak in Cloud Environments: Additional Dimensions
IBM Cloud Paks — the containerised software suites that bundle OpenShift with IBM middleware — operate under a distinct set of cloud licensing rules from standard BYOL deployments. Cloud Paks are built on VPC licensing and are designed for deployment on OpenShift in any environment: on-premises, IBM Cloud, or any major public cloud provider running OpenShift.
The key distinction for Cloud Pak cloud deployments is that the VPC metric applies to the OpenShift worker nodes running Cloud Pak workloads, regardless of cloud provider. The IBM License Service (the container-specific successor to ILMT) must be deployed in the OpenShift cluster to validate sub-capacity VPC entitlements — the same requirement that applies in on-premises Cloud Pak deployments. Cloud Pak cloud deployments that do not deploy IBM License Service are in the same compliance position as on-premises deployments without it: sub-capacity rights are forfeited.
Additionally, the OpenShift entitlement bundled with Cloud Paks — the restricted-use Red Hat OpenShift Container Platform entitlement — operates under the same scope restriction in cloud environments as it does on-premises. OpenShift deployed on AWS, Azure, or GCP as the runtime for a Cloud Pak carries a restricted entitlement that does not authorise the use of that OpenShift cluster for non-Cloud Pak workloads. Organisations running mixed-purpose OpenShift clusters in cloud environments must hold separate full RHOCP licences for the non-Cloud Pak workloads. IBM and Red Hat's joint audit approach now includes cloud-based OpenShift clusters in standard audit scope.
IBM Cloud Audit Risk in Cloud Environments
A common misconception among enterprise IT organisations is that cloud deployments are outside IBM's audit scope or that the technical characteristics of cloud infrastructure make IBM software usage harder for IBM to detect. Neither is correct. IBM audits routinely include cloud deployments, and IBM's audit methodology has evolved to address cloud-specific deployment patterns.
IBM's standard audit notification process gives organisations 30 days to respond to an audit request. The audit scope routinely includes all IBM software deployed in all environments — on-premises, private cloud, public cloud BYOL deployments, and IBM Cloud. IBM's verification approach for cloud environments can include requesting access to ILMT or License Service reports from cloud-deployed instances, cloud infrastructure usage reports from the organisation, and in some cases IBM usage telemetry from cloud marketplace deployments where IBM software was installed from marketplace listings.
The compliance risk profile for cloud BYOL deployments is highest in organisations that migrated IBM workloads to cloud without updating their SAM processes to cover cloud environments, that have not deployed ILMT in cloud VMs hosting IBM software, or that have made incorrect assumptions about which products are eligible for BYOL under their specific Passport Advantage agreement. These patterns collectively describe the majority of cloud IBM estates we assess — cloud migration velocity frequently outpaces licensing compliance readiness.
Ten CIO Actions for IBM Cloud and BYOL Compliance
1. Conduct a BYOL Eligibility Review: Before migrating any IBM software to cloud, verify product-level eligibility against IBM's current BYOSL eligible products list. Do not assume eligibility based on the product being under a valid Passport Advantage entitlement.
2. Deploy ILMT in Cloud Environments: For any PVU or VPC-licensed IBM software deployed in cloud VMs under BYOL, ILMT must be deployed within 90 days of first use. Use IBM's cloud-specific ILMT deployment guidance, not on-premises instructions. Sub-capacity rights depend on it.
3. Deploy IBM License Service in All Cloud OpenShift Clusters: For Cloud Pak deployments on cloud-hosted OpenShift, IBM License Service must be deployed in every cluster. Verify deployment status before any IBM audit or commercial discussion.
4. Reconcile PVU Entitlements Against Cloud VPC Requirements: If you are running cloud workloads that consume VPC licensing under existing PVU ELAs, verify that the entitlement transition has been formally documented. PVU-to-VPC conversion ratios in cloud contexts are a leading source of IBM audit findings.
5. Audit OpenShift Cluster Scope in Cloud Environments: Verify that Cloud Pak restricted-use RHOCP entitlements are not being used for non-Cloud Pak workloads in cloud clusters. Mixed-purpose cloud OpenShift clusters require full RHOCP licensing for non-Cloud Pak workloads.
6. Include Cloud Environments in ILMT Compliance Reports: Ensure your quarterly ILMT compliance reports cover cloud-deployed IBM software, not just on-premises deployments. Partial compliance reports are treated as compliance gaps in IBM audits.
7. Assess BYOL vs Cloud-Native Economics: For each IBM product you are considering migrating to cloud, model the five-year total cost of BYOL (including ILMT management overhead and compliance risk) against IBM cloud-native service pricing. The answer is not always BYOL.
8. Negotiate Migration Credits for Cloud Transitions: When transitioning from BYOL to IBM cloud-native services for specific products, negotiate migration credits that apply existing Passport Advantage entitlement value toward the cloud subscription. These credits are available but not automatically offered.
9. Update SAM Processes for Cloud Coverage: Ensure your Software Asset Management processes explicitly include cloud environments in scope — inventory discovery, ILMT configuration, compliance reporting, and entitlement reconciliation. Most SAM programmes were designed for on-premises environments and do not automatically extend to cloud.
10. Engage Independent Review Before IBM Renewals or Audits: IBM's commercial and audit teams approach cloud licensing discussions with preparation that most enterprise organisations cannot match without independent advisory support. A pre-renewal or pre-audit compliance review identifies gaps and establishes a defensible position before IBM engages. Note also that IBM's fiscal year ends on December 31 — commercial discussions about cloud licensing transitions, BYOL remediation, or entitlement conversions are best initiated in Q3 to allow resolution before year-end, when IBM sales teams have the most flexibility to approve favourable commercial terms.
IBM Cloud Licensing Intelligence
Subscribe for quarterly updates on IBM BYOL policy changes, ILMT cloud deployment requirements, and compliance intelligence from our active client portfolio.