Skip to content

Latest commit

 

History

History
105 lines (80 loc) · 8.56 KB

registry_responsibilities.md

File metadata and controls

105 lines (80 loc) · 8.56 KB
copyright lastupdated keywords subcollection
years
2021, 2024
2024-10-09
Responsibilities, change management, identity and access management, incident and operations management, security and regulation compliance, disaster recovery, responsibility, access
Registry

{{site.data.keyword.attribute-definition-list}}

Your responsibilities when you are using {{site.data.keyword.registryshort_notm}}

{: #registry_responsibilities}

Learn about the management responsibilities and terms and conditions that you have when you use {{site.data.keyword.registrylong}}. {: shortdesc}

For a high-level view of the service types in {{site.data.keyword.cloud_notm}} and the breakdown of responsibilities between the customer and {{site.data.keyword.IBM_notm}} for each type, see Shared responsibilities for {{site.data.keyword.cloud_notm}} offerings.

Review the following sections for the specific responsibilities for you and for {{site.data.keyword.IBM_notm}} when you use {{site.data.keyword.registrylong_notm}}. For the overall terms of use, see {{site.data.keyword.cloud_notm}} Terms and Notices.

Incident and operations management

{: #incident-and-ops}

Incident and operations management includes tasks such as monitoring, event management, high availability, problem determination, recovery, and full state backup and recovery.

Task {{site.data.keyword.IBM_notm}} Responsibilities Your Responsibilities
Data incidents. It is the responsibility of {{site.data.keyword.IBM_notm}} to inform you if your data is lost. Not applicable
Ensure that the application is available. It is the responsibility of {{site.data.keyword.IBM_notm}} to inform you if the application is not available. Not applicable
Track events. It is the responsibility of {{site.data.keyword.IBM_notm}} to ensure that {{site.data.keyword.cloudaccesstraillong_notm}} is tracking events. It is your responsibility to monitor events by using {{site.data.keyword.cloudaccesstraillong_notm}} to ensure that your application is being accessed only by users with the correct authority. It is also your responsibility to ensure that an {{site.data.keyword.cloudaccesstrailshort}} instance is set up to receive events. For more information, see Auditing events for {{site.data.keyword.registryshort_notm}}.
{: row-headers}
{: caption="Responsibilities for incident and operations" caption-side="bottom"}
{: summary="The first column describes the task that the customer or {{site.data.keyword.IBM_notm}} might be responsible for. The second column describes {{site.data.keyword.IBM_notm}} responsibilities for that task. The third column describes your responsibilities as the customer for that task."}
{: #table_registry_responsibilities_incident}

Change management

{: #change-management}

Change management includes tasks such as deployment, configuration, upgrades, patching, configuration changes, and deletion.

Task {{site.data.keyword.IBM_notm}} Responsibilities Your Responsibilities
Provisioning. It is the responsibility of {{site.data.keyword.IBM_notm}} to provision the service. Not applicable
Deprovisioning. It is the responsibility of {{site.data.keyword.IBM_notm}} to deprovision the service. Not applicable
Update package versions. Not applicable It is your responsibility to update package versions inside container images. You can use Vulnerability Advisor to identify the required updates. For more information, see Managing image security with Vulnerability Advisor.
{: row-headers}
{: caption="Responsibilities for change management" caption-side="bottom"}
{: summary="The first column describes the task that the customer or {{site.data.keyword.IBM_notm}} might be responsible for. The second column describes {{site.data.keyword.IBM_notm}} responsibilities for that task. The third column describes your responsibilities as the customer for that task."}
{: #table_registry_responsibilities_change_mgmt}

Identity and access management

{: #iam-responsibilities}

Identity and access management includes tasks such as authentication, authorization, access control policies, and approving, granting, and revoking access.

Task {{site.data.keyword.IBM_notm}} Responsibilities Your Responsibilities
Authentication It is the responsibility of {{site.data.keyword.IBM_notm}} to implement authentication. Not applicable
Process access policies It is the responsibility of {{site.data.keyword.IBM_notm}} to ensure that the policies are processed. Not applicable
Set up access policies Not applicable It is your responsibility to set up access policies. For more information, see Creating policies.
Access to back-end resources It is the responsibility of {{site.data.keyword.IBM_notm}} to access to back-end resources. Not applicable
Access to namespaces Not applicable It is your responsibility to set up access to namespaces. For more information, see Automating access to {{site.data.keyword.registrylong_notm}}.
{: row-headers}
{: caption="Responsibilities for identity and access management" caption-side="bottom"}
{: summary="The first column describes the task that the customer or {{site.data.keyword.IBM_notm}} might be responsible for. The second column describes {{site.data.keyword.IBM_notm}} responsibilities for that task. The third column describes your responsibilities as the customer for that task."}
{: #table_registry_responsibilities_iam}

Security and regulation compliance

{: #security-compliance}

Security and regulation compliance includes tasks such as security controls implementation and compliance certification.

Task {{site.data.keyword.IBM_notm}} Responsibilities Your Responsibilities
Secure confidential information. Not applicable It is your responsibility to make sure that no confidential information is put into your images.
Ensure that the service instance is secure. It is the responsibility of {{site.data.keyword.IBM_notm}} to ensure the security of the service instance. Not applicable
{: row-headers}
{: caption="Responsibilities for security and regulation compliance" caption-side="bottom"}
{: summary="The first column describes the task that the customer or {{site.data.keyword.IBM_notm}} might be responsible for. The second column describes {{site.data.keyword.IBM_notm}} responsibilities for that task. The third column describes your responsibilities as the customer for that task."}
{: #table_registry_responsibilities_security}

Disaster recovery

{: #disaster-recovery}

Disaster recovery includes tasks such as the following tasks:

  • Providing dependencies on disaster recovery sites
  • Provisioning disaster recovery environments
  • Backing up data and configuration
  • Replicating data and configuration to the disaster recovery environment
  • Fail over on disaster events

For more information, see High availability for {{site.data.keyword.registryshort_notm}} and Business continuity and disaster recovery for {{site.data.keyword.registryshort_notm}}.

Task {{site.data.keyword.IBM_notm}} Responsibilities Your Responsibilities
Copy your data to another region. Not applicable It is your responsibility to copy the data to another region. For more information, see Regions.
Restore the contents of the data in a single region. It is the responsibility of {{site.data.keyword.IBM_notm}} to restore the contents of the data in a single region. Not applicable
{: row-headers}
{: caption="Responsibilities for disaster recovery" caption-side="bottom"}
{: summary="The first column describes the task that the customer or {{site.data.keyword.IBM_notm}} might be responsible for. The second column describes {{site.data.keyword.IBM_notm}} responsibilities for that task. The third column describes your responsibilities as the customer for that task."}
{: #table_registry_responsibilities_dr}