copyright | lastupdated | keywords | subcollection | ||
---|---|---|---|---|---|
|
2024-10-09 |
Responsibilities, change management, identity and access management, incident and operations management, security and regulation compliance, disaster recovery, responsibility, access |
Registry |
{{site.data.keyword.attribute-definition-list}}
{: #registry_responsibilities}
Learn about the management responsibilities and terms and conditions that you have when you use {{site.data.keyword.registrylong}}. {: shortdesc}
For a high-level view of the service types in {{site.data.keyword.cloud_notm}} and the breakdown of responsibilities between the customer and {{site.data.keyword.IBM_notm}} for each type, see Shared responsibilities for {{site.data.keyword.cloud_notm}} offerings.
Review the following sections for the specific responsibilities for you and for {{site.data.keyword.IBM_notm}} when you use {{site.data.keyword.registrylong_notm}}. For the overall terms of use, see {{site.data.keyword.cloud_notm}} Terms and Notices.
{: #incident-and-ops}
Incident and operations management includes tasks such as monitoring, event management, high availability, problem determination, recovery, and full state backup and recovery.
Task | {{site.data.keyword.IBM_notm}} Responsibilities | Your Responsibilities |
---|---|---|
Data incidents. | It is the responsibility of {{site.data.keyword.IBM_notm}} to inform you if your data is lost. | Not applicable |
Ensure that the application is available. | It is the responsibility of {{site.data.keyword.IBM_notm}} to inform you if the application is not available. | Not applicable |
Track events. | It is the responsibility of {{site.data.keyword.IBM_notm}} to ensure that {{site.data.keyword.cloudaccesstraillong_notm}} is tracking events. | It is your responsibility to monitor events by using {{site.data.keyword.cloudaccesstraillong_notm}} to ensure that your application is being accessed only by users with the correct authority. It is also your responsibility to ensure that an {{site.data.keyword.cloudaccesstrailshort}} instance is set up to receive events. For more information, see Auditing events for {{site.data.keyword.registryshort_notm}}. |
{: row-headers} | ||
{: caption="Responsibilities for incident and operations" caption-side="bottom"} | ||
{: summary="The first column describes the task that the customer or {{site.data.keyword.IBM_notm}} might be responsible for. The second column describes {{site.data.keyword.IBM_notm}} responsibilities for that task. The third column describes your responsibilities as the customer for that task."} | ||
{: #table_registry_responsibilities_incident} |
{: #change-management}
Change management includes tasks such as deployment, configuration, upgrades, patching, configuration changes, and deletion.
Task | {{site.data.keyword.IBM_notm}} Responsibilities | Your Responsibilities |
---|---|---|
Provisioning. | It is the responsibility of {{site.data.keyword.IBM_notm}} to provision the service. | Not applicable |
Deprovisioning. | It is the responsibility of {{site.data.keyword.IBM_notm}} to deprovision the service. | Not applicable |
Update package versions. | Not applicable | It is your responsibility to update package versions inside container images. You can use Vulnerability Advisor to identify the required updates. For more information, see Managing image security with Vulnerability Advisor. |
{: row-headers} | ||
{: caption="Responsibilities for change management" caption-side="bottom"} | ||
{: summary="The first column describes the task that the customer or {{site.data.keyword.IBM_notm}} might be responsible for. The second column describes {{site.data.keyword.IBM_notm}} responsibilities for that task. The third column describes your responsibilities as the customer for that task."} | ||
{: #table_registry_responsibilities_change_mgmt} |
{: #iam-responsibilities}
Identity and access management includes tasks such as authentication, authorization, access control policies, and approving, granting, and revoking access.
Task | {{site.data.keyword.IBM_notm}} Responsibilities | Your Responsibilities |
---|---|---|
Authentication | It is the responsibility of {{site.data.keyword.IBM_notm}} to implement authentication. | Not applicable |
Process access policies | It is the responsibility of {{site.data.keyword.IBM_notm}} to ensure that the policies are processed. | Not applicable |
Set up access policies | Not applicable | It is your responsibility to set up access policies. For more information, see Creating policies. |
Access to back-end resources | It is the responsibility of {{site.data.keyword.IBM_notm}} to access to back-end resources. | Not applicable |
Access to namespaces | Not applicable | It is your responsibility to set up access to namespaces. For more information, see Automating access to {{site.data.keyword.registrylong_notm}}. |
{: row-headers} | ||
{: caption="Responsibilities for identity and access management" caption-side="bottom"} | ||
{: summary="The first column describes the task that the customer or {{site.data.keyword.IBM_notm}} might be responsible for. The second column describes {{site.data.keyword.IBM_notm}} responsibilities for that task. The third column describes your responsibilities as the customer for that task."} | ||
{: #table_registry_responsibilities_iam} |
{: #security-compliance}
Security and regulation compliance includes tasks such as security controls implementation and compliance certification.
Task | {{site.data.keyword.IBM_notm}} Responsibilities | Your Responsibilities |
---|---|---|
Secure confidential information. | Not applicable | It is your responsibility to make sure that no confidential information is put into your images. |
Ensure that the service instance is secure. | It is the responsibility of {{site.data.keyword.IBM_notm}} to ensure the security of the service instance. | Not applicable |
{: row-headers} | ||
{: caption="Responsibilities for security and regulation compliance" caption-side="bottom"} | ||
{: summary="The first column describes the task that the customer or {{site.data.keyword.IBM_notm}} might be responsible for. The second column describes {{site.data.keyword.IBM_notm}} responsibilities for that task. The third column describes your responsibilities as the customer for that task."} | ||
{: #table_registry_responsibilities_security} |
{: #disaster-recovery}
Disaster recovery includes tasks such as the following tasks:
- Providing dependencies on disaster recovery sites
- Provisioning disaster recovery environments
- Backing up data and configuration
- Replicating data and configuration to the disaster recovery environment
- Fail over on disaster events
For more information, see High availability for {{site.data.keyword.registryshort_notm}} and Business continuity and disaster recovery for {{site.data.keyword.registryshort_notm}}.
Task | {{site.data.keyword.IBM_notm}} Responsibilities | Your Responsibilities |
---|---|---|
Copy your data to another region. | Not applicable | It is your responsibility to copy the data to another region. For more information, see Regions. |
Restore the contents of the data in a single region. | It is the responsibility of {{site.data.keyword.IBM_notm}} to restore the contents of the data in a single region. | Not applicable |
{: row-headers} | ||
{: caption="Responsibilities for disaster recovery" caption-side="bottom"} | ||
{: summary="The first column describes the task that the customer or {{site.data.keyword.IBM_notm}} might be responsible for. The second column describes {{site.data.keyword.IBM_notm}} responsibilities for that task. The third column describes your responsibilities as the customer for that task."} | ||
{: #table_registry_responsibilities_dr} |