Skip to content

Latest commit

 

History

History
71 lines (46 loc) · 5.49 KB

reference-shared-responsibilities.md

File metadata and controls

71 lines (46 loc) · 5.49 KB
copyright lastupdated subcollection keywords
years
2023, 2024
2024-10-09
powervs-vpc

{{site.data.keyword.attribute-definition-list}}

Understanding your responsibilities when you use Power Virtual Server with VPC landing zone deployable architecture

{: #shared-resp}

Learn about the management responsibilities and terms and conditions that you have when you use one of the Power Virtual Server with VPC landing zone deployable architecture. {: shortdesc}

Review the following section for the specific responsibilities for you and for {{site.data.keyword.IBM_notm}} when you use the Power Virtual Server with VPC landing zone deployable architecture.

Incident and operations management

{: #incident-and-ops}

Incident and operations management includes tasks such as monitoring, event management, high availability, problem determination, recovery, and full state backup and recovery.

The landing zone deployable architectures do not identify specific responsibilities in this area.

Identity and access management

{: #iam-responsibilities}

Identity and access management includes tasks such as authentication, authorization, access control policies, and approving, granting, and revoking access.

Task {{site.data.keyword.IBM_notm}} responsibilities Your responsibilities
Secure with least privilege Document the minimal IAM access requirements to run the deployable architecture.
Manage secrets * Generate the necessary secrets (for example, IAM API keys, SSH keys) that are required for the deployable architecture. \n * Manage generated secrets by following secure best practices.
{: row-headers}
{: caption="Responsibilities for identity and access management" caption-side="bottom"}
{: summary="The rows are read from left to right. The first column describes the task that the customer or IBM might be responsible for. The second column describes {{site.data.keyword.IBM_notm}} responsibilities for that task. The third column describes your responsibilities as the customer for that task."}

Security and regulation compliance

{: #security-compliance}

Security and regulation compliance includes tasks such as security controls implementation and compliance certification.

Task {{site.data.keyword.IBM_notm}} responsibilities Your responsibilities
Meet security and compliance objectives Provide a deployable architecture that complies with the set of controls that are defined with the release of the deployable architecture. The controls in the deployable architecture do not necessarily cover the complete profile for the {{site.data.keyword.framework-fs_notm}}, as shown in the Available predefined profiles.
Verify configuration changes Understand the effects on the security and compliance posture of any user-initiated changes to the default configuration. Run {{site.data.keyword.compliance_long}} checks if needed to ensure that the deployable architecture remains in compliance.
Ensure that the operating system image does not contain any vulnerabilities. IBM Cloud provided and verified operating system images are used. After deployment, operating system images are updated to the newest state in the defined minor release. Official RHEL software repositories are used for installation of additional software components (like SQUID proxy). Customer is responsible to keep the operating system secure and compliant after deployment.
{: row-headers}
{: caption="Responsibilities for security and regulation compliance" caption-side="bottom"}
{: summary="The rows are read from left to right. The first column describes the task that the customer or IBM might be responsible for. The second column describes {{site.data.keyword.IBM_notm}} responsibilities for that task. The third column describes your responsibilities as the customer for that task."}

Disaster recovery

{: #vpc-disaster-recovery}

Disaster recovery includes tasks such as providing dependencies on disaster recovery sites, provision disaster recovery environments, data and configuration backup, replicating data and configuration to the disaster recovery environment, and failover on disaster events.

The Power Virtual Server with VPC landing zone deployable architectures do not identify specific responsibilities in this area.