Skip to content
Merged
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion docs/guides/responsibilities.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -44,7 +44,7 @@ Security and regulation compliance includes tasks such as security controls impl
| Task | IBM responsibilities | Your responsibilities |
| --- | --- | --- |
| General | <ul><li>Maintain controls commensurate to various industry compliance standards.</li><li>Monitor, isolate, and recover service functionality.</li><li>Monitor and report the health of service interfaces.</li></ul> | Ensure that personal and regulated data is not provided. |
| Vulnerabilities | Monitor to detect vulnerability and security compliance issues. | <ul><li>Keep informed about possible vulnerabilities and security issues through security bulletins that provide potential remediation actions.</li><li>Check the [IBM Cloud status website](https://cloud.ibm.com/status) to find announcements and security bulletins about key events that affect the IBM Cloud platform, infrastructure, and major services.</li></ul> |
| Vulnerabilities | Monitor to detect vulnerability and security compliance issues. | <ul><li>Keep informed about possible vulnerabilities and security issues through security bulletins that provide potential remediation actions.</li><li>Check the [security section of the Qiskit GitHub repository.](https://github.com/Qiskit/qiskit/security) All security vulnerabilities are posted there.</li><li>Check the [IBM Cloud status website](https://cloud.ibm.com/status) to find announcements and security bulletins about key events that affect the IBM Cloud platform, infrastructure, and major services.</li></ul> |
| Encryption | Encrypt data when it is transmitted on any public networks and within the Cloud Service's private data center network. Encryption methods such as HTTPS and TLS are used to protect data in motion. | Ensure, as required, that your connection is encrypted end-to-end. |
| Security | <ul><li>Ensure the security of data on disk and data in motion within its infrastructure.</li><li>Provide a secure service that complies with key standards.</li></ul> | Restrict [user access](/docs/guides/access-groups) to the appropriate resources and resource groups. |

Expand Down