[[["わかりやすい","easyToUnderstand","thumb-up"],["問題の解決に役立った","solvedMyProblem","thumb-up"],["その他","otherUp","thumb-up"]],[["わかりにくい","hardToUnderstand","thumb-down"],["情報またはサンプルコードが不正確","incorrectInformationOrSampleCode","thumb-down"],["必要な情報 / サンプルがない","missingTheInformationSamplesINeed","thumb-down"],["翻訳に関する問題","translationIssue","thumb-down"],["その他","otherDown","thumb-down"]],["最終更新日 2025-09-04 UTC。"],[],[],null,["# Statement of shared responsibility for security\n\nRunning business-critical workloads on Cloud Build requires that multiple\nparties assume different responsibilities. The shared responsibility model\ndescribed in this document clarifies that Google Cloud is\naccountable for the security of the Cloud Build service itself and\nits underlying infrastructure, while you, the customer, are responsible for\nsecurity in how Cloud Build is used, including your specific builds,\nconfigurations, data, and the container images you execute using\nCloud Build.\n\nWhile not an exhaustive list, this page lists the respective responsibilities of\nGoogle Cloud and the customer.\n\nGoogle Cloud Responsibilities\n-----------------------------\n\n- Protecting the underlying infrastructure, including hardware, firmware,\n kernel, operating system, storage, and network.\n\n This includes the following:\n - Protecting the physical security of data centers, default encryption of data at rest and in transit, and secure network components.\n - Providing network protection using VPC Service Controls.\n - Following secure software development practices.\n - Managing and securing the Cloud Build service control plane (API, backend, schedulers, etc.), including patching and hardening.\n - Providing ephemeral, isolated build environments for each build invocation.\n- Providing Google Cloud integrations for\n [Identity and Access Management](/iam) (IAM),\n [Cloud Audit Logs](/logging/docs/audit), [Cloud Key Management Service](/kms/docs), and others.\n\n- Restricting Google Cloud administrative access to\n customer resources for contractual support purposes, with\n [Access Transparency](/assured-workloads/access-transparency/docs) and\n [Access Approval](/assured-workloads/access-approval/docs/overview),\n and logging all such access.\n\n- Producing authentic [SLSA provenance](https://slsa.dev/), when configured to\n do so.\n\nThe Customer's Responsibilities\n-------------------------------\n\n- Securing your application source code, build configuration files, and all\n container images used in your builds.\n\n This includes evaluating image suitability for your security standards,\n leveraging the latest supported image versions, and following best practices\n for open source components and overall build configuration.\n\n For scenarios demanding the highest degree of security, consider bringing your\n own hardened images for running builds.\n- Ensuring any 3rd-party integration tokens (such as those provided to establish\n a repository link) are appropriately safeguarded.\n\n- Configuring IAM for all users, groups, and service accounts\n interacting with Cloud Build, in accordance with the\n [principle of least privilege](/iam/docs/using-iam-securely).\n\n We recommend you use dedicated, user-specified service accounts for builds\n instead of default ones.\n\n Ensure that your build scripts make appropriate use of the provided build\n credentials, 3P integration tokens, and secrets that are made available to the\n build, and guard against exfiltration.\n- Enabling and acting on vulnerability scanning for build artifacts (for\n example, using Artifact Analysis), generating build provenance data,\n and implementing deployment policies (for example, using Binary Authorization) to\n ensure only authorized and verified images are deployed.\n\n- Providing Google with environmental details when requested for troubleshooting\n purposes.\n\nWhat's next\n-----------\n\n- [Read more](/architecture/framework/security/shared-responsibility-shared-fate) about the Google Cloud shared responsibility model."]]