Google Distributed Cloud(GDC)エアギャップ アプライアンスは、アプライアンスのベアメタル サーバーで管理クラスタを直接実行します。メンテナンスと管理の目的で、これらのクラスタとベアメタルホストの基盤となる OS にアクセスするための認証情報が提供されています。
ワークロードとベアメタル ホストの OS の間に強力なセキュリティ境界がないため、このモデルではワークロードがホスト OS にアクセスできると想定されます。その結果、ワークロードが OS 設定を変更し、デバイス全体のセキュリティが低下する可能性があります。また、アプライアンス上の Google 管理アプリケーションにアクセスできるため、これらのアプリケーションやその更新メカニズムを破損する可能性があります。
[[["わかりやすい","easyToUnderstand","thumb-up"],["問題の解決に役立った","solvedMyProblem","thumb-up"],["その他","otherUp","thumb-up"]],[["わかりにくい","hardToUnderstand","thumb-down"],["情報またはサンプルコードが不正確","incorrectInformationOrSampleCode","thumb-down"],["必要な情報 / サンプルがない","missingTheInformationSamplesINeed","thumb-down"],["翻訳に関する問題","translationIssue","thumb-down"],["その他","otherDown","thumb-down"]],["最終更新日 2025-09-04 UTC。"],[[["\u003cp\u003eGoogle Distributed Cloud (GDC) air-gapped appliance administration clusters run directly on bare metal servers, granting users access to both the clusters and the underlying operating system.\u003c/p\u003e\n"],["\u003cp\u003eDue to the lack of a strict security barrier, workloads on the appliance may have access to the host OS, creating the potential for changes to OS settings that can reduce device security.\u003c/p\u003e\n"],["\u003cp\u003eSimilar to GKE Enterprise's Shared Responsibility Model, Google provides secure binaries and defaults, while customers are responsible for securely running and updating them.\u003c/p\u003e\n"],["\u003cp\u003eGoogle is responsible for providing secure hardware, firmware, operating systems, and application binaries, while customers are responsible for managing access, updating software, and configuring secure settings.\u003c/p\u003e\n"],["\u003cp\u003eCustomers must manage local device storage and log transfers, while Google provides secure data transfer methods to and from the device.\u003c/p\u003e\n"]]],[],null,["# Shared responsibility model\n\nGoogle Distributed Cloud (GDC) air-gapped appliance runs its administration clusters directly on the\nappliance bare metal servers. For maintenance and administrative purposes, you\nhave been provided credentials for accessing these clusters as well as the underlying OS of the bare metal hosts.\n\nDue to the lack of a strong security boundary between your workloads and the OS for the bare metal hosts, it's assumed that this model results in your workloads having access to the host OS. As a result, your workloads could potentially change OS settings, reducing overall device security. Additionally, you have access to any Google-managed applications on the appliance, with the potential to break those applications or their update mechanisms.\n\nThis is similar to the\n[Shared Responsibility Model](/anthos/docs/concepts/gke-shared-responsibility)\nprovided by GKE Enterprise products: Google provides secure binaries with\nsecure defaults, and it's up to the customer to securely run and update them."]]