[[["容易理解","easyToUnderstand","thumb-up"],["確實解決了我的問題","solvedMyProblem","thumb-up"],["其他","otherUp","thumb-up"]],[["難以理解","hardToUnderstand","thumb-down"],["資訊或程式碼範例有誤","incorrectInformationOrSampleCode","thumb-down"],["缺少我需要的資訊/範例","missingTheInformationSamplesINeed","thumb-down"],["翻譯問題","translationIssue","thumb-down"],["其他","otherDown","thumb-down"]],["上次更新時間:2025-09-04 (世界標準時間)。"],[],[],null,["# Secure Source Manager overview\n\nSecure Source Manager is a regionally deployed, single-tenant managed source code repository hosted on Google Cloud.\n\n\u003cbr /\u003e\n\nInstances and repositories\n--------------------------\n\nSecure Source Manager instances are deployed to an available Google Cloud\nregion and are accessible through their instance URIs. Repositories are created\nin the Secure Source Manager instance by using the web interface, or the\nSecure Source Manager API.\n\nSeparate roles and permissions are available for instances and repositories.\nSee [Access control with IAM](/secure-source-manager/docs/access-control) for information on all\nSecure Source Manager roles and permissions.\n\nGit actions\n-----------\n\nRepositories support all\n[Git SCM](https://git-scm.com/)\nclient commands and have built-in pull requests and issue tracking. Both HTTPS\nand SSH authentication are supported.\n\nFor more information on SSH authentication, see\n[SSH authentication](/secure-source-manager/docs/ssh-keys).\n\nTo get started using Git source code with Secure Source Manager, see\n[Use Git SCM](/secure-source-manager/docs/use-git).\n\nIssues and pull requests\n------------------------\n\nYou can create issues and pull requests in the Secure Source Manager web\ninterface. You can add reviewers, labels, milestones, assignees, and due dates to\nyour pull requests. You can open an issue on a specific branch or tag, and add\nlabels, milestones, and assignees to the issue. For more information on issues\nand pull requests, see\n[Work with issues and pull requests](/secure-source-manager/docs/work-with-issues-pull-requests).\n\nNotifications\n-------------\n\nSecure Source Manager can send you notifications for events in pull requests\nand issues in which you're participating or for repositories you're watching.\n\nFor more information on notifications, read the\n[Notifications overview](/secure-source-manager/docs/notifications-overview) or get started with notifications\nby following the instructions in [Set up notifications](/secure-source-manager/docs/set-up-notifications).\n\nConnect to other services\n-------------------------\n\nYou can invoke builds automatically using the following methods:\n\n- Create a Secure Source Manager [triggers file](/secure-source-manager/docs/triggers-file-schema) to connect to Cloud Build.\n- Use [Secure Source Manager webhooks](/secure-source-manager/docs/webhooks-overview) to connect to Jenkins or other services.\n\nFor information on connecting to Cloud Build, see\n[Connect to Cloud Build](/secure-source-manager/docs/connect-cloud-build).\n\nFor information on connecting to Jenkins, see\n[Connect to Jenkins](/secure-source-manager/docs/connect-jenkins).\n\nProtect branches\n----------------\n\nWhen enabled, protected branches block commits based on configurable rules. You\ncan configure multiple branch protection rules for different sets of branches.\n\nThe following branch protection options are configurable:\n\n- Specify a single branch to apply the branch protection rule to, or apply the branch protection rule to all branches.\n- Require pull requests before merging into protected branches.\n- Set the required number of reviewers and approvers before a pull request can be merged into a protected branch.\n- Block merging a pull request if new commits are added after approvals are granted.\n- Require comments to be resolved before merging into a protected branch.\n- Require a linear Git history.\n- Require successful build status checks before merging a pull request into a protected branch.\n\nFor more information on protecting branches in Secure Source Manager, see\n[Branch protection overview](/secure-source-manager/docs/branch-protection-overview).\n\nEncrypt data\n------------\n\nBy default, Google Cloud automatically [encrypts data when it is at\nrest](/security/encryption-at-rest/default-encryption) using encryption keys\nmanaged by Google. If you have specific compliance or regulatory requirements\nrelated to the keys that protect your data, you can use customer-managed\nencryption keys (CMEK) for creating a Secure Source Manager instance.\n\nWhen you enable CMEK, data at rest in the instance is encrypted using a key that\nyou manage within Cloud Key Management Service. You can control access to the CMEK key\nusing Identity and Access Management. If you temporarily disable or permanently destroy the CMEK\nkey, data encrypted with that key cannot be accessed. For more information on\ncreating Secure Source Manager instances using CMEK, see\n[Customer-managed encryption keys](/secure-source-manager/docs/cmek).\n\nConfigure a private Secure Source Manager instance in a VPC Service Controls perimeter\n--------------------------------------------------------------------------------------\n\nYou can use Secure Source Manager in a [VPC Service Controls](/vpc-service-controls/docs/overview)\nperimeter in order to guard against data exfiltration. For more information, see\n[Configure Secure Source Manager in a VPC Service Controls perimeter](/secure-source-manager/docs/configure-service-perimeter).\n\nWhat's next\n-----------\n\n- [Enable the Secure Source Manager API](/secure-source-manager/docs/enable-disable).\n- [Create a Secure Source Manager instance](/secure-source-manager/docs/create-instance).\n- [Create and clone a Secure Source Manager repository](/secure-source-manager/docs/create-clone-repository).\n- Read about [Software supply chain security](/software-supply-chain-security/docs)."]]