[[["易于理解","easyToUnderstand","thumb-up"],["解决了我的问题","solvedMyProblem","thumb-up"],["其他","otherUp","thumb-up"]],[["很难理解","hardToUnderstand","thumb-down"],["信息或示例代码不正确","incorrectInformationOrSampleCode","thumb-down"],["没有我需要的信息/示例","missingTheInformationSamplesINeed","thumb-down"],["翻译问题","translationIssue","thumb-down"],["其他","otherDown","thumb-down"]],["最后更新时间 (UTC):2025-04-02。"],[[["Artifact Analysis employs Identity and Access Management (IAM) to manage granular access to resources, tailored to specific tasks."],["Metadata management involves providers who create metadata (notes) and customers who identify instances of these notes (occurrences)."],["Providers should use the Container Analysis Notes Editor role to create notes and the Container Analysis Occurrences for Notes Viewer role to see occurrences attached to them, ideally in a dedicated project."],["Customers should utilize the Container Analysis Occurrences Editor role to create occurrences and the Container Analysis Notes Attacher role to attach occurrences to notes in a provider project, along with the Container Analysis Occurrences Viewer role to list them."],["For vulnerability metadata, Artifact Analysis allows providers to manage vulnerability occurrences, preventing customers from manipulating this data, therefore enforcing security policies."]]],[]]