[[["わかりやすい","easyToUnderstand","thumb-up"],["問題の解決に役立った","solvedMyProblem","thumb-up"],["その他","otherUp","thumb-up"]],[["わかりにくい","hardToUnderstand","thumb-down"],["情報またはサンプルコードが不正確","incorrectInformationOrSampleCode","thumb-down"],["必要な情報 / サンプルがない","missingTheInformationSamplesINeed","thumb-down"],["翻訳に関する問題","translationIssue","thumb-down"],["その他","otherDown","thumb-down"]],["最終更新日 2025-04-02 UTC。"],[[["Artifact Analysis employs Identity and Access Management (IAM) to manage granular access to resources, tailored to specific tasks."],["Metadata management involves providers who create metadata (notes) and customers who identify instances of these notes (occurrences)."],["Providers should use the Container Analysis Notes Editor role to create notes and the Container Analysis Occurrences for Notes Viewer role to see occurrences attached to them, ideally in a dedicated project."],["Customers should utilize the Container Analysis Occurrences Editor role to create occurrences and the Container Analysis Notes Attacher role to attach occurrences to notes in a provider project, along with the Container Analysis Occurrences Viewer role to list them."],["For vulnerability metadata, Artifact Analysis allows providers to manage vulnerability occurrences, preventing customers from manipulating this data, therefore enforcing security policies."]]],[]]