December 20, 2021 By Ethan Long < 1 min read

Beginning January 31, 2022, Vulnerability Advisor for IBM Cloud Container Registry will no longer replicate exemptions between IBM Cloud regions.

What are exemptions?

Exemptions are policies that exclude any matching vulnerabilities or configuration issues from Vulnerability Advisor reports. Exemptions are typically used when the issues are checked and found to be irrelevant to the account. The exemption status is displayed in the vulnerability report for any images that are within the policy’s scope.

For more information, see Setting organizational exemption policies.

What is the current behavior?

In some IBM Cloud Container Registry regions, exemptions are replicated for consistency. You can manage exemptions in one of these regions, and the settings for that region apply to all the regions that allow replication of exemptions. In all other regions, exemptions must be managed separately in each region and apply only in the region where the exemption is set.

Which regions currently replicate exemptions?

Exemptions are currently replicated in the following IBM Cloud regions:

  • au-syd (ap-south)
  • eu-de (eu-central)
  • eu-gb (uk-south)
  • jp-tok (ap-north)
  • us-south
  • Global

All other regions require separate exemption management.

Do I have any exemptions?

To find out whether you have any exemptions in a particular region, set the region by running ibmcloud cr region-set and then run the ibmcloud cr exemption-list command.

How does this change affect me?

Beginning January 31, 2022, all regions will require separate exemption management. Any existing exemptions created before this date in the replicated regions are still present after this date. However, any changes from this date must be performed in each region where you want the change to take effect.

Learn more about IBM Cloud Container Registry.

More from Announcements

IBM Hybrid Cloud Mesh and Red Hat Service Interconnect: A new era of app-centric connectivity 

2 min read - To meet customer demands, applications are expected to be performing at their best at all times. Simultaneously, applications need to be flexible and cost effective, and therefore supported by an underlying infrastructure that is equally reliant, performant and secure as the applications themselves.   Easier said than done. According to EMA's 2024 Network Management Megatrends report only 42% of responding IT professionals would rate their network operations as successful.   In this era of hyper-distributed infrastructure where our users, apps, and data…

IBM named a Leader in Gartner Magic Quadrant for SIEM, for the 14th consecutive time

3 min read - Security operations is getting more complex and inefficient with too many tools, too much data and simply too much to do. According to a study done by IBM, SOC team members are only able to handle half of the alerts that they should be reviewing in a typical workday. This potentially leads to missing the important alerts that are critical to an organization's security. Thus, choosing the right SIEM solution can be transformative for security teams, helping them manage alerts…

IBM and MuleSoft expand global relationship to accelerate modernization on IBM Power 

2 min read - As companies undergo digital transformation, they rely on APIs as the backbone for providing new services and customer experiences. While APIs can simplify application development and deliver integrated solutions, IT shops must have a robust solution to effectively manage and govern them to ensure that response times and costs are kept low for all applications. Many customers use Salesforce’s MuleSoft, named a leader by Gartner® in full lifecycle API management for seven consecutive times, to manage and secure APIs across…

IBM Newsletters

Get our newsletters and topic updates that deliver the latest thought leadership and insights on emerging trends.
Subscribe now More newsletters