copyright | lastupdated | keywords | subcollection | ||
---|---|---|---|---|---|
|
2024-06-19 |
DevSecOps, COS, secure toolchain, compliance, bucket |
devsecops |
{{site.data.keyword.attribute-definition-list}}
{: #cd-devsecops-cos-config}
Complete these steps to create an {{site.data.keyword.cos_full_notm}} instance and {{site.data.keyword.cos_full_notm}} bucket to store evidence that is used by the {{site.data.keyword.cloud_notm}} DevSecOps pipelines. {: shortdesc}
{: #cd-devsecops-cos-instance-create}
Create an {{site.data.keyword.cos_full_notm}} instance{: external}.
{: #cd-devsecops-cos-bucket-create}
In Cloud {{site.data.keyword.cos_short}}, files are grouped in buckets. You might think of buckets like directories, except that no subdirectories are in buckets.
- In Cloud {{site.data.keyword.cos_short}}, click Buckets.
- Click Create bucket.
- Choose the Customize your bucket option.
- Give the bucket a unique, memorable name to help you remember what the bucket is for. Over time, you might create many buckets.
- Set Resiliency to Regional. Regional resiliency has the best performance with the lowest cost. However, if the ability to survive a regional outage is essential, set the resiliency to "Cross Region."
- For best performance, set Location to the same location as your toolchain location.
- Usually, the default for Storage class is suitable for use, so you don't need to use ADVANCED CONFIGURATION.
{: #cd-devsecops-cos-service-credential}
- In Cloud {{site.data.keyword.cos_short}}, click Service Credential.
- Click New Credential.
- Select Include HMAC Credential to include HMAC keys in the credential.
- Provide the details:
- Name: Name of the credential.
- Role: Role for the credential. The Object writer and Reader role is suggested for handling evidence.
{: #cd-devsecops-cos-bucket-access}
- In Cloud {{site.data.keyword.cos_short}}, click Buckets.
- Select the bucket that was created in the previous step.
- Click Access policies, and select the Service IDs option
- Select the service credential that was created in the previous step, and select the Object writer and Reader role.
- Click Create Access Policy.
{: #cd-devsecops-cos-apikey-copy}
- In Cloud {{site.data.keyword.cos_short}}, click Service Credential.
- Click expand the service credential to view the apikey.
- Note the apikey because you need it later when setting up your DevSecOps pipelines.
{: #cd-devsecops-cos-related-content}