A. By downloading images on a machine with internet access and transferring them to the air-gapped environment.
B. Using encrypted channels to transfer images to the air-gapped environment.
C. Verifying the checksums of all images before loading them into the local registry.
D. Ensuring all transferred images are signed with an IBM-provided digital signature.