You run applications on Cloud Run. You already enabled container analysis for vulnerability scanning. However, you are concerned about the lack of control on the applications that are deployed. You must ensure that only trusted container images are deployed on Cloud Run.
What should you do? (Choose two.)
chimz2002
Highly Voted 1 year agozanhsieh
Most Recent 4 months agodesertlotus1211
9 months, 2 weeks agoXoxoo
1 year, 1 month agoXoxoo
1 year, 1 month agoXoxoo
1 year, 1 month agoArizonaClassics
1 year, 1 month agoanshad666
1 year, 1 month agocyberpunk21
1 year, 1 month agoMithung30
1 year, 2 months agohykdlidesd
1 year, 2 months agopfilourenco
1 year, 2 months agoK1SMM
1 year, 2 months ago