Your organization heavily utilizes serverless applications while prioritizing security best practices. You are responsible for enforcing image provenance and compliance with security standards before deployment. You leverage Cloud Build as your continuous integration and continuous deployment (CI/CD) tool for building container images. You must configure Binary Authorization to ensure that only images built by your Cloud Build pipeline are deployed and that the images pass security standard compliance checks. What should you do?
KLei
4 days, 6 hours agojmaquino
3 weeks agojmaquino
3 weeks agojson4u
1 month agoabdelrahman89
1 month, 2 weeks agojmaquino
3 weeks ago