Google Cloud DevOps Certification Practice Test

Session length

1 / 20

What is the recommended method for ensuring only trusted and approved images are deployed on GKE clusters?

Enable Container Analysis in Artifact Registry

Use Binary Authorization to attest images during your CI/CD pipeline

The recommended method for ensuring only trusted and approved images are deployed on Google Kubernetes Engine (GKE) clusters is to use Binary Authorization to attest images during your CI/CD pipeline. Binary Authorization provides a framework for managing the deployment of container images based on the criteria you specify, allowing you to enforce policies that dictate which images can be deployed to your GKE clusters.

When using Binary Authorization, you can create policies that require certain criteria to be met before an image is allowed to be deployed. This could include requiring images to be signed by trusted authorities or requiring specific approval workflows to be followed. This systematic approach helps mitigate risks associated with deploying unverified or malicious images.

While enabling Container Analysis in Artifact Registry can help identify vulnerabilities in images, it is primarily focused on scanning and reporting issues rather than controlling the deployment process itself. IAM policies contribute to security by managing permissions, but they do not specifically address the issue of image trustworthiness at the deployment stage. Tools like Falco or Twistlock can enhance security by monitoring runtime behavior and identifying vulnerabilities, but they do not prevent unapproved images from being deployed initially.

Therefore, the use of Binary Authorization directly addresses the need for approving images before they can be used in your GKE clusters, making it the most

Get further explanation with Examzify DeepDiveBeta

Configure IAM policies to create a least privilege model

Deploy Falco or Twistlock to monitor for vulnerabilities

Next Question
Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy