Google Cloud DevOps Certification Practice Test

Question: 1 / 400

What is the recommended action to ensure only trusted images are deployed to Google Kubernetes Engine (GKE) clusters?

Enable Cloud Security Scanner on the clusters.

Enable Vulnerability Analysis on the Container Registry.

Set up the Kubernetes Engine clusters as private clusters.

Set up the Kubernetes Engine clusters with Binary Authorization.

The recommended action of setting up Kubernetes Engine clusters with Binary Authorization is essential for ensuring that only trusted images are deployed. Binary Authorization is a security feature that acts as a policy enforcement tool, allowing organizations to define and enforce deployment policies for their container images. This ensures that only artifacts that meet specific criteria, such as being signed or meeting vulnerability assessment requirements, can be deployed to the clusters.

When you implement Binary Authorization, you can require that images are only approved and signed by trusted authorities before they can be deployed. This adds a significant layer of security by preventing untrusted or potentially harmful images from being run in your environments. It effectively integrates security into the development pipeline, promoting a more automated and compliant process that improves the overall security posture of your applications running in GKE.

In contrast, while enabling Cloud Security Scanner can help identify vulnerabilities in your running applications, it does not prevent untrusted images from being deployed in the first place. Enabling Vulnerability Analysis on the Container Registry can identify vulnerabilities in the container images stored within the registry but, similarly, does not enforce deployment policies. Lastly, setting up private clusters can enhance the security of the network environment, but it does not specifically address the trustworthiness of the container images themselves. Therefore, implementing Binary

Get further explanation with Examzify DeepDiveBeta
Next Question

Report this question

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy