Valid Professional-Cloud-Security-Engineer Dumps shared by ExamDiscuss.com for Helping Passing Professional-Cloud-Security-Engineer Exam! ExamDiscuss.com now offer the newest Professional-Cloud-Security-Engineer exam dumps, the ExamDiscuss.com Professional-Cloud-Security-Engineer exam questions have been updated and answers have been corrected get the newest ExamDiscuss.com Professional-Cloud-Security-Engineer dumps with Test Engine here:
Your organization is transitioning to Google Cloud You want to ensure that only trusted container images are deployed on Google Kubernetes Engine (GKE) clusters in a project. The containers must be deployed from a centrally managed. Container Registry and signed by a trusted authority. What should you do? Choose 2 answers
Correct Answer: A,B
* Configure Binary Authorization: * Binary Authorization is a deploy-time security control that ensures only trusted container images are deployed on GKE. It uses attestations to verify the authenticity and integrity of the images. * Enable Binary Authorization in your project through the Google Cloud Console or using the gcloud command-line tool. * Define attestation policies that specify which attestors (trusted entities) must sign off on container images before deployment. * Set Up Attestors: * Create and configure attestors that will sign the container images. This involves generating cryptographic keys and setting up trusted authorities. * Attestors can be configured to sign images based on criteria such as vulnerability scanning results, compliance checks, and other security policies. * Create a Custom Organization Policy Constraint: * Define an organization policy constraint that enforces Binary Authorization across your GKE clusters. * This custom constraint ensures that all clusters in the organization must adhere to the Binary Authorization policy, preventing the deployment of unsigned or unauthorized container images. * Implement and Enforce the Policies: * Apply the Binary Authorization policy and the organization policy constraint to your GKE clusters. * Regularly review and update the policies and attestation rules to align with your security and compliance requirements. References: * Binary Authorization Documentation * Creating Attestors * Organization Policy Constraints