
Ultimate access to all questions.
You are developing client applications on Cloud Run and Cloud Functions. Your client mandates that all logs must remain accessible for one year to allow importing into their logging service. You need to implement this with minimal code modifications. What is the recommended approach?
A
Deploy Falco or Twistlock on GKE to monitor for vulnerabilities on your running Pods.
B
Configure Identity and Access Management (IAM) policies to create a least privilege model on your GKE clusters.
C
Use Binary Authorization to attest images during your CI/CD pipeline.
D
Enable Container Analysis in Artifact Registry, and check for common vulnerabilities and exposures (CVEs) in your container images.