
Ultimate access to all questions.
To comply with your company's shift-left security initiative, the InfoSec team requires all Google Kubernetes Engine (GKE) clusters to enforce guardrails allowing only trusted and approved container images for deployment. How should you implement this requirement?
A
Enable Container Analysis in Artifact Registry, and check for common vulnerabilities and exposures (CVEs) in your container images
B
Use Binary Authorization to attest images during your CI/CD pipeline
C
Configure Identity and Access Management (IAM) policies to create a least privilege model on your GKE clusters.
D
Deploy Falco or Twistlock on GKE to monitor for vulnerabilities on your running Pods