
Explanation:
The correct approach is to enable binary authorization on the clusters and apply a policy to govern the allowed images. Binary authorization provides a way to allow or block the deployment of images based on policies, which is exactly what's needed in this scenario.
For more details, refer to the Binary Authorization documentation.
Ultimate access to all questions.
No comments yet.
As a DevOps engineer for a financial organization, you're tasked with setting up an automated CI/CD pipeline to deploy applications to GKE clusters in production. A key requirement is to restrict the types and sources of container images that can be deployed. How would you implement this restriction?
A
Apply IAM permissions to restrict the container images that can be deployed on clusters
B
Create custom routes to control traffic to the clusters
C
Enable binary authorization on the clusters and apply a policy to govern the allowed images
D
Apply firewall rules to the VPCs