Ultimate access to all questions.
Your organization prioritizes security and heavily uses serverless applications. You need to enforce image provenance and ensure compliance with security standards before deployment. Using Cloud Build as your CI/CD tool for building container images, how should you configure Binary Authorization to guarantee that only images built by your Cloud Build pipeline are deployed and that these images have passed security compliance checks?