VPC 서비스 제어는 Google 관리 서비스 및 리소스에서 데이터를 무단으로 복사하거나 전송하는 위험을 완화하는 데 도움을 줍니다.
VPC 서비스 제어를 사용하면 보안 경계를 구성하고 경계를 넘는 데이터 이동을 제어할 수 있습니다.
Binary Authorization은 정책, 증명자, 증명을 포함한 데이터를 저장합니다.
VPC 서비스 제어는 보안 경계에 Binary Authorization을 추가하여 이러한 리소스와 서비스를 보호할 수 있습니다.
또한 Binary Authorization은 배포, 증명자, 증명에 별도의Google Cloud 프로젝트를 사용하여 업무 분리를 지원합니다. 이러한 방식으로 Binary Authorization을 사용하는 경우 각 프로젝트를 VPC 서비스 제어 경계에 포함해야 합니다. 여러 프로젝트를 사용하여 업무를 분리하는 방법을 설명하는 엔드 투 엔드 튜토리얼은 다중 프로젝트 설정을 참조하세요.
Binary Authorization에서는 Artifact Analysis를 사용하여 증명자 및 증명을 각각 메모 및 어커런스로 저장할 수 있습니다. 이 경우 VPC 서비스 제어 경계에도 Artifact Analysis를 포함해야 합니다. 자세한 내용은 Artifact Analysis를 위한 VPC 서비스 제어 안내를 참조하세요.
[[["이해하기 쉬움","easyToUnderstand","thumb-up"],["문제가 해결됨","solvedMyProblem","thumb-up"],["기타","otherUp","thumb-up"]],[["이해하기 어려움","hardToUnderstand","thumb-down"],["잘못된 정보 또는 샘플 코드","incorrectInformationOrSampleCode","thumb-down"],["필요한 정보/샘플이 없음","missingTheInformationSamplesINeed","thumb-down"],["번역 문제","translationIssue","thumb-down"],["기타","otherDown","thumb-down"]],["최종 업데이트: 2025-09-04(UTC)"],[[["\u003cp\u003eVPC Service Controls enhances security by mitigating the risk of unauthorized data copying or transfer from Google-managed services.\u003c/p\u003e\n"],["\u003cp\u003eSecurity perimeters can be configured using VPC Service Controls to manage data movement across perimeter boundaries.\u003c/p\u003e\n"],["\u003cp\u003eIntegrating Binary Authorization with VPC Service Controls helps protect the policy, attestors, and attestations stored within.\u003c/p\u003e\n"],["\u003cp\u003eWhen employing Binary Authorization's separation of duties with separate projects, each project should be included in the VPC Service Controls perimeter.\u003c/p\u003e\n"],["\u003cp\u003eIf Artifact Analysis is used to store attestors and attestations, it must also be included within the VPC Service Controls perimeter.\u003c/p\u003e\n"]]],[],null,["# Secure with VPC Service Controls\n\n[VPC Service Controls](/vpc-service-controls/docs/overview) improves your ability to\nmitigate the risk of unauthorized copying or transfer of data from your\nGoogle-managed services and resources.\n\nWith VPC Service Controls, you can configure security perimeters and control the\nmovement of data across the perimeter boundary.\n\nBinary Authorization stores data, including the policy, attestors, and attestations.\nBy adding Binary Authorization to the security perimeter, VPC Service Controls can help\nprotect these resources and services.\n\nAdditionally, Binary Authorization supports separation of duties by using separate\nGoogle Cloud projects for deployments, attestors and attestations. If using\nBinary Authorization in this way, each such project should be included in your\nVPC Service Controls perimeter. See [Multi-project setup](/binary-authorization/docs/multi-project-setup-cli)\nfor an end-to-end tutorial that describes how to use multiple projects to\nestablish separation of duties.\n\nWith Binary Authorization, you may use Artifact Analysis to store\nattestors and attestations as notes and occurrences, respectively. In this case,\nyou must also include Artifact Analysis in the VPC Service Controls\nperimeter. See [VPC Service Controls guidance for\nArtifact Analysis](/vpc-service-controls/docs/supported-products#artifact-analysis)\nfor additional details.\n\nTo learn more about VPC Service Controls, see the [VPC Service Controls\noverview](/vpc-service-controls/docs/overview).\n\nTo learn about the limitations in using Binary Authorization with VPC Service Controls, see\n[Supported products and limitations](/vpc-service-controls/docs/supported-products)."]]