Documentazione di Autorizzazione binaria
Autorizzazione binaria è un servizio su Google Cloud che fornisce sicurezza centralizzata della catena di approvvigionamento del software per le applicazioni in esecuzione su Google Kubernetes Engine (GKE) e Distributed Cloud. Scopri di più
Avvia il tuo prossimo progetto con 300 $di credito gratuito
Crea e testa una proof of concept con i crediti della prova gratuita e l'utilizzo mensile gratuito di oltre 20 prodotti.
Risorse di documentazione
Guide
-
Guida rapida: configura un criterio di autorizzazione binaria con GKE
-
Tutorial sull'attestazione end-to-end (GKE)
-
Configurare l'autorizzazione binaria sulla piattaforma
-
Creare attestazioni in una pipeline Cloud Build
-
Utilizzare Kritis Signer per creare attestazioni basate sull'analisi delle vulnerabilità
-
Utilizzare Voucher per creare attestazioni basate sull'analisi delle vulnerabilità
-
Configura un criterio utilizzando la console Cloud
-
Creare attestatori utilizzando la console Cloud
-
Creazione di attestazioni
-
Configurare un criterio utilizzando l'API REST
Risorse correlate
Video correlati
Securing your AI model development pipeline
Vertex AI Pipelines → https://goo.gle/41IIBSZ Binary Authorization → https://goo.gle/3VOTAGL Vertex AI Pipeline demo → https://goo.gle/4ghaHJE Are you concerned about AI models going rogue? Secure your AI development pipeline using Google Cloud and
Securing CI/CD with Google Cloud
Learn how Google Cloud can help improve the security posture of your CI/CD process and software supply chains using Cloud Build, Google Cloud Deploy, Artifact Registry, Container Analysis, and Binary Authorization.
How to ensure only trusted container images are deployed to Cloud Run
SLSA → https://goo.gle/3GmqCmY SLSA Levels → https://goo.gle/32RzLGu Want to know how you can protect your system? This complex problem has some simple solutions, and in this episode of Serverless Expeditions Extended, we’ll show you how Google Cloud
Evolve to zero trust security model with Anthos security
BeyondProd is Google’s approach to cloud-native security for internal systems. BeyondProd applies the security principle of zero trust to services and infrastructure, ensuring that all components are verified and authenticated. Binary Authorization
Anthos security: Modernize your security posture for cloud-native applications
Modern security approaches have moved beyond a traditional perimeter-based security model. As many organizations seek to adopt cloud-native architectures and are deploying applications in hybrid and multi-cloud environments they demand a more
Kritis: An open implementation of Binary Authorization (KubeCon 2019, San Diego)
Aysylu Greenberg, Senior Software Engineer at Google, gives us a recap from her #KubeCon + #CloudNativeCon presentation on binary authorization and how Kritis enables tighter control over your container environment by ensuring only verified images
Vulnerabilities in Kubernetes, an interview with Maya (KubeCon 2019, Barcelona)
Google Product Manager, Dustin Kirkland interviews Google Product Manager, Maya Kaczorowski to discuss interesting vulnerabilities in the Kubernetes (K8s) space. Learn what Google Cloud is doing in the GKE and Security space: Binary Authorization →
End-To-End Security and Compliance for Your Kubernetes Software Supply Chain (Cloud Next '19)
Containers have unique characteristics such as immutability, declarative format, fast iteration that make it require a fundamentally different security model than that of VMs, especially within a secure software supply chain. In this session, ANZ
Secure Software Supply Chains on Google Kubernetes Engine (Cloud Next '19)
This session shows users how to ensure their software supply chain follows a known and secure path before their code is deployed in a Google Kubernetes Engine cluster. We will review binary authorization in general and then guide users on how best to
Binary Authorization Demo
Check out a demo of Binary Authorization, a Google Cloud Platform security feature. Binary Authorization is a deploy-time security control that ensures only trusted container images are deployed on Kubernetes Engine.