Google의 Container-Optimized OS 문서
Container-Optimized OS는 Docker 컨테이너를 실행하는 데 최적화된 Compute Engine VM용 운영체제 이미지입니다. Container-Optimized OS를 사용하면 Google Cloud Platform에서 Docker 컨테이너를 빠르고 효율적으로 안전하게 가져올 수 있습니다. Container-Optimized OS는 Google이 유지관리하며 오픈소스 Chromium OS 프로젝트를 기반으로 합니다. 자세히 알아보기
문서 리소스
관련 동영상
Securing your AI model development pipeline
Vertex AI Pipelines → https://goo.gle/41IIBSZ Binary Authorization → https://goo.gle/3VOTAGL Vertex AI Pipeline demo → https://goo.gle/4ghaHJE Are you concerned about AI models going rogue? Secure your AI development pipeline using Google Cloud and
Securing CI/CD with Google Cloud
Learn how Google Cloud can help improve the security posture of your CI/CD process and software supply chains using Cloud Build, Google Cloud Deploy, Artifact Registry, Container Analysis, and Binary Authorization.
How to ensure only trusted container images are deployed to Cloud Run
SLSA → https://goo.gle/3GmqCmY SLSA Levels → https://goo.gle/32RzLGu Want to know how you can protect your system? This complex problem has some simple solutions, and in this episode of Serverless Expeditions Extended, we’ll show you how Google Cloud
Evolve to zero trust security model with Anthos security
BeyondProd is Google’s approach to cloud-native security for internal systems. BeyondProd applies the security principle of zero trust to services and infrastructure, ensuring that all components are verified and authenticated. Binary Authorization
Anthos security: Modernize your security posture for cloud-native applications
Modern security approaches have moved beyond a traditional perimeter-based security model. As many organizations seek to adopt cloud-native architectures and are deploying applications in hybrid and multi-cloud environments they demand a more
Kritis: An open implementation of Binary Authorization (KubeCon 2019, San Diego)
Aysylu Greenberg, Senior Software Engineer at Google, gives us a recap from her #KubeCon + #CloudNativeCon presentation on binary authorization and how Kritis enables tighter control over your container environment by ensuring only verified images
Vulnerabilities in Kubernetes, an interview with Maya (KubeCon 2019, Barcelona)
Google Product Manager, Dustin Kirkland interviews Google Product Manager, Maya Kaczorowski to discuss interesting vulnerabilities in the Kubernetes (K8s) space. Learn what Google Cloud is doing in the GKE and Security space: Binary Authorization →
End-To-End Security and Compliance for Your Kubernetes Software Supply Chain (Cloud Next '19)
Containers have unique characteristics such as immutability, declarative format, fast iteration that make it require a fundamentally different security model than that of VMs, especially within a secure software supply chain. In this session, ANZ
Secure Software Supply Chains on Google Kubernetes Engine (Cloud Next '19)
This session shows users how to ensure their software supply chain follows a known and secure path before their code is deployed in a Google Kubernetes Engine cluster. We will review binary authorization in general and then guide users on how best to
Binary Authorization Demo
Check out a demo of Binary Authorization, a Google Cloud Platform security feature. Binary Authorization is a deploy-time security control that ensures only trusted container images are deployed on Kubernetes Engine.