Recall & Review
beginner
What is container supply chain security?
It is the practice of protecting all steps involved in building, storing, and deploying container images to prevent tampering or vulnerabilities.
Click to reveal answer
beginner
Why is it important to scan container images before deployment?
Scanning finds vulnerabilities or malware in images early, so you can fix them before they reach production and cause harm.
Click to reveal answer
intermediate
What role does Google Container Registry (GCR) or Artifact Registry play in supply chain security?
They securely store container images and integrate with scanning tools to check images for vulnerabilities before deployment.
Click to reveal answer
intermediate
How does Binary Authorization help secure container supply chains in GCP?
It enforces policies that only allow trusted and verified container images to be deployed on Google Kubernetes Engine clusters.
Click to reveal answer
intermediate
What is the benefit of using signed container images?
Signed images prove their origin and integrity, so you know they have not been altered since signing.
Click to reveal answer
Which GCP service helps enforce deployment of only trusted container images?
✗ Incorrect
Binary Authorization enforces policies to allow only trusted container images to deploy.
What is the first step to secure a container supply chain?
✗ Incorrect
Scanning images early helps detect vulnerabilities before deployment.
Where are container images typically stored securely in GCP?
✗ Incorrect
Artifact Registry securely stores container images and integrates with security tools.
What does signing a container image ensure?
✗ Incorrect
Signing proves the image has not been altered and confirms its source.
Which practice helps prevent unauthorized changes in the container supply chain?
✗ Incorrect
Binary Authorization blocks deployment of untrusted or altered images.
Explain the key steps to secure a container supply chain in GCP.
Think about how to check, store, verify, and control container images.
You got /4 concepts.
Describe how Binary Authorization improves container supply chain security.
Focus on policy enforcement and trust verification.
You got /4 concepts.