Question-19: Your containerized applications can be deployed, managed, and scaled with the help of Google infrastructure by utilising Google Kubernetes Engine (GKE), which offers a managed environment. The Google Compute Engine environment (GKE) is made up of a cluster that is formed by multiple individual computers (specifically, instances of Google Compute Engine). A Google Kubernetes Engine (GKE) cluster is hosting an application that belongs to your company and is running as a Deployment. You've got development, staging, and production all separated into their own clusters. You have come to the conclusion that the team is able to deploy a Docker image to the production cluster without first testing the deployment in the development and then the staging clusters. This is something that you have discovered. You want to give the team the ability to make their own decisions, but you don't want this to really take place. You are looking for a solution that can be built on Google Cloud easily and in a short amount of time. What action should you take?
A. If the container is not authorised for use in the environment that is being used, a Kubernetes lifecycle hook should be configured such that it will block it from beginning.
B. Put in place a company policy that prevents teams from deploying Docker images to an environment unless the image has been tested in a previous environment and has received approval from that policy.
C. Set up the permission rules for binary operations on the development, staging, and production clusters. Develop attestation procedures as an integral component of the pipeline for continuous integration.
D. Construct a Kubernetes admissions controller that will block the container from beginning if it does not have permission to be used in the environment that has been provided.
Correct Answer

Get All 340 Questions and Answer for Google Professional Cloud Architect

: 3 Explanation: Binary Authorization is an implementation of a policy model, where a policy is a rule set that regulates the deployment of container images. Policies are implemented by Binary Authorization. Rules contained in a policy outline particular requirements that must be met by an image before it can be used in a deployment. Look at Key concepts if you want to learn more about the Binary Authorization policy model as well as any of the other concepts. Configure the different clusters' binary authorization policies, including production, staging, and development. Develop attestation procedures as an integral component of the pipeline for continuous integration.