You run applications on Cloud Run. You already enabled container analysis for vulnerability scanning. However, you are concerned about the lack of control on the applications that are deployed. You must ensure that only trusted container images are deployed on Cloud Run.
What should you do? (Choose two.)
chimz2002
Highly Voted 1 year, 3 months agozanhsieh
Most Recent 6 months, 4 weeks agodesertlotus1211
1 year agoXoxoo
1 year, 4 months agoXoxoo
1 year, 4 months agoXoxoo
1 year, 4 months agoArizonaClassics
1 year, 4 months agoanshad666
1 year, 4 months agocyberpunk21
1 year, 4 months agoMithung30
1 year, 5 months agohykdlidesd
1 year, 5 months agopfilourenco
1 year, 5 months agoK1SMM
1 year, 5 months ago