You run applications on Cloud Run. You already enabled container analysis for vulnerability scanning. However, you are concerned about the lack of control on the applications that are deployed. You must ensure that only trusted container images are deployed on Cloud Run.
What should you do? (Choose two.)
chimz2002
Highly Voted 1 year, 1 month agozanhsieh
Most Recent 4 months, 2 weeks agodesertlotus1211
10 months agoXoxoo
1 year, 1 month agoXoxoo
1 year, 1 month agoXoxoo
1 year, 1 month agoArizonaClassics
1 year, 2 months agoanshad666
1 year, 2 months agocyberpunk21
1 year, 2 months agoMithung30
1 year, 2 months agohykdlidesd
1 year, 3 months agopfilourenco
1 year, 3 months agoK1SMM
1 year, 3 months ago