Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.

Unlimited Access

Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.

Exam Professional Cloud Architect topic 4 question 2 discussion

Actual exam question from Google's Professional Cloud Architect
Question #: 2
Topic #: 4
[All Professional Cloud Architect Questions]

For this question, refer to the EHR Healthcare case study. You need to define the technical architecture for securely deploying workloads to Google Cloud. You also need to ensure that only verified containers are deployed using Google Cloud services. What should you do? (Choose two.)

  • A. Enable Binary Authorization on GKE, and sign containers as part of a CI/CD pipeline.
  • B. Configure Jenkins to utilize Kritis to cryptographically sign a container as part of a CI/CD pipeline.
  • C. Configure Container Registry to only allow trusted service accounts to create and deploy containers from the registry.
  • D. Configure Container Registry to use vulnerability scanning to confirm that there are no vulnerabilities before deploying the workload.
Show Suggested Answer Hide Answer
Suggested Answer: AB 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
raf2121
Highly Voted 2 years, 7 months ago
A & D Binary Authorization to ensure only verified containers are deployed To ensure deployment are secure and and consistent, automatically scan images for vulnerabilities with container analysis (https://cloud.google.com/docs/ci-cd/overview?hl=en&skip_cache=true)
upvoted 49 times
cloudmon
2 years ago
Also see references to the combination of using binary authorization and vulnerability scanning here: https://cloud.google.com/binary-authorization/docs/overview
upvoted 11 times
...
...
KillerGoogle
Highly Voted 2 years, 7 months ago
IMHO its A&C
upvoted 30 times
mgm7
2 years, 4 months ago
I see a lot of people answered D but I don't see how it answers the question. I can securely deploy complete junk code. There is no contradiction in this phrase even if one obviously should avoid doing this.
upvoted 6 times
BeCalm
1 year, 1 month ago
Dude the same applies to C. Trusted service accounts can deploy junk too.
upvoted 8 times
medi01
12 months ago
But that's the goal: secure the deployment process.
upvoted 3 times
...
...
...
...
Pime13
Most Recent 2 months, 2 weeks ago
Selected Answer: AD
ad for me
upvoted 1 times
...
Pime13
2 months, 2 weeks ago
Selected Answer: AD
https://cloud.google.com/docs/ci-cd/overview?hl=en&skip_cache=true https://cloud.google.com/binary-authorization/docs/overview
upvoted 1 times
...
didek1986
2 months, 3 weeks ago
Selected Answer: AC
For surę AC
upvoted 1 times
...
JohnDohertyDoe
3 months ago
Selected Answer: AC
Answer should be A & C, as the ask is to ensure only verified containers to be deployed. With just Binary Authorisation and signing images, you can't fulfil the requirement, you would need to also restrict it at the IAM level, so that no bad actor can create an image in the registry and bypass Binary Authorization to deploy an image.
upvoted 3 times
...
sudaraka
3 months, 1 week ago
I think A&B Kritis is an admission controller webhook for Kubernetes that enforces deploy-time security policies. By configuring Jenkins to use Kritis, you can cryptographically sign containers as part of the CI/CD pipeline, ensuring only signed containers are deployed. https://cloud.google.com/binary-authorization/docs/creating-attestations-kritis
upvoted 3 times
...
[Removed]
3 months, 2 weeks ago
Selected Answer: AD
Option C is incorrect because while limiting access to trusted service accounts enhances security, it doesn't ensure that only verified containers are deployed.
upvoted 2 times
...
Prudvi3266
3 months, 3 weeks ago
Selected Answer: AD
Checked with standard process for this. I found the below. Image Building and Scanning: Developers build container images locally or using Cloud Build. Images are scanned for vulnerabilities using integrated tools or third-party services. Clean images are pushed to GCR. Image Verification: Binary Authorization enforces policies for image acceptance. Attestations from Cloud Security Scanner or third-party tools can be used.
upvoted 2 times
...
oidajoi
4 months ago
A&D. C is incorrect because you configuring Container Registry doesn't only allow trusted service accounts to create/deploy containers. With IAM permissions, anyone can create non-trusted service accounts to deploy containers, or users can still deploy containers not in Container Registry.
upvoted 2 times
...
Roro_Brother
4 months ago
Selected Answer: AC
A & C correct
upvoted 1 times
...
PreJo
4 months, 1 week ago
a and c are ok
upvoted 1 times
...
Jconnor
4 months, 2 weeks ago
Who has untrsuted service accounts that can deploy stuff and is doing nothing about it?. That is bad architecture. Following good architecture design, D is a given, we will already have a limited number of trusted accounts that can deploy. So A and C.
upvoted 1 times
...
thewalker
4 months, 3 weeks ago
Selected Answer: AD
A & D - sounds more native to Google Cloud services and must required.
upvoted 1 times
...
RKS_2021
6 months, 2 weeks ago
AD - correct answers. C -- Trusted service accounts ? does not make sense.
upvoted 2 times
LifeWins
5 months ago
Trusted SAs - SAs that are allowed to read/write to/from Registry
upvoted 1 times
...
...
Murtuza
7 months, 1 week ago
Container Registry can allow select trusted services to access a registry that's configured with network access rules. When trusted services are allowed, a trusted service instance can securely bypass the registry's network rules and perform operations such as pull or push images. The best choice is C here
upvoted 2 times
impetuousrutabaga
2 months, 3 weeks ago
Also doesn't container registry automatically scan images for vulnerabilities when an image is pushed to the registry? Answer C would imply to me vulnerabilities have already been remediated and the remaining action is SA controls. https://cloud.google.com/artifact-registry/docs/analysis
upvoted 1 times
...
...
jits1984
7 months, 3 weeks ago
Selected Answer: AC
Binary authorization and Service Account controls (as the question is asking on how you would secure the deployment process and not improving the security of the application)
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...