Securing Your GKE Deployments with Binary Authorization
This hands-on lab Demonstrates how to use Binary Authorization secure your GKE cluster by requiring all containers to be verified and signed by trusted attestors as a part of the build/deploy process.