Summary
Multiple attack vectors can compromise a software supply chain. Binary Authorization is a powerful tool for defending your supply chain against bad actors because it helps ensure that only the images you’ve allowed via a policy are deployed onto modern container-based runtimes.
In this chapter, you learned how to configure Binary Authorization for three different Google Cloud runtimes, as well as how to create policies, attestations, and attestors to ensure that your container images are safe to deploy.
In the next chapter, we’ll show you an end-to-end software delivery pipeline, thus bringing together the source-to-prod process for securely delivering your application to a Google Cloud runtime.