Binary Authorization documentation
Binary Authorization is a service on Google Cloud that provides centralized software supply-chain security for applications that run on Google Kubernetes Engine (GKE), Cloud Run, and Distributed Cloud. Learn more
Start your proof of concept with $300 in free credit
- Get access to Gemini 2.0 Flash Thinking
- Free monthly usage of popular products, including AI APIs and BigQuery
- No automatic charges, no commitment
Keep exploring with 20+ always-free products
Access 20+ free products for common use cases, including AI APIs, VMs, data warehouses, and more.
Documentation resources
Guides
Related resources
Secure your GKE Deployments with Binary Authorization
This lab describes how to secure a GKE cluster using Binary Authorization.
Secure your GKE Deployments with Binary Authorization
Add deploy-time policy enforcement to your GKE cluster.
Get started using the command-line tool
Get up and running quickly with GKE and Binary Authorization with this end-to-end getting started tutorial.
Multi-project setup
Use different projects to restrict access for different activities, enforcing separation of duties.
View audit logs for Binary Authorization
View audit logs for Binary Authorization events.
View audit logs for Binary Authorization for Google Distributed Cloud (GDC)
View audit logs for Binary Authorization events for Google Distributed Cloud.
Monitor metrics for Binary Authorization for Google Distributed Cloud
Monitor metrics from Binary Authorization for GKE on-prem.
Security controls and forensic analysis for GKE apps
Details instrumentation and tools used in forensic analysis for apps deployed to GKE.
Help secure software supply chains on GKE
Shows you how to ensure that your supply chain follows a known and secure path before you deploy your code in a GKE cluster.
Google Provider
With Google Provider for Terraform, you can configure your Google Cloud infrastructure.
Attestor Provider
Create Binary Authorization attestors.
IAM policy for Binary Authorization Attestor
Three different resources help you manage your IAM policy for Binary Authorization Attestor.
Binary Authorization Policy
Configure a Binary Authorization policy.