Binary Authorization documentation

Binary Authorization is a service on Google Cloud that provides centralized software supply-chain security for applications that run on Google Kubernetes Engine (GKE), Cloud Run, and Distributed Cloud. Learn more

  • Get access to Gemini 2.0 Flash Thinking
  • Free monthly usage of popular products, including AI APIs and BigQuery
  • No automatic charges, no commitment
View free product offers

Keep exploring with 20+ always-free products

Access 20+ free products for common use cases, including AI APIs, VMs, data warehouses, and more.

Explore self-paced training from Google Cloud Skills Boost, use cases, reference architectures, and code samples with examples of how to use and connect Google Cloud services.
training
Training and tutorials

This lab describes how to secure a GKE cluster using Binary Authorization.

GKE
training
Training and tutorials

Add deploy-time policy enforcement to your GKE cluster.

GKE
training
Training and tutorials

Get up and running quickly with GKE and Binary Authorization with this end-to-end getting started tutorial.

GKE
training
Training and tutorials

Use different projects to restrict access for different activities, enforcing separation of duties.

GKE
training
Training and tutorials

View audit logs for Binary Authorization events.

GKE Cloud Audit Logs
training
Training and tutorials

View audit logs for Binary Authorization events for Google Distributed Cloud.

GKE on-prem Cloud Audit Logs
training
Training and tutorials

Monitor metrics from Binary Authorization for GKE on-prem.

GKE on-prem Cloud Monitoring
use case
Use cases

Details instrumentation and tools used in forensic analysis for apps deployed to GKE.

Security Container analysis
use case
Use cases

Shows you how to ensure that your supply chain follows a known and secure path before you deploy your code in a GKE cluster.

DevOps
code sample
Code Samples

With Google Provider for Terraform, you can configure your Google Cloud infrastructure.

code sample
Code Samples

Create Binary Authorization attestors.

code sample
Code Samples

Three different resources help you manage your IAM policy for Binary Authorization Attestor.

code sample
Code Samples

Configure a Binary Authorization policy.

Related videos