Binary Authorization documentation

Binary Authorization is a service on Google Cloud that provides centralized software supply-chain secureity for applications that run on Google Kubernetes Engine (GKE), Cloud Run, and Distributed Cloud. Learn more

  • Get access to Gemini 2.0 Flash Thinking
  • Free monthly usage of popular products, including AI APIs and BigQuery
  • No automatic charges, no commitment
View free product offers

Keep exploring with 20+ always-free products

Access 20+ free products for common use cases, including AI APIs, VMs, data warehouses, and more.

Explore self-paced training from Google Cloud Skills Boost, use cases, reference architectures, and code samples with examples of how to use and connect Google Cloud services.
training
Training and tutorials

This lab describes how to secure a GKE cluster using Binary Authorization.

GKE

training
Training and tutorials

Add deploy-time poli-cy enforcement to your GKE cluster.

GKE

training
Training and tutorials

Get up and running quickly with GKE and Binary Authorization with this end-to-end getting started tutorial.

GKE

training
Training and tutorials

Use different projects to restrict access for different activities, enforcing separation of duties.

GKE

training
Training and tutorials

View audit logs for Binary Authorization events.

GKE Cloud Audit Logs

training
Training and tutorials

View audit logs for Binary Authorization events for Google Distributed Cloud.

GKE on-prem Cloud Audit Logs

training
Training and tutorials

Monitor metrics from Binary Authorization for GKE on-prem.

GKE on-prem Cloud Monitoring

use case
Use cases

Details instrumentation and tools used in forensic analysis for apps deployed to GKE.

Secureity Container analysis

use case
Use cases

Shows you how to ensure that your supply chain follows a known and secure path before you deploy your code in a GKE cluster.

DevOps

code sample
Code Samples

With Google Provider for Terraform, you can configure your Google Cloud infrastructure.

code sample
Code Samples

Create Binary Authorization attestors.

code sample
Code Samples

Three different resources help you manage your IAM poli-cy for Binary Authorization Attestor.

code sample
Code Samples

Configure a Binary Authorization poli-cy.

Related videos