tl  tr
  Home | Tutorials | Articles | Videos | Products | Tools | Search
Interviews | Open Source | Tag Cloud | Follow Us | Bookmark | Contact   
 Cloud Platforms > Google Cloud Platform (GCP) > Binary Authorization

Binary Authorization

Author: Venkata Sudhakar

Google Binary Authorization is a deploy-time security control that ensures only trusted container images are deployed to GKE or Cloud Run. It works by requiring cryptographic attestations that images have passed required security checks before they can be deployed.

Key Features:

1. Attestation-based - Requires signed attestations from authorized attestors before allowing deployment.

2. Policy enforcement - Define policies that specify which images and attestors are trusted.

3. CI/CD integration - Integrate with Cloud Build to automatically attest images after security checks pass.

4. Break-glass - Emergency bypass mechanism with full audit trail for production incidents.

5. Dry-run mode - Test policies without blocking deployments to validate before enforcing.

The below example shows how to set up Binary Authorization with an attestor and policy.


It gives the following output,

Attestor [my-attestor] created.
Key added to attestor successfully.

Attestation created for:
  Image: gcr.io/my-project/my-app@sha256:abc123...
  Attestor: my-attestor
  Status: SIGNED

Deployment to GKE: ALLOWED (attestation verified)

Binary Authorization Workflow:

1. Developer pushes code to Cloud Source Repositories or GitHub.

2. Cloud Build triggers and runs tests, vulnerability scans, and compliance checks.

3. If all checks pass, Cloud Build creates a cryptographic attestation.

4. When deploying to GKE, Binary Authorization policy verifies the attestation exists.

5. If attestation is missing or invalid, deployment is blocked.


 
  


  
bl  br