[[["易于理解","easyToUnderstand","thumb-up"],["解决了我的问题","solvedMyProblem","thumb-up"],["其他","otherUp","thumb-up"]],[["很难理解","hardToUnderstand","thumb-down"],["信息或示例代码不正确","incorrectInformationOrSampleCode","thumb-down"],["没有我需要的信息/示例","missingTheInformationSamplesINeed","thumb-down"],["翻译问题","translationIssue","thumb-down"],["其他","otherDown","thumb-down"]],["最后更新时间 (UTC):2025-08-18。"],[[["\u003cp\u003eVPC Service Controls enhances security by mitigating the risk of unauthorized data copying or transfer from Google-managed services.\u003c/p\u003e\n"],["\u003cp\u003eSecurity perimeters can be configured using VPC Service Controls to manage data movement across perimeter boundaries.\u003c/p\u003e\n"],["\u003cp\u003eIntegrating Binary Authorization with VPC Service Controls helps protect the policy, attestors, and attestations stored within.\u003c/p\u003e\n"],["\u003cp\u003eWhen employing Binary Authorization's separation of duties with separate projects, each project should be included in the VPC Service Controls perimeter.\u003c/p\u003e\n"],["\u003cp\u003eIf Artifact Analysis is used to store attestors and attestations, it must also be included within the VPC Service Controls perimeter.\u003c/p\u003e\n"]]],[],null,[]]