Stay organized with collections
Save and categorize content based on your preferences.
This page provides an overview of how to set up Binary Authorization enforcement in your
environment for use with Google Kubernetes Engine (GKE). You can set up
Binary Authorization by using the Google Cloud console or the Google Cloud CLI.
You can also perform some setup steps by using the Binary Authorization
REST API.
Optional: If you have different Google Cloud projects that own your
policy or your Container Registry repositories, grant the IAM
roles required for cross-project access. For instructions, see
Configure cross-project access for Binary Authorization in GKE.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-08-25 UTC."],[[["\u003cp\u003eThis guide explains how to set up Binary Authorization enforcement for Google Kubernetes Engine (GKE) using the Google Cloud console, Google Cloud CLI, or the Binary Authorization REST API.\u003c/p\u003e\n"],["\u003cp\u003eSetting up Binary Authorization involves enabling the service, creating or modifying a cluster, and configuring the Binary Authorization policy with options for default rules, cluster-specific rules, and exempt images.\u003c/p\u003e\n"],["\u003cp\u003eOptional configurations include granting cross-project access, using the \u003ccode\u003ebuilt-by-cloud-build\u003c/code\u003e attestor for Cloud Build images, and utilizing attestations.\u003c/p\u003e\n"],["\u003cp\u003eThe process includes steps for deploying container images and viewing events in Cloud Audit Logs.\u003c/p\u003e\n"],["\u003cp\u003eBinary Authorization does not enforce init containers.\u003c/p\u003e\n"]]],[],null,["# Set up for GKE\n\nThis page provides an overview of how to set up Binary Authorization enforcement in your\nenvironment for use with Google Kubernetes Engine (GKE). You can set up\nBinary Authorization by using the Google Cloud console or the Google Cloud CLI.\nYou can also perform some setup steps by using the Binary Authorization\n[REST API](/binary-authorization/docs/reference/rest).\n\nFor an end-to-end tutorial that includes the following setup steps, see\n[Get started using the Google Cloud CLI](/binary-authorization/docs/getting-started-cli)\nor\n[Get started using the Google Cloud console](/binary-authorization/docs/getting-started-console).\n\nTo set up Binary Authorization, perform the following steps:\n\n1. [Enable Binary Authorization](/binary-authorization/docs/enabling).\n\n2. [Create a cluster](/binary-authorization/docs/creating-cluster)\n with Binary Authorization enabled or\n [enable Binary Authorization on an existing cluster](/binary-authorization/docs/enable-cluster).\n\n | **Note:** Binary Authorization doesn't enforce init containers.\n3. Configure your Binary Authorization policy.\n\n | **Note:** Skip this step if you want to use attestations.\n\n You can configure the following features in your policy:\n - [Default rule](/binary-authorization/docs/configuring-policy-console#default-rule).\n - [Cluster-specific rules](/binary-authorization/docs/configuring-policy-console#set_cluster_specific_rules).\n - [Specific rules for your Kubernetes service identity or namespace](/binary-authorization/docs/configuring-policy-console#add-specific-rules-asm).\n - [Exempt images](/binary-authorization/docs/configuring-policy-console#exempt_images). [Learn more about exempt images](/binary-authorization/docs/key-concepts#exempt_images).\n4. Optional: If you have different Google Cloud projects that own your\n policy or your Container Registry repositories, grant the IAM\n roles required for cross-project access. For instructions, see\n [Configure cross-project access for Binary Authorization in GKE](/binary-authorization/docs/cross-project-access-gke).\n\n5. Optional: Use the `built-by-cloud-build` attestor to [deploy only images built by Cloud Build](/binary-authorization/docs/deploy-cloud-build).\n\n6. Optional: [Use attestations](/binary-authorization/docs/attestations).\n\n7. [Deploy container images](/binary-authorization/docs/deploying-containers).\n\n8. [View events in Cloud Audit Logs](/binary-authorization/docs/viewing-audit-logs)."]]