Your organization uses serverless applications extensively, with a strong focus on security best practices. You need to enforce image provenance and compliance with security standards prior to deployment. You use Cloud Build as the CI/CD tool for container image builds. To ensure that only images built by Cloud Build and meeting security compliance are deployed, you must configure Binary Authorization. What should you do?