You're operating applications on Cloud Run and have enabled container analysis for vulnerability scanning. However, you're concerned about maintaining strict control over deployed applications to ensure only trusted container images are used. What steps should you take? (Choose two.)