A company relies on Google Kubernetes Engine (GKE) with container images for a critical application. Their goal is to scan these images for known security vulnerabilities and securely share the report internally within Google Cloud. What actions should be taken?