security-engineer video for a client intends to transfer their sensitive workloads to a Compute Engine-based cluster employing Managed Instance Groups (MIGs).
A client intends to transfer their sensitive workloads to a Compute Engine-based cluster employing Managed Instance Groups (MIGs). These jobs have fluctuating demands and necessitate swift completion. Additionally, the client requires control over the key lifecycle. Which boot disk encryption solution should be implemented on the cluster to fulfill the client's needs?