Podcast
Questions and Answers
What does IAM primarily help manage?
What does IAM primarily help manage?
The organization resource represents an individual user.
The organization resource represents an individual user.
False
What is one example of a role that can be assigned in IAM?
What is one example of a role that can be assigned in IAM?
Compute Viewer
IAM includes members, roles, and ________ accounts.
IAM includes members, roles, and ________ accounts.
Signup and view all the answers
Match the following IAM components with their descriptions:
Match the following IAM components with their descriptions:
Signup and view all the answers
Which statement best describes the IAM resource hierarchy?
Which statement best describes the IAM resource hierarchy?
Signup and view all the answers
IAM policies define the privileges and actions associated with resources.
IAM policies define the privileges and actions associated with resources.
Signup and view all the answers
What is the purpose of policy inheritance in IAM?
What is the purpose of policy inheritance in IAM?
Signup and view all the answers
What role allows a user to create new projects and automatically make them the owner?
What role allows a user to create new projects and automatically make them the owner?
Signup and view all the answers
The Admin role has limited control in the organization node.
The Admin role has limited control in the organization node.
Signup and view all the answers
List the three types of IAM roles in Cloud IAM.
List the three types of IAM roles in Cloud IAM.
Signup and view all the answers
In Cloud IAM, the ______ role provides read-only access to resources.
In Cloud IAM, the ______ role provides read-only access to resources.
Signup and view all the answers
Match each IAM role with its corresponding capability:
Match each IAM role with its corresponding capability:
Signup and view all the answers
Which role can delete projects in a Cloud IAM setup?
Which role can delete projects in a Cloud IAM setup?
Signup and view all the answers
In the folder node, the Creator role can only view the structure of folders.
In the folder node, the Creator role can only view the structure of folders.
Signup and view all the answers
What are the fixed, coarse-grained roles in IAM known as?
What are the fixed, coarse-grained roles in IAM known as?
Signup and view all the answers
What is the role of an Organization Admin in Google Cloud?
What is the role of an Organization Admin in Google Cloud?
Signup and view all the answers
IAM roles granted at the organization level are not inherited by resources in folders under the organization.
IAM roles granted at the organization level are not inherited by resources in folders under the organization.
Signup and view all the answers
What type of user is responsible for assigning the Organization Admin role?
What type of user is responsible for assigning the Organization Admin role?
Signup and view all the answers
The ______ can create projects within the organization if they have the proper role.
The ______ can create projects within the organization if they have the proper role.
Signup and view all the answers
Which of the following is NOT a responsibility of the Organization Admin?
Which of the following is NOT a responsibility of the Organization Admin?
Signup and view all the answers
An organization node is the root node for Google Cloud resources.
An organization node is the root node for Google Cloud resources.
Signup and view all the answers
What acts as a trust boundary within a company?
What acts as a trust boundary within a company?
Signup and view all the answers
Match the following roles with their corresponding responsibilities:
Match the following roles with their corresponding responsibilities:
Signup and view all the answers
What role would allow a user to start and stop Compute Engine virtual machines?
What role would allow a user to start and stop Compute Engine virtual machines?
Signup and view all the answers
A service account belongs to an individual end user.
A service account belongs to an individual end user.
Signup and view all the answers
What is the purpose of a Google Group in Identity and Access Management?
What is the purpose of a Google Group in Identity and Access Management?
Signup and view all the answers
A Google ______ represents a developer, an administrator, or any other person who interacts with Google Cloud.
A Google ______ represents a developer, an administrator, or any other person who interacts with Google Cloud.
Signup and view all the answers
Match the following member types with their descriptions:
Match the following member types with their descriptions:
Signup and view all the answers
Which statement is NOT true regarding IAM member identities?
Which statement is NOT true regarding IAM member identities?
Signup and view all the answers
You can create as many service accounts as needed for your application.
You can create as many service accounts as needed for your application.
Signup and view all the answers
Name one type of member that can be defined in Identity and Access Management.
Name one type of member that can be defined in Identity and Access Management.
Signup and view all the answers
What role is automatically granted to the default Compute Engine service account?
What role is automatically granted to the default Compute Engine service account?
Signup and view all the answers
The default Compute Engine service account can only be enabled when a new instance is created using the Google Cloud console.
The default Compute Engine service account can only be enabled when a new instance is created using the Google Cloud console.
Signup and view all the answers
What is the email format for the default Compute Engine service account?
What is the email format for the default Compute Engine service account?
Signup and view all the answers
The process of determining permissions for an authenticated identity is known as _____ .
The process of determining permissions for an authenticated identity is known as _____ .
Signup and view all the answers
What does an access token with a read-only scope allow an application to do?
What does an access token with a read-only scope allow an application to do?
Signup and view all the answers
Match the following applications with their access privileges:
Match the following applications with their access privileges:
Signup and view all the answers
Scopes can be customized after a VM instance has been created.
Scopes can be customized after a VM instance has been created.
Signup and view all the answers
User-created service accounts should use _____ roles instead of scopes.
User-created service accounts should use _____ roles instead of scopes.
Signup and view all the answers
What is the primary purpose of Organization Restrictions in Google Cloud?
What is the primary purpose of Organization Restrictions in Google Cloud?
Signup and view all the answers
The principle of least privilege should be followed when granting roles in Google Cloud.
The principle of least privilege should be followed when granting roles in Google Cloud.
Signup and view all the answers
Why is it beneficial to grant roles to Google groups instead of individual users?
Why is it beneficial to grant roles to Google groups instead of individual users?
Signup and view all the answers
The _______ hierarchy helps to group resources that share the same trust boundary.
The _______ hierarchy helps to group resources that share the same trust boundary.
Signup and view all the answers
Match the following roles with their respective needs:
Match the following roles with their respective needs:
Signup and view all the answers
Which practice is recommended for auditing IAM policies?
Which practice is recommended for auditing IAM policies?
Signup and view all the answers
Groups can be used to enhance control over IAM policies.
Groups can be used to enhance control over IAM policies.
Signup and view all the answers
What should you check on each resource to understand permissions better?
What should you check on each resource to understand permissions better?
Signup and view all the answers
Study Notes
Identity and Access Management (IAM) Overview
- IAM is a way to identify who can do what on a resource (e.g., person, group, application).
- Resources can be any Google Cloud service.
- IAM has components like organizations, roles, members, and service accounts.
- Organization Restrictions feature helps control access.
- Best practices are to apply concepts to daily work.
IAM Resource Hierarchy
- Google Cloud resources are hierarchical.
- The Organization node is the root.
- Folders are children of the organization.
- Projects are children of folders.
- Resources are children of projects.
Organization Node
- Root node for Google Cloud resources.
- Organization Admin role controls all cloud resources (useful for auditing).
- Project Creator role controls project creation.
Creating and Managing Organizations
- Created when a Google Workspace or Cloud Identity account creates a Google Cloud Project.
- Workspace or Cloud Identity super administrators assign Organization admins and manage account lifecycles.
- Organization admins define IAM policies and resource hierarchy, delegating responsibility.
Folders
- Additional grouping and isolation boundary between projects.
- Can represent departments, legal entities, or teams.
- Allow delegation of administrative rights.
Resource Manager Roles
- Organization Admin: full control over all resources.
- Organization Viewer: views all resources.
- Folder Admin: full control over folders.
- Folder Creator: manages folder creation.
- Folder Viewer: views folders and resources below a resource.
- Project Creator: creates new projects (automatic owner).
- Project Deleter: deletes projects.
IAM Roles (Types)
- Basic roles (Owner, Editor, Viewer).
- Predefined roles (specific Google Cloud services).
- Custom roles (define precise permissions).
IAM Basic Roles
- Owner: full administrative access (adding, removing members, deleting projects).
- Editor: modify and delete access (deploying applications, configuring resources).
- Viewer: read-only access.
IAM Predefined Roles
- GCP services provide sets of predefined roles for granular access to specific resources.
- These roles are collections of permissions.
IAM Predefined Roles (Example)
- InstanceAdmin role: permissions for managing compute instances.
Compute Engine IAM Roles
- Compute Admin: full control of Compute Engine resources.
- Network Admin: manages networking resources (excluding firewall rules and SSL certificates).
- Storage Admin: manages disks, images, and snapshots.
IAM Custom Roles
- Roles define specific permission sets.
- Example: "Instance Operator" role for starting and stopping virtual machines.
IAM Members (Types)
- Google Accounts (developers, admins).
- Service Accounts (accounts for applications).
- Google Groups (collections of accounts).
- Google Workspace domains.
- Cloud Identity domains.
IAM Allow Policies
- Grants access to Google Cloud resources.
- Controls access to the resources and their descendants.
- Binds, or associates, principals (or identities) to a single IAM role.
IAM Deny Policies
- Prevent principals from using specific permissions, regardless of their roles.
- Specifies principals, permissions, and (optional) conditions for denial.
IAM Conditions
- Allow defining attribute-based access control using conditions in role bindings.
- Conditions are expressed as logic statements.
Organization Policies
- Configurations of restrictions defined by constraints.
- Applied to organizations, folders, or projects.
- Inherited by children resources.
Single Sign-On (SSO)
- Configured using Cloud Identity.
- Third-party solutions if SAML2 isn't supported (ADFS, Ping, Okta).
Service Accounts
- Provide identity for service-to-service interactions.
- Used for applications or programs running within Compute Engine instances.
- Service accounts have unique email addresses.
- Types include user-created, built-in, and Google APIs service accounts.
Service Account Keys
- Google-managed vs User-managed keys
- Google manages keys for default service accounts.
- User manages keys, responsible for security and rotation.
Identity-Aware Proxy (IAP)
- Central authorization layer for HTTPS-accessed applications.
- Enforces policies based on identity.
- Provides access controls for applications without VPNs.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
This quiz covers the fundamentals of Identity and Access Management (IAM) in cloud environments, focusing on roles, policies, and resource management. It includes questions on role assignments, resource hierarchy, and the purpose of policy inheritance. Perfect for those looking to understand IAM in detail.