Google Cloud Networking & Security

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

Which IAM member type is designed for applications or virtual machines, rather than individual end users?

  • Google Group
  • Service Account (correct)
  • Google Account
  • Cloud Identity Domain

Which IAM role provides the necessary permissions to manage networking resources, with the exception of firewall rules and SSL certificates?

  • Network Viewer
  • Compute Network User
  • Network Admin (correct)
  • Security Admin

How can you configure two VM instances in separate VPC networks to communicate using internal IP addresses?

  • Use Cloud DNS to manage DNS records, directing traffic between the VMs' internal IPs.
  • Establish a custom static route between the VMs' internal IPs within their respective VPC networks.
  • Assign a public IP address to each VM using Cloud DNS for internal traffic routing.
  • Configure two network interfaces on each VM, connecting to their respective VPC networks. (correct)

You need to assess the resource consumption of VMs across production, development, and testing environments. What is the most efficient approach?

<p>Apply a 'state' label to VMs with values 'dev', 'test', and 'prod', grouping by this label in monitoring charts. (D)</p> Signup and view all the answers

A company needs to upload sensitive customer data to Cloud Storage, ensuring it is encrypted and compliant with ISO 27018, using the least amount of computational resources and their own encryption keys. Which encryption method should they use?

<p>Generate an AES-256 key as a 32-byte bytestring, decode it as a base-64 string, and use it for uploading. (B)</p> Signup and view all the answers

As a cloud security engineer, you must provide your CTO with auditing and compliance standards that cover financial reporting controls, as well as public and private security, availability, and confidentiality controls. Which compliance standard best addresses these requirements?

<p>SOX (B)</p> Signup and view all the answers

Which Google Cloud feature can prevent unauthorized container images from being deployed into production environments?

<p>Binary Authorization (D)</p> Signup and view all the answers

A base image needs to be shared with a 'development' Google Group, supporting secure boot for Compute Engine instances. Which approach automates image creation for a Node.js application running on Compute Engine?

<p>Start the instance, configure certificates, create a <code>cloudbuild.yaml</code> specifying the disk location and group, and run <code>gcloud builds submit --tag</code>. (B)</p> Signup and view all the answers

An organization needs to automate the pipeline for building Docker containers that interact with PCI-DSS compliant APIs. The Kubernetes environment lacks internet access for downloading packages. How should the pipeline be automated?

<p>Create a Dockerfile and Cloud Build configuration file, use Cloud Build to build and deploy the image to Container Registry, and create a trigger in Cloud Build using a Git repository. (D)</p> Signup and view all the answers

After a botnet attack on Compute Engine instances in an isolated project, an external agency needs to analyze admin and system events using their local forensics tool. What is the most cost-effective way to enable this analysis?

<p>Use Cloud Audit Logs, filter Admin Activity logs for the affected project, and stream the logs to the agency’s tool via a Pub/Sub topic. (A)</p> Signup and view all the answers

An employee with Compute Engine admin permissions has assigned arbitrary permissions to existing users, and you need to find these permissions most efficiently. What should you do?

<p>Use Event Threat Detection, trigger the IAM Anomalous grants detector, publish results to Security Command Center, filter by category <code>iam</code>, and sort to find the attack time window. (D)</p> Signup and view all the answers

An organization wants to audit Cloud Storage and BigQuery data access activities cost-effectively. How should they use Cloud Audit Logs to enable this analysis?

<p>Enable Data Access Logs for ADMIN_READ, DATA_READ, and DATA_WRITE for Cloud Storage. All Data Access Logs are enabled for BigQuery by default. (D)</p> Signup and view all the answers

Which tool can be used to synchronize identities from an on-premise identity management system to Google Cloud?

<p>Google Cloud Directory Sync (GCDS) (B)</p> Signup and view all the answers

Which Google Cloud feature allows an organization to control the source locations and times from which authorized identities can access resources?

<p>IAM Conditions (D)</p> Signup and view all the answers

How do you enable resources with only internal IP addresses to send requests to the internet?

<p>Cloud NAT (D)</p> Signup and view all the answers

Which tool should you use to enforce authentication and authorization for services deployed on Google Cloud?

<p>Identity-Aware Proxy (B)</p> Signup and view all the answers

Which Google Cloud tool helps an organization determine who performed a specific administrative action and when?

<p>Audit Logs (A)</p> Signup and view all the answers

As a cloud security engineer, you need to encrypt a connection from a user on the internet to a VM in your development project at the network/transport layer, allowing user-configurable encryption for in-transit traffic. What architecture best suits this use case?

<p>Set up an IPsec tunnel for L3/L4 encryption between user and VM instance. (D)</p> Signup and view all the answers

A three-tier web application uses App Engine, a Compute Engine-based API, and Cloud SQL for MySQL, running only during business hours. How should the infrastructure access the database when App Engine is disabled and Compute Engine is stopped?

<p>Use VM metadata to read the machine's IP address and a startup script to add access to Cloud SQL. Store the connection string, username, and password in Secret Manager. (A)</p> Signup and view all the answers

A Cloud SQL instance must be shared with an external agency for one year. The agency's developers are managed through a Google Group. How should the group's access be configured?

<p>Use Secret Manager, set the duration attribute to one year, and add the <code>secretmanager.secretAccessor</code> role to the Google Group. (A)</p> Signup and view all the answers

Flashcards

Service Account

A special Google account used by applications or VMs, not individual users.

Network Admin Role

Contains permissions to create, modify, and delete networking resources (excluding firewall rules and SSL certificates).

Multiple Network Interfaces

Allows VM instances in different VPC networks to communicate over internal IP addresses.

Binary Authorization

A feature of Google Cloud that prevents unauthorized container images from being deployed into production environments.

Signup and view all the flashcards

Audit Logs

A Google Cloud service used to determine who performed a particular administrative action and when it occurred.

Signup and view all the flashcards

IPsec tunnel

Encrypts a connection from a user on the internet to a VM at the network/transport layer (Layer 3/4) using user-configurable encryption.

Signup and view all the flashcards

Identity-Aware Proxy (IAP)

Provides authentication and authorization for services deployed to Google Cloud.

Signup and view all the flashcards

IAM Conditions

Lets you control when or from where authorized identities can access resources.

Signup and view all the flashcards

Cloud NAT

Enables resources with only internal IP addresses to make requests to the Internet.

Signup and view all the flashcards

Google Cloud Directory Sync (GCDS)

Tool used to synchronize identities from an on-premise identity management system to Google Cloud.

Signup and view all the flashcards

Event Threat Detection (IAM Anomalous Grant Detector)

Detects anomalous IAM grants and publishes results to Security Command Center for analysis.

Signup and view all the flashcards

Organizational Policy Constraints (iam.disableServiceAccountKeyCreation, iam.disableCrossProjectServiceAccountUsage)

Limits service account usage by restricting the creation of external service account keys and preventing cross-project usage.

Signup and view all the flashcards

Cloud Audit Logs Data Access Logs

Enables cost-effective auditing of Cloud Storage and BigQuery data access activities.

Signup and view all the flashcards

Study Notes

IAM Member Types

  • A service account belongs to an application or virtual machine, rather than an individual.

IAM Roles for Networking Resources

  • The Network Admin role grants permissions to create, modify, and delete networking resources, excluding firewall rules and SSL certificates.

VPC Network Communication

  • Internal IP communication between VMs in different VPC networks can be configured using multiple network interfaces on each VM.

VM Resource Utilization Comparison

  • Adding a label called “state” to VMs with the values “dev”, “test”, and “prod” and group by that label in your monitoring chart is the best method for supervising resource utilization.

Securing PII in Cloud Storage

  • For securing personally identifiable information (PII) in Cloud Storage, generate an AES-256 key as a 32-byte bytestring, decode it as a base-64 string, and use it to upload the blob.

Compliance Standards

  • SOX covers auditing and compliance standards over financial reporting, security, availability, and confidentiality controls.

Preventing Unauthorized Container Images

  • Binary Authorization prevents unauthorized container images from being deployed into production environments.

Automating Secure Boot Image Creation

  • Automate secure boot image creation, start the Compute Engine instance, set up certificates for secure boot, prepare a cloudbuild.yaml configuration file specifying the persistent disk location and the 'development' group, then use gcloud builds submit –tag specifying the configuration file path and certificates.

Automating Container Pipeline with PCI-DSS Compliance

  • Automate the pipeline by creating a Dockerfile and a Cloud Build configuration file, use the Cloud Build configuration file to build and deploy the image from Dockerfile to a Google Container registry. Include the Google Container Registry path and the Google Kubernetes Engine cluster in the configuration file, upload the configuration file to a Git repository, and create a trigger in Cloud Build to automate the deployment using the Git repository.

Investigating Remote Botnet Attacks

  • Use Cloud Audit Logs, filter Admin Activity audit logs for the affected project, and use a Pub/Sub topic to stream the logs to the external agency’s forensics tool for a cost-effective solution.

Finding Arbitrary Permissions

  • Use Event Threat Detection, trigger the IAM Anomalous Grant detector, publish results to the Security Command Center, select Event Threat Detection as the source, filter by category: iam, sort to find the attack time window, click on Persistence: IAM Anomalous Grant, and view the Source property.

Auditing Data Access Activities

  • Enable Data Access Logs for ADMIN_READ, DATA_READ, and DATA_WRITE for Cloud Storage, while all Data Access Logs are enabled for BigQuery by default.

Identity Synchronization

  • Google Cloud Directory Sync (GCDS) synchronizes identities from an on-premise identity management system to Google Cloud.

Controlling Resource Access

  • IAM Conditions control the source locations and times that authorized identities can access resources.

Enabling Internet Access for Internal IP Addresses

  • Cloud NAT enables resources with only internal IP addresses to make requests to the Internet.

Enforcing Authentication and Authorization

  • Identity-Aware Proxy enforces authentication and authorization for services deployed to Google Cloud.

Determining Administrative Actions

  • Audit logs determine who performed a particular administrative action and when.

Encrypting Internet to VM Connections

  • Set up an IPsec tunnel to create L3/L4 encryption between a user and a VM instance.

Enabling Infrastructure Access to Database

  • Use VM metadata to read the current machine’s IP address and a startup script to add access to Cloud SQL; store the connection string, username, and password in Secret Manager.

Configuring Group Access to Cloud SQL

  • Use Secret Manager and set the expiry period to one year using the duration attribute; add the secretmanager.secretAccessor role for the group containing external developers.

Designing Google Cloud Organization Hierarchy

  • Create an Organization node, then Department folders under it, then create a Teams folder under each Department. Under each Team, create Product folders. Add Projects to the Product folders.

Restricting Service Account Usage

  • Navigate to Organizational policies in the Google Cloud Console. Select your organization. Select iam.disableServiceAccountKeyCreation. Customize the applied to property, and set Enforcement to ‘On’. Click Save. Repeat the process for iam.disableCrossProjectServiceAccountUsage.

Applying Organizational Structure

  • Reset all user permissions in the small bank’s IAM. Use Cloud Identity to create dynamic groups for each of the bank’s teams. Use the dynamic groups’ metadata field for team type to allocate users to their appropriate group with a Python script.

Web Application Latency

  • Trace can be used to view the latency of requests for a web application deployed to Cloud Run.

Service Uptime Calculation and Alerts

  • Cloud Monitoring calculates service uptime and sends alerts if the value falls below a threshold.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

More Like This

AWS Network Access Control Lists (NACLs)
10 questions
Virtual Private Cloud (VPC) Overview
37 questions
VPC Network Architecture
5 questions

VPC Network Architecture

BenevolentSard1147 avatar
BenevolentSard1147
Huawei Cloud Network Services
41 questions

Huawei Cloud Network Services

ExcitingBlankVerse3097 avatar
ExcitingBlankVerse3097
Use Quizgecko on...
Browser
Browser