You create a custom role in Google Cloud Platform (GCP). Which statement correctly describes the scope of permissions you can assign to this custom role?
Think about whether permissions depend on enabled services or the full GCP permission set.
Custom roles can include any permissions available in GCP, regardless of whether the service is enabled in your project. This allows flexibility in role design.
Which JSON snippet correctly defines a custom role with title 'Data Viewer', description 'Can view data', and permissions to read BigQuery datasets?
Check the correct key names for permissions and role ID in the JSON structure.
The correct JSON uses 'roleId' for the role identifier and 'includedPermissions' inside the 'role' object to list permissions.
You want to assign a custom role to users but limit their permissions only to a specific project. Which is the best practice to achieve this?
Consider where the role is created and where it is assigned to limit scope.
Creating and assigning the custom role at the project level limits permissions strictly to that project, following the principle of least privilege.
What is a key security risk when creating a custom role that includes too many permissions?
Think about what happens if users have more permissions than needed.
Assigning too many permissions can let users access sensitive data or perform actions beyond their job needs, increasing security risks.
What happens immediately after deleting a custom role that is currently assigned to users in GCP?
Consider how GCP enforces permissions when roles are removed.
When a custom role is deleted, all permissions granted by that role are immediately revoked from users assigned to it.