Which of the following best explains why using IAM is crucial for security in Google Cloud Platform?
Think about how controlling user permissions helps keep your cloud safe.
IAM lets you decide who can do what in your cloud. This stops people who shouldn't have access from reaching your data or services.
Consider a GCP project where all firewall rules are disabled. What is the most likely result?
Think about what a firewall does when it is turned off or disabled.
Disabling firewall rules means no rules allow traffic, so all traffic is blocked by default, isolating your network.
You need to design a GCP architecture that keeps data secure across multiple regions. Which design choice best supports this goal?
Think about encryption and access control across regions.
Using uniform bucket-level access simplifies permissions, and CMEK lets you control encryption keys, enhancing security across regions.
What is the main security risk of assigning broad roles like 'Owner' to service accounts in GCP?
Consider what happens if someone steals the credentials of a powerful service account.
Giving too many permissions means if the service account is hacked, the attacker can do a lot of harm.
You must protect sensitive customer data stored in GCP. Which approach best follows security best practices?
Think about encryption control and limiting who can see the data.
Using customer-managed keys gives you control over encryption, and IAM policies limit who can access the data, protecting sensitive information.