6. Buidling Secure ML Pipelines Flashcards

1
Q

What are the three types of encryption used in GCP?

A

Encryption at rest (Cloud Storage and BigQuery tables)
Encryption in transit (Transport Layer Security)
Encryption in use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What encryption is used to encrypt individual table values in BigQuery?

A

Authenticated Encryption with Associated Data encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the differences between server-side and client-side encryption for encryption at rest?

A

Server-side encryption:
Encryption that occurs after the cloud storage receives your data, but before the data is written to disk and stored. The keys are managed by Key Management Service.

Client-side encryption:
Encryption that occurs before data is sent to Cloud Storage and BigQuery but it will still be encrypted on the server-side. Client-side keys are managed by the user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does encryption in use work?

A

Confidential Computing protects your data in memory from compromise by encrypting it while it is being processed. You can encrypt your data in use with Confidential VMs and Confidential GKE Nodes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the two levels of roles in Identity and Access Management in GCP?

A

Project‐level roles: Assign roles to a principal (user, group, or service account).
Resource‐level roles: Grant access to a specific resource (individual users). The resource must support resource‐level policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the three types of IAM roles available in Vertex AI?

A

Predefined roles: Administrator and User
Basic roles: Owner, Editor, and Viewer at the project level.
Custom roles: allow you to choose a specific set of permissions, create your own role with those permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are two types of Vertex AI notebooks with Vertex AI Workbench?

A

User‐managed notebook instances are highly customizable
Managed notebook is less customizable.
Advantages are its integration with Cloud Storage and BigQuery in JupyterLab and automatic shutdown

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are two ways to set up user access modes (permission) for both user‐managed and managed notebooks?

A

Single User Only access mode grants access only to the user that you specify.
Service Account access mode grants access to a service account. You can grant access to one or more users through this service account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How can you run Vertex AI APIs in Google Colab?

A

Create a service account key with access to the Vertex AI administrator and Cloud Storage owner permission.
Then you can provide the location of the JSON key file to the GOOGLE_APPLICATION_CREDENTIALS environment variable to authenticate your Google Colab project

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are Google Cloud shared responsibility and shared fate models?

A

Shared responsibility model: The cloud provider must monitor and respond to security threats related to the cloud itself and its underlying infrastructure. Meanwhile, end users are responsible for protecting data and other assets they store in any cloud environment.
Shared fate model: Focuses on how all parties can better interact to continuously improve security.
1. Security recommendations enabled by default
2. Risk protection program
3. Assured workloads and governance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the best practice to secure your workbench?

A

Use a private IP address
Connect your instance to a VPC network in the same project
Shared VPC network. You can use VPC Service Controls to allow or deny access to specific services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the artifacts protected when you use VPC Service Controls?

A

Training data for an AutoML model or custom model
Models that you created
Requests for online predictions
Results from a batch prediction request

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How to secure Vertex AI endpoints?

A

Public endpoint is publicly accessible to the Internet.
For private endpoints, use private connection to talk to your endpoint without your data ever traversing the public Internet,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How do you secure your Vertex AI training jobs?

A

Using private IP addresses to connect to your training jobs provides more network security and lower network latency than using public IP addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Federated Learning?

A

Federated learning enables mobile phones to collaboratively learn a shared prediction model while keeping all the training data on the device.
The updated model is then sent for consolidation.
Lower latency, and less power consumption, all while ensuring privacy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is differential privacy?

A

Differential privacy (DP) is a system for publicly sharing information about a dataset while withholding information about each individual in the dataset, i.e., adding noise to the dataset.

17
Q

What is Format-Preserving Encryption?

A

It is an encryption algorithm that preserves the format of information while it is being encrypted, e.g., payment card verification.

18
Q

What is tokenization in security?

A

Tokenization refers to a process by which a piece of sensitive data, such as a credit card number, is replaced by a surrogate value known as a token.

19
Q

What is personally identifiable information?

A

PII is a type of data that allows for an individual to be identified, such as name, address, Social Security number (SSN), date of birth, financial information, passport number, telephone numbers, and email addresses.

20
Q

What does Data Loss Prevention API do?

A

Data Loss Prevention (DLP) API can de‐identify sensitive data in text content, including text stored in container structures such as tables, e.g., masking, encrypting, replacing or bucketing

21
Q

What is data profile?

A

The data profiler lets you protect data across your organization by identifying where sensitive and high‐risk data reside.

21
Q

What is Risk Analysis?

A

Use risk analysis methods before de‐identification to help determine an effective de‐identification strategy or after de‐identification to monitor for any changes or outliers.

21
Q

What is inspection (jobs or triggers)?

A

A job is an action that Cloud Data Loss Prevention runs to either scan content for sensitive data or calculate the risk of re‐identification. You can trigger a DLP scan job by using Cloud Functions every time a file is uploaded to Cloud Storage.

22
Q

What does an architecture for de-identification of PII consist of?

A

Data de‐identification streaming pipeline: De‐identifies sensitive data in text using Dataflow.
Configuration (DLP template and key) management
Data validation and re‐identification pipeline: You can have batch and streaming data de‐identified and stored

23
Q

What is Patient Healthcare Information?

A

PHI that is linked based on the list of 18 identifiers such as name, medical record number, Social Security number, IP address, and so on must be treated with special care.

24
Q

What does Healthcare API do?

A

The Google Cloud Healthcare API removes PHI from healthcare data. The healthcare API’s de‐identification is highly configurable and redacts PHI from text and images

25
Q

What are different types of strategies for handling sensitive data?

A

Specific columns in a dataset: Create a view not having the columns. Principal Component Analysis and Coarsening are also ways to de-sensitize data.
Sensitive data in unstructured content (known patterns): DLP
Sensitive data in images, videos, audio or free-form (unstructured): Use NLP API, Speech API, Vision API and Video Intelligence API.

26
Q

What are the techniques to handle sensitive fields in data?

A

IP addresses: Zero out the last octet of IPv4.
Numeric quantities: Bucketize
Zip codes: Coarsen to include just the first three digits.
Location: Use city, state, or zip code