IAM / Organization / Security Flashcards
When the question speaks about….managing multiple team projects
You should select an answer with…folder
When the question speaks about…company level, first setup
You should answer with..organisation/root node
When the question speaks about…application level, split developpement/production/qualité
You should answer with…project gcp
When the question speaks about….organisation policies
You should find an answer with…organisation/root node
When the question speaks about…active directory / ldap
You should find an answer…Cloud identity
When the question speaks about…active directory synchronisation
You should find an answer….Google Cloud Directory sync GCDS
When the question speaks about….VPN for internal collaborators
You should find an answer….BeyondCorp»_space; Identity aware proxy
When the question speaks about…meeting regulatory compliance
You should find an answer with…Compliance Reports Manager
When the question speaks about…rigths to make an action in GCP
You should find an answer….IAM, roles, permissions
Access Transparency
Audit Cloud Provider Access
Assured Workloads
Workload Compliance Controls
Binary Authorization
Kubernetes Deploy-time security
Certificate Authority Service
Managed Private CA’s
Cloud Asset Inventory
All assets, one place
Cloud Audit Logs
Audit trails for GCP
Cloud DLP
Classify and redact sensitive data
Cloud HSM
Hardware security module service
Cloud EKM
External Keys you control
Cloud IAM
Resource access controls
Cloud Identity
Manage users, devices and apps
Cloud identity aware-proxy
Identity based app access
Cloud KMS
Hosted key management service
Cloud resource manager
cloud project metadata management
Security Command Center
Security management and data risk platform
Cloud Security Scanner
app engine security scanner
Confidential computing
encrypt data in-use
context aware access
end-user attribute-based access controls
Event threat detection
scans for suspicious activity
Managed service for microsoft active directory
Managed Microsoft Active Directory
Secrete Manager
Store and manage secrets
Security key enforcement
two step key verification
Shielded VM’s
Hardened VM’s
Titan Security Key
Two factor authentication (2FA) device
VPC Service Controls
VPC Data constraints