Identity and Security (Policy and compliance tools) Flashcards
Access Context Manager
Fine-grained, attribute based access-control
Access Transparency
Audit cloud provider access
Assured Workloads
Workload compliance controls
BeyondCorp Enterprise
Zero trust secure access
Binary Authorization
Kubernetes deploy-time security
Certificate Authority Service
Managed private CAs
Chronicle
Find threats from security telemetry
Cloud Asset Inventory
All assets, one place
Cloud Audit Logs
Audit trails
Cloud Data Loss Prevention
Classify and redact sensitive data
Cloud EKM
External Keys you control/manage
Cloud HSM
Hardware security module service
Cloud IAM
Resource access control
Cloud Identity
Manage users, devices, & apps
Cloud Identity-Aware Proxy
Identity-based app access
Cloud KMS
Hosted key management service
Confidential Computing
Encrypt data in-use
Context-aware Access
End-user attribute-based access control
Event Threat Detection
Scans for suspicious activity
Identity Platform
Drop-in Authentication, Access-Management
Managed Service for Microsoft Active Directory
Managed Microsoft Active Directory
Resource Manager
Cloud project metadata management
Risk Manager
Evaluate organization’s security posture
Secret Manager
Store and manage secrets
Security Command Center
Security management and data risk platform
Security Key Enforcement
Two-step key verification
Shielded VMs
Hardened VMs (secure)
Titan Security Key
Two-factor authentication (2FA) device
VPC Service Controls
VPC data constraints
VirusTotal
Research/hunt for malware
Cloud Security Scanner
App engine security scanner
reCAPTCHA Enterprise
Protect website against bots
Web Security Scanner
Identifies web-app security vulnerabilities