Security Flashcards
Cloud Armor
WAF - web application firewall
Layer 7 web app firewall
Prevents DDoS, cross site scripting, SQL injections attacks
Service account email format
[name]@[project_id].[service name].gserviceaccount.com
[name]@appspot.gserviceaccount.com
IAM Conditions
- Definition
- Language conditions expressed in
Access control based on attributes of a resource
Common Expression Language (CEL)
Network Tags
User level annotation for Compute Engine resources
Used to define security groups, network segment, firewall rules
Resource Tags
Key value pairs that can be attached to an org, folder, project
Can be used to conditionally allow or deny policies based on whether a resource has a specific tag
Security Marks
Security Command Center annotations for findings and assets for searching, selecting, filtering
Can group marks for policy, integration with workflow, flag for priority, access level, sensitivity classification
Labels
User level annotation, metadata for resources
Used for billing and admin
Not inherited by children resources
IAM policies written in what format
JSON
Clou IAM API functions (3)
Set policies on resources
Read policies on resources
Test whether an identity has a permission on a resource
IAM Conditions resource attributes (3)
Type of resource
Resource name
Tags attached to resource
IAM conditions request attributes (3)
Access level
Date and time
Destination IP and port
Identity Aware Proxy
Layer 7 based access control for HTTP requests
IAP protected resources can only be accessed via proxy by principal with correct IAM role
Allows fine grained access control and user grouping without requiring VPN
Organization policy constraint
Rule that prevents action or configuration on service or group of services
Implemented across an org
Data at rest encryption occurs at which levels (3)
Platform - database and file data
Infrastructure - data grouped into data chunks in storage system
Hardware - storage device itself
Infrastructure level encryption
- keys used
- encryption type
DEK
KEK
AES256
Data in transit encryption
- Data outside Google network (1)
- Data inside Google network (2)
Data outside Google network - authenticated but not necessarily encrypted
Data inside Google network
- HTTP/HTTPS to GFE - TLS or QUIC
- Within GCP infrastructure - ALTS for authentication and encryption
Default encryption keys used
Google issued and managed DEK and KEK
Cloud KMS
- Definition
- Key type
- Keys from
- Key managed by
- Key rotation
Hosted key management AES, RSA, EC Customer generated or imported keys Customer managed by Google hosted Auto key rotation