Security Flashcards

1
Q

Access Transparency

A

Access Transparency captures near real-time logs of manual, targeted accesses by Google administrators, and serves them to customers via their Cloud Logging account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Assured Workloads

A

Assured Workloads provides functionality to create security controls that are enforced on your cloud environment. These security controls can assist with your compliance requirements (for example, FedRAMP Moderate).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Binary Authorization

A

Binary Authorization helps customers ensure that only signed and explicitly-authorized workload artifacts are deployed to their production environments. It offers tools for customers to formalize and codify secure supply chain policies for their organizations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Certificate Authority Service

A

Certificate Authority Service is a cloud-hosted certificate issuance service that lets customers issue and manage certificates for their cloud or on-premises workloads. Certificate Authority Service can be used to create certificate authorities using Cloud KMS keys to issue, revoke, and renew subordinate and end-entity certificates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Certificate Manager

A

Certificate Manager provides a central place for customers to control where certificates are used and how to obtain certificates, and to see the state of the certificates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cloud Asset Inventory

A

Cloud Asset Inventory is an inventory of cloud assets with history. It enables users to export cloud resource metadata at a given timestamp or cloud resource metadata history within a time window.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Cloud Data Loss Prevention

A

Cloud Data Loss Prevention is a fully-managed service designed to help you discover, classify, and protect your most sensitive data. You can inspect, mask, and de-identify sensitive data like personally identifiable information (PII).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cloud External Key Manager

(Cloud EKM)

A

Cloud EKM lets you encrypt data in Google Cloud Platform with encryption keys that are stored and managed in a third-party key management system deployed outside Google’s infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cloud HSM

A

Cloud HSM (Hardware Security Module) is a cloud-hosted key management service that lets you protect encryption keys and perform cryptographic operations within a managed HSM service. You can generate, use, rotate, and destroy various symmetric and asymmetric keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cloud Key Management Service

A

Cloud Key Management Service is a cloud-hosted key management service that lets you manage cryptographic keys for your cloud services the same way you do on premises. You can generate, use, rotate, and destroy AES256, RSA 2048, RSA 3072, RSA 4096, EC P256, and EC P384 cryptographic keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Event Threat Detection

A

Event Threat Detection helps detect threats in log data. Threat findings are written to Security Command Center and optionally to Cloud Logging.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Key Access Justifications (KAJ)

A

KAJ provides a justification for every request sent through Cloud EKM for an encryption key that permits data to change state from at-rest to in-use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Risk Manager

A

Risk Manager allows customers to scan their cloud environments and generate reports around their compliance with industry-standard security best practices, including CIS benchmarks. Customers then have the ability to share these reports with insurance providers and brokers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Security Command Center

A

Security Command Center is Google Cloud’s centralized vulnerability and threat reporting service. Security Command Center provides asset inventory and discovery and allows you to identify misconfigurations, vulnerabilities and threats, helping you to mitigate and remediate risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

VPC Service Controls

A

VPC Service Controls provide administrators the ability to configure security perimeters around resources of API based cloud services (such as Cloud Storage, BigQuery, Bigtable) and limit access to authorized VPC networks, thereby mitigating data exfiltration risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Secret Manager

A

Secret Manager provides a secure and convenient method for storing API keys, passwords, certificates, and other sensitive data.

17
Q

Web Security Scanner

A

Web Security Scanner is a web application security scanner that enables developers to easily check for a subset of common web application vulnerabilities in websites built on App Engine and Compute Engine.