Security and Identity Flashcards

1
Q

Access Transparency

A

Access Transparency captures near real-time logs of manual, targeted accesses by Google administrators, and serves them to customers via their Cloud Logging account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Assured Workloads

A

Assured Workloads provides functionality to create security controls that are enforced on your cloud environment. These security controls can assist with your compliance requirements (for example, FedRAMP Moderate).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Binary Authorization

A

Binary Authorization helps customers ensure that only signed and explicitly-authorized workload artifacts are deployed to their production environments. It offers tools for customers to formalize and codify secure supply chain policies for their organizations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Certificate Authority Service

A

Certificate Authority Service is a cloud-hosted certificate issuance service that lets customers issue and manage certificates for their cloud or on-premises workloads.

Certificate Authority Service can be used to create certificate authorities using Cloud KMS keys to issue, revoke, and renew subordinate and end-entity certificates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cloud Asset Inventory

A

Cloud Asset Inventory is an inventory of cloud assets with history. It enables users to export cloud resource metadata at a given timestamp or cloud resource metadata history within a time window.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cloud Data Loss Prevention

A

Cloud Data Loss Prevention is a fully-managed service designed to help you discover, classify, and protect your most sensitive data.

You can inspect, mask, and de-identify sensitive data like personally identifiable information (PII).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Cloud External Key Manager (Cloud EKM)

A

Cloud EKM lets you encrypt data in Google Cloud Platform with encryption keys that are stored and managed in a third-party key management system deployed outside Google’s infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cloud Hardware Security Model (HSM)

A

Cloud HSM is a cloud-hosted key management service that lets you protect encryption keys and perform cryptographic operations within a managed HSM service. You can generate, use, rotate, and destroy various symmetric and asymmetric keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cloud Key Management Service

A

Cloud Key Management Service is a cloud-hosted key management service that lets you manage cryptographic keys for your cloud services the same way you do on premises.

You can generate, use, rotate, and destroy AES256, RSA 2048, RSA 3072, RSA 4096, EC P256, and EC P384 cryptographic keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Event Threat Detection

A

Event Threat Detection helps detect threats in log data. Threat findings are written to Security Command Center and optionally to Cloud Logging.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Key Access Justifications (KAJ)

A

KAJ provides a justification for every request sent through Cloud EKM for an encryption key that permits data to change state from at-rest to in-use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Risk Manager

A

Risk Manager allows customers to scan their cloud environments and generate reports around their compliance with industry-standard security best practices, including CIS benchmarks. Customers then have the ability to share these reports with insurance providers and brokers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Security Command Center

A

Security Command Center helps security teams gather data, identify threats, and act on them before they result in business damage or loss.

Through a set of native features like Security Health Analytics and additional partner integrations, it offers deep insight into application and data risk so that you can quickly mitigate threats to your cloud resources and evaluate overall health.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Virtual Private Cloud (VPC) Service Controls

A

VPC Service Controls provide administrators the ability to configure security perimeters around resources of API based cloud services (such as Cloud Storage, BigQuery, Bigtable) and limit access to authorized VPC networks, thereby mitigating data exfiltration risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Secret Manager

A

Secret Manager provides a secure and convenient method for storing API keys, passwords, certificates, and other sensitive data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Web Security Scanner

A

Web Security Scanner is a web application security scanner that enables developers to easily check for a subset of common web application vulnerabilities in websites built on App Engine and Compute Engine.