Official Google Cloud Certified Professional Cloud Security Engineer Exam Guide : Become an Expert and Get Google Cloud Certified with This Practitioner's Guide /
Master designing, developing, and operating secure infrastructures on Google cloud Key Features Prepare for the certification exam with clear explanations, real-world examples, and self-assessment questions Review Google Cloud security best practices for building a secure and compliant cloud environ...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Otros Autores: | , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Birmingham :
Packt Publishing, Limited,
2023.
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- Cover
- FM
- Copyright
- Foreword
- Contributors
- Table of Contents
- Preface
- Chapter 1: About the GCP Professional Cloud Security Engineer Exam
- Benefits of being certified
- Registering for the exam
- Some useful tips on how to prepare
- Summary
- Further reading
- Chapter 2: Google Cloud Security Concepts
- Overview of Google Cloud security
- Shared security responsibility
- Addressing compliance on Google Cloud
- Security by design
- Operational security
- Network security
- Data security
- Services and identity
- Physical and hardware security
- Threat and vulnerability management
- Summary
- Further reading
- Chapter 3: Trust and Compliance
- Establishing and maintaining trust
- Access Transparency and Access Approval
- Access Transparency
- Enabling Access Transparency
- Access Approval
- Configuring Access Approval
- Security and privacy of data
- Third-party risk assessments
- Compliance in the cloud
- Compliance reports
- Continuous compliance
- Summary
- Further reading
- Chapter 4: Resource Management
- Overview of Google Cloud Resource Manager
- Understanding resource hierarchy
- Organization
- Folders
- Projects
- Applying constraints using the Organization Policy Service
- Organization policy constraints
- Policy inheritance
- Asset management using Cloud Asset Inventory
- Asset search
- Asset export
- Asset monitoring
- Asset analyzer
- Best practices and design considerations
- Summary
- Further reading
- Chapter 5: Understanding Google Cloud Identity
- Overview of Cloud Identity
- Cloud Identity domain setup
- Super administrator best practices
- Securing your account
- 2-step verification
- User security settings
- Session length control for Google Cloud
- SAML-based SSO
- Additional security features
- Directory management
- Google Cloud Directory Sync
- GCDS features and capabilities
- How does GCDS work?
- Using GCDS Configuration Manager
- User provisioning in Cloud Identity
- Automating user lifecycle management with Cloud Identity as the IdP
- Administering user accounts and groups programmatically
- Summary
- Further reading
- Chapter 6: Google Cloud Identity and Access Management
- Overview of IAM
- IAM roles and permissions
- Policy binding
- Service accounts
- Creating a service account
- Disabling a service account
- Deleting a service account
- Undeleting a service account
- Service account keys
- Key rotation
- Service account impersonation
- Cross-project service account access
- Configuring Workload Identity Federation with Okta
- Best practices for monitoring service account activity
- Service agents
- IAM policy bindings
- Policy structure
- Policy inheritance and resource hierarchy
- IAM Conditions
- Policy best practices
- Policy Intelligence for better permission management
- Tag-based access control
- Tag structure
- Best practices for tags
- Cloud Storage ACLs