Cargando…

Official Google Cloud Certified Professional Cloud Security Engineer Exam Guide : Become an Expert and Get Google Cloud Certified with This Practitioner's Guide /

Master designing, developing, and operating secure infrastructures on Google cloud Key Features Prepare for the certification exam with clear explanations, real-world examples, and self-assessment questions Review Google Cloud security best practices for building a secure and compliant cloud environ...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Chowdhary, Ankush
Otros Autores: Kulkarni, Prashant, Venables, Phil
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham : Packt Publishing, Limited, 2023.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)
Tabla de Contenidos:
  • Cover
  • FM
  • Copyright
  • Foreword
  • Contributors
  • Table of Contents
  • Preface
  • Chapter 1: About the GCP Professional Cloud Security Engineer Exam
  • Benefits of being certified
  • Registering for the exam
  • Some useful tips on how to prepare
  • Summary
  • Further reading
  • Chapter 2: Google Cloud Security Concepts
  • Overview of Google Cloud security
  • Shared security responsibility
  • Addressing compliance on Google Cloud
  • Security by design
  • Operational security
  • Network security
  • Data security
  • Services and identity
  • Physical and hardware security
  • Threat and vulnerability management
  • Summary
  • Further reading
  • Chapter 3: Trust and Compliance
  • Establishing and maintaining trust
  • Access Transparency and Access Approval
  • Access Transparency
  • Enabling Access Transparency
  • Access Approval
  • Configuring Access Approval
  • Security and privacy of data
  • Third-party risk assessments
  • Compliance in the cloud
  • Compliance reports
  • Continuous compliance
  • Summary
  • Further reading
  • Chapter 4: Resource Management
  • Overview of Google Cloud Resource Manager
  • Understanding resource hierarchy
  • Organization
  • Folders
  • Projects
  • Applying constraints using the Organization Policy Service
  • Organization policy constraints
  • Policy inheritance
  • Asset management using Cloud Asset Inventory
  • Asset search
  • Asset export
  • Asset monitoring
  • Asset analyzer
  • Best practices and design considerations
  • Summary
  • Further reading
  • Chapter 5: Understanding Google Cloud Identity
  • Overview of Cloud Identity
  • Cloud Identity domain setup
  • Super administrator best practices
  • Securing your account
  • 2-step verification
  • User security settings
  • Session length control for Google Cloud
  • SAML-based SSO
  • Additional security features
  • Directory management
  • Google Cloud Directory Sync
  • GCDS features and capabilities
  • How does GCDS work?
  • Using GCDS Configuration Manager
  • User provisioning in Cloud Identity
  • Automating user lifecycle management with Cloud Identity as the IdP
  • Administering user accounts and groups programmatically
  • Summary
  • Further reading
  • Chapter 6: Google Cloud Identity and Access Management
  • Overview of IAM
  • IAM roles and permissions
  • Policy binding
  • Service accounts
  • Creating a service account
  • Disabling a service account
  • Deleting a service account
  • Undeleting a service account
  • Service account keys
  • Key rotation
  • Service account impersonation
  • Cross-project service account access
  • Configuring Workload Identity Federation with Okta
  • Best practices for monitoring service account activity
  • Service agents
  • IAM policy bindings
  • Policy structure
  • Policy inheritance and resource hierarchy
  • IAM Conditions
  • Policy best practices
  • Policy Intelligence for better permission management
  • Tag-based access control
  • Tag structure
  • Best practices for tags
  • Cloud Storage ACLs