0% found this document useful (0 votes)
15 views

Week 10 GCP Notes

NPTEL Google Cloud Foundations Notes
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views

Week 10 GCP Notes

NPTEL Google Cloud Foundations Notes
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

Google Cloud Computing Foundation Course - Week 10 Lecture Notes Summary

Lecture 46: Explore Encryption Options

Types of Encryption in Google Cloud


• Default Encryption: Automatically encrypts data at rest (AES 256-bit) and in transit (TLS).
• Customer-Managed Encryption Keys (CMEK):
• Managed through Google’s Cloud KMS (Key Management Service).
• Supports symmetric and asymmetric cryptographic keys.
• Offers key rotation and control.
• Customer-Supplied Encryption Keys (CSEK):
• Users generate and manage their own encryption keys.
• Provides more control but requires complex management.
• Keys are discarded after encryption operations.
• Client-Side Encryption: Data is encrypted on the client side before storage in GCP.

Lecture 47: Understand Authentication and Authorization

Cloud Identity and Access Management (IAM)


• IAM Policies:
• Define who (user, group, service account) can do what (roles and permissions) on which
resource.
• G Suite and Cloud Identity:
• Integrates with G Suite for centralized identity management.
• Cloud Identity offers management without G Suite products.
• Cloud Directory Sync:
• Syncs users and groups from external systems like Active Directory.

IAM Roles
• Primitive Roles: Owner, Editor, Viewer, Billing Admin – apply across all resources in a project.
• Predefined Roles: Apply to specific GCP services.
• Custom Roles: Allow granular control, customized per organization needs.

Service Accounts
• Used for service-to-service authentication.
• Permissions can be managed using IAM policies.

Lecture 48: Best Practices for Authorization

Resource Hierarchy
• Use projects to group resources with the same trust boundary.
• Understand role inheritance in the resource hierarchy.
Service Account Best Practices
• Be cautious when granting roles to service accounts.
• Use naming conventions and key rotation policies.

Lecture 49: Quiz Highlights


• True/False and scenario-based questions focus on IAM policy hierarchy, role-based access, and
encryption options.

Lecture 50: Summary of Cloud Security and IAM


• Security Responsibilities: Google handles infrastructure security, while customers manage data
access and encryption.
• Encryption Options: GCP provides default encryption, CMEK, CSEK, and client-side
encryption.
• Cloud IAM: Controls access using roles and permissions, including integration with G Suite
and Cloud Identity.
• Best Practices: Leverage resource hierarchy, use least privilege, and manage service accounts
carefully.

Lecture 51: Introduction to GCP Networking

Networking Concepts
• Virtual Private Cloud (VPC): Isolated networks within GCP.
• Public and Private IPs: Distinguish between internal and external access.
• Google Network Architecture: Includes regions, zones, cache nodes, points of presence, and
fiber infrastructure.

Firewall and Routes


• Control access and traffic between resources within a VPC.

Hybrid Cloud Networking


• VPNs: Connect on-premises infrastructure to GCP.
• Direct Peering: Directly connects networks for low-latency communication.

Questions with Answers


1. What are the encryption options in GCP?
• Default, CMEK, CSEK, and Client-Side Encryption.
2. What is CMEK?
• Customer-Managed Encryption Keys that are managed through Google’s Cloud KMS.
3. What is the difference between CMEK and CSEK?
• CMEK is managed through GCP, while CSEK requires the user to generate and manage
their own keys.
4. How is data encrypted in transit in GCP?
• Via TLS (Transport Layer Security).
5. What does Cloud IAM do?
• Manages access to resources by defining who can do what on which resource.
6. What is a primitive role in IAM?
• Roles like Owner, Editor, Viewer that apply across all GCP resources in a project.
7. What is a predefined role in IAM?
• Roles specific to GCP services, offering more fine-grained permissions.
8. What is a custom role in IAM?
• User-defined roles that provide granular control over permissions.
9. What is Cloud Directory Sync?
• A tool that syncs users and groups from systems like Active Directory to GCP.
10.What are service accounts used for?
• Service-to-service communication, allowing services to authenticate with each other.
11.What is the resource hierarchy in GCP?
• The organizational structure that defines how resources are grouped and accessed.
12.What is the principle of least privilege in IAM?
• Granting the minimum permissions necessary for a user to perform their role.
13.How can roles be inherited in IAM?
• Permissions applied to a resource are inherited by its sub-resources.
14.What is a billing admin role?
• Grants access to billing information without access to the project resources.
15.What is client-side encryption?
• Encrypting data locally before storing it in GCP.
16.How does GCP secure data at rest?
• By default, GCP encrypts data at rest using AES 256-bit encryption.
17.What is Cloud KMS?
• A key management service that automates key generation, rotation, and management.
18.What is the difference between symmetric and asymmetric encryption?
• Symmetric encryption uses the same key for encryption and decryption, while
asymmetric uses a pair of public and private keys.
19.How can GCP users manage centralized identity?
• Through G Suite or Cloud Identity.
20.What are the best practices for managing service accounts?
• Use meaningful display names, rotate keys regularly, and avoid granting unnecessary
permissions.
21.How does Cloud IAM integrate with G Suite?
• Allows centralized management of users and groups for GCP resources.
22.What is a VPC in GCP?
• A Virtual Private Cloud that allows isolated networking within GCP.
23.What are firewall rules in GCP?
• Define which traffic is allowed to enter or leave a VPC.
24.What are the types of IP addresses in GCP?
• Public IPs for external access and Private IPs for internal access within a VPC.
25.What is the Google Network Architecture?
• A global infrastructure that includes regions, zones, cache nodes, and fiber connections.
26.What is the role of Cloud Identity in GCP?
• A unified platform for managing user groups, access, and devices.
27.What are the advantages of using IAM custom roles?
• Provides granular control and customization for specific organizational needs.
28.What is Google’s default encryption?
• GCP automatically encrypts data at rest and in transit.
29.What is a persistent disk in GCP?
• A storage option for virtual machines that can be encrypted using CMEK or CSEK.
30.How does key rotation work in Cloud KMS?
• Keys can be manually rotated or set to rotate automatically at regular intervals.
31.What is a service account in GCP?
• A special Google account used to authenticate services for service-to-service
communication.
32.What is the purpose of routes in GCP?
• To define the network paths for traffic within a VPC.
33.How does direct peering work in GCP?
• Provides a direct connection between your network and Google’s network for low-
latency communication.
34.What is hybrid cloud networking?
• Integrates on-premises networks with GCP using VPNs or direct peering.
35.What are load-balancing options in GCP?
• Distributes traffic across multiple resources to ensure availability and performance.
36.What is the purpose of Cloud Identity-Aware Proxy (IAP)?
• Provides centralized authorization for applications accessed over TLS.
37.What are the components of the resource hierarchy in GCP?
• Organizations, Folders, Projects, and Resources.
38.What is a point of presence in Google’s network?
• A location where Google’s network connects with other networks.
39.What are cache nodes in GCP?
• Nodes that store frequently accessed data closer to users to reduce latency.
40.What is an IAM policy in GCP?
• A set of rules that define what actions a user or service can perform on a resource.
41.How does Google protect service-to-service communication?
• Through the use of service accounts and IAM roles.
42.What are audit logs in GCP?
• Logs that record who did what on which resource and when, for security and compliance
purposes.
43.What is the Cloud IAM Viewer role?
• Allows users to view resources without modifying them.
44.What is key rotation and why is it important?
• The regular updating of encryption keys to enhance security.
45.What is a virtual machine in GCP?
• A compute resource that runs applications in the cloud.
46.What are IAM permissions?
• Fine-grained actions that users or services are allowed to perform on GCP resources.
47.What is a project in GCP?
• A grouping of resources in GCP that share the same trust boundary.
48.How do predefined IAM roles work?
• Roles that are designed for specific GCP services with defined sets of permissions.
49.What is Cloud Armor in GCP?
• A security service that helps protect applications from DDoS attacks and other threats.
50.How does a service account authenticate with other GCP services?
• By using an email-like identity and IAM policies to control permissions.

You might also like