Configuring Access and Security

Manage IAM policies, service accounts, and implement security best practices (~20% of exam).

Covers viewing and creating IAM policies, managing role types (basic, predefined, custom), creating and managing service accounts, implementing least privilege, service account impersonation, and short-lived credentials.
5 minutes 5 Questions

Configuring Access and Security in Google Cloud Platform (GCP) is a critical responsibility for Cloud Engineers, encompassing identity management, resource protection, and compliance enforcement. **Identity and Access Management (IAM)** forms the foundation of GCP security. IAM allows you to defin…

Concepts covered: Creating service accounts, Using service accounts in IAM policies, Managing IAM permissions of a service account, Managing service account impersonation, Creating short-lived service account credentials, Viewing IAM policies, Creating IAM policies, Managing IAM role types, Basic IAM roles, Predefined IAM roles, Custom IAM roles, Defining custom IAM roles, Service accounts with minimum permissions, Assigning service accounts to resources, Managing short-lived service account credentials, Using service accounts with GKE applications

Test mode:
GCP ACE - Configuring Access and Security Example Questions

Test your knowledge of Configuring Access and Security

Question 1

What is the purpose of the 'etag' value returned when viewing an IAM policy using gcloud commands?

Question 2

A software consulting firm has been contracted to help a client migrate their on-premises data warehouse to BigQuery. The client's GCP project contains a service account 'bq-admin@client-project.iam.gserviceaccount.com' with BigQuery Admin permissions. The consulting firm's engineers work from their own GCP project and use service account 'consultant@consulting-firm.iam.gserviceaccount.com'. The client wants consultants to perform BigQuery schema changes during the migration, but requires that all operations appear in audit logs with both the consultant's identity and the target service account. The client also wants to avoid granting BigQuery permissions to the consultant's service account. After granting the appropriate impersonation role, what additional step must the consulting firm's engineers take to successfully execute BigQuery commands as the client's service account?

Question 3

A software consultancy is building a data analytics platform on Google Cloud. They have a Cloud Run service that generates PDF reports and stores them in Cloud Storage. The service uses sa-reports@analytics-proj.iam.gserviceaccount.com as its identity. A new requirement states that a separate batch processing job running on Compute Engine (using sa-batch@analytics-proj.iam.gserviceaccount.com) must be able to create signed URLs for the PDF files stored by the Cloud Run service. The signed URLs need to be generated using the reports service account's credentials so that URL recipients can access files under that identity's permissions. When the batch job attempts to sign URLs using the reports service account, it fails with an authorization error. What IAM configuration is needed to enable this functionality?

More Configuring Access and Security questions
477 questions (total)