Evaluate your knowledge of key security best practices in Google Cloud Platform environments. This quiz covers topics such as identity management, data protection, network security, and compliance measures for robust cloud security strategies.
Which practice helps minimize potential risk when assigning permissions to users in a cloud environment?
Explanation: Granting the least privilege necessary reduces the chance of accidental or intentional misuse by ensuring users have only the access required for their tasks. Assigning global admin roles by default or using top-level inherited permissions exposes resources to excessive access. Grouping all users under the same level ignores specific role requirements, increasing overall risk.
What is considered a best practice for securing sensitive data stored in cloud storage buckets?
Explanation: Enabling encryption at rest ensures that stored data is protected from unauthorized access, even if physical media is compromised. Using outdated algorithms may leave data vulnerable, and storing keys alongside the data defeats the purpose of encryption. Disabling encryption for performance purposes sacrifices security and is not advisable.
When configuring network firewalls for virtual machines, which approach enhances security?
Explanation: Restricting traffic to only what is needed limits the exposure of resources and reduces attack surfaces. Opening all ports or disabling firewalls increases vulnerability to attacks. Using the same firewall rules everywhere fails to account for variations in risk and requirements between environments.
Why is it important to enable detailed logging and regularly review security logs in your cloud environment?
Explanation: Detailed logging allows teams to spot suspicious behaviors and investigate breaches efficiently. It does not necessarily reduce costs and unrestricted log access could create more security issues. Reviewing logs will not automatically resolve vulnerabilities; human analysis and action are required.
Which method helps maintain compliance and reduce risk with unused cloud resources?
Explanation: Regularly cleaning up unused resources limits exposure to vulnerabilities and supports compliance by reducing unnecessary risk. Leaving resources running increases surface area for attacks. Trusting only automated alerts without action is insufficient, and sharing resources publicly can result in unintended data exposure.