1. Home
  2. Training Library
  3. Google Cloud Platform
  4. Courses
  5. Configuring GCP Access and Security

Configuring GCP Access and Security


Identity & Access Management
Cloud IAM
1m 37s


NOTICE: This course is deprecated and has been replaced by https://cloudacademy.com/course/configuring-gcp-access-security-2685/


Security is considered to be one of the biggest challenges when comparing cloud vs. in-house infrastructure. Due to lack of trust, loss of control, and the multi-tenant nature of the cloud, security controls and mechanisms are of the utmost importance.

Google Cloud Platform offers tools with a single dashboard and simple interfaces to implement security policies. Google Cloud Identity and Access Management (IAM) provides an easy way to manage GCP users and the permissions assigned to them. Besides human users, GCP provides a way to create non-human identities (service accounts) and attach those to cloud applications and VMs. The correct configuration and usage of service accounts and IAM are critical to GCP security. GCP also provides a centralized dashboard to view audit logs, which are useful in the case of a security breach.

To help you get the most out of the security tools offered in Google Cloud, this course covers how to properly manage IAM, service accounts, and audit logs.

Learning Objectives

  • Understand how cloud security differs from on-premises security
  • Configure identities and access levels in Google Cloud Platform using Cloud IAM
  • Create, manage, and assign service accounts to GCP VMs 
  • View audit logs in the GCP console

Intended Audience

  • Students preparing for GCP cloud certifications
  • Cloud administrators and IT professionals
  • Cloud security practitioners
  • GCP developers


  • Completion of Google Cloud Platform Fundamentals course on Cloud Academy or practical working experience with GCP infrastructure
  • Basic proficiency with command-line tools and Linux operating system environments

Hello and welcome to Configuring GCP Access and Security. My name is John Shell with Cloud Academy. This course is developed by Abhishek Gupta who has 10-plus years of experience in the domains of high-performance computing, cloud and security. Gupta has a PhD in computer science and teaches graduate courses in cloud computing at Santa Clara University.

This course is intended for cloud administrators. Also, if you are a cloud security practitioner, specifically for GCP, or involved in any sort of development with GCP, you will definitely benefit from this course. Now some of the prerequisites for this course. I assume that you've completed the Google Cloud Platform Fundamentals course on Cloud Academy or you have practical working experience with GCP infrastructure. I also assume you have basic proficiency with command-line tools and Linux operating system environments. Another prerequisite is that you have some sort of systems operations experience including deploying and managing applications either on-premises or in a public cloud environment.

At a high level, we'll cover the following topics. After this brief introduction, we'll dive into how we can manage identity and access management in GCP. We'll also learn about service accounts, what they mean, and how you can manage them in GCP. Next, we'll talk about audit logs and how you can review them in GCP. We will discuss the differences between in-house infrastructure and GCP infrastructure. And finally, we'll summarize some of the key learning objectives. 

After you have taken this course, you should understand how cloud security differs from on-premises security, and the importance of identities, service accounts and logins with respect to security. You should also be able to configure Google Cloud's Identity Management tools and use the identities and access levels for virtual machines and cloud storage. In addition, you should know how to create, manage, and find service accounts. Finally, you should be able to view audit logs, see activity logs and check driver logs in a GCP dashboard. 

If you have any questions about the course, you can email support@cloudacademy.com. Also, your feedback is very important to us; when you are finished with this course, please provide a rating and any feedback, whether it is positive or negative. That is all for this lecture. Next, we will discuss Identity Access Management or IAM.

About the Author

Abhishek Gupta has 10+ years of experience in the domain of high-performance computing, cloud, and security. Currently, he's leading an innovation team at the Schlumberger Software Technology Innovation Center and is also a visiting faculty member at Santa Clara University where he teaches a graduate course in cloud computing. Gupta has a Ph.D. in Computer Science from the University of Illinois at Urbana Champaign.