Identity & Access Management
NOTICE: This course is deprecated and has been replaced by https://cloudacademy.com/course/configuring-gcp-access-security-2685/
Security is considered to be one of the biggest challenges when comparing cloud vs. in-house infrastructure. Due to lack of trust, loss of control, and the multi-tenant nature of the cloud, security controls and mechanisms are of the utmost importance.
Google Cloud Platform offers tools with a single dashboard and simple interfaces to implement security policies. Google Cloud Identity and Access Management (IAM) provides an easy way to manage GCP users and the permissions assigned to them. Besides human users, GCP provides a way to create non-human identities (service accounts) and attach those to cloud applications and VMs. The correct configuration and usage of service accounts and IAM are critical to GCP security. GCP also provides a centralized dashboard to view audit logs, which are useful in the case of a security breach.
To help you get the most out of the security tools offered in Google Cloud, this course covers how to properly manage IAM, service accounts, and audit logs.
- Understand how cloud security differs from on-premises security
- Configure identities and access levels in Google Cloud Platform using Cloud IAM
- Create, manage, and assign service accounts to GCP VMs
- View audit logs in the GCP console
- Students preparing for GCP cloud certifications
- Cloud administrators and IT professionals
- Cloud security practitioners
- GCP developers
- Completion of Google Cloud Platform Fundamentals course on Cloud Academy or practical working experience with GCP infrastructure
- Basic proficiency with command-line tools and Linux operating system environments
Congratulations, you've made it to the end of this course. Let's review the key takeaways from the course. First is that security in the cloud is more complex than in an in-house environment. Specifically, the loss of control, lack of trust, and multi-tenancy in the cloud pose significant security concerns for enterprises. Fortunately, Google Cloud offers solutions to address these cloud security challenges.
Google Cloud Identity and Access Management, also known as Cloud IAM, gives an easy way to manage users of GCP and also control their access to cloud resources. Cloud IAM provides a good way for enterprises to control resources, even though these resources are running in the cloud.
Another key takeaway from this course is that service accounts in GCP offer a way to assign identities to non-humans, such as virtual machines and cloud applications. We learned in this course how to create, manage, and assign service accounts to virtual machines. This will help you to define and restrict privileges of resources in the cloud.
Finally, centralized audit logs are critical for security and event management in the cloud. In GCP, audit logs in Stackdriver allow you to see all the information in a single dashboard.
This concludes our course on configuring GCP access and security. Please feel free to provide a rating for this course and send any feedback you have or any questions to firstname.lastname@example.org. Thank you for watching.
Abhishek Gupta has 10+ years of experience in the domain of high-performance computing, cloud, and security. Currently, he's leading an innovation team at the Schlumberger Software Technology Innovation Center and is also a visiting faculty member at Santa Clara University where he teaches a graduate course in cloud computing. Gupta has a Ph.D. in Computer Science from the University of Illinois at Urbana Champaign.