1. Home
  2. Training Library
  3. GCP Security and Management Overview

GCP Security and Management Overview

Contents

keyboard_tab
Security and Management
2
Management Services
PREVIEW2m 10s

The course is part of this learning path

GCP Security and Access Management Overview
Overview
Difficulty
Intermediate
Duration
4m
Students
3
Description

This course takes a brief look at security and management concepts and the various GCP services that can be used to maintain security in your cloud environments and keep them running smoothly.

Intended Audience

This course is intended for anyone who wants to learn more about Google Cloud Platform.

Prerequisites

To get the most from this course, you should already have a good understanding of Google Cloud Platform components.

Transcript

Load Balancing works well for normal increases in network traffic, but what about when you’re hit by a Distributed Denial of Service, or DDoS, attack? You can use Cloud Armor, which integrates with Cloud Load Balancing.

Cloud Armor is a network security service, but there are many other layers of security in GCP. The most important is IAM, which stands for Identity and Access Management. Since identity is handled using an outside service, such as Cloud Identity or even Google accounts, IAM is really about access management. It lets you assign roles to users and applications. A role grants specific permissions, such as being able to create a VM instance.

Another important security area is encryption. GCP handles this very well because everything is encrypted by default. However, many organizations need to manage the encryption keys that are used to encrypt their data, especially to comply with certain security standards. Google provides Cloud Key Management to allow your organization to centrally manage your encryption keys.

A similar service is Secret Manager, which is a central place to store your API keys, passwords, certificates, and other secrets.

Finally, the Data Loss Prevention service helps you protect sensitive data. For example, if your user records contain credit card numbers, you could configure DLP to remove them before responding to a database query.

And that’s it for this brief overview of GCP’s security and access management services.

 

About the Author
Students
153792
Courses
85
Learning Paths
144

Guy launched his first training website in 1995 and he's been helping people learn IT technologies ever since. He has been a sysadmin, instructor, sales engineer, IT manager, and entrepreneur. In his most recent venture, he founded and led a cloud-based training infrastructure company that provided virtual labs for some of the largest software vendors in the world. Guy’s passion is making complex technology easy to understand. His activities outside of work have included riding an elephant and skydiving (although not at the same time).