Your company uses Google Cloud and has publicly exposed network assets. You want to discover the assets and perform a security audit on these assets by using a software tool in the least amount of time.
What should you do?
A.
Run a platform security scanner on all instances in the organization.
B.
Identify all external assets by using Cloud Asset Inventory, and then run a network security scanner against them.
C.
Contact a Google approved security vendor to perform the audit.
D.
Notify Google about the pending audit, and wait for confirmation before performing the scan.
The most efficient approach to discover publicly exposed network assets and perform a security audit on them in the least amount of time is:
B. Identify all external assets by using Cloud Asset Inventory, and then run a network security scanner against them.
Here's why Option B is the recommended choice:
Cloud Asset Inventory: Using Cloud Asset Inventory allows you to quickly identify all the external assets and resources in your Google Cloud environment. This includes information about your projects, instances, storage buckets, and more. This step is crucial for understanding the scope of your audit.
Network Security Scanner: Once you have identified the external assets, you can run a network security scanner to assess the security of these assets. Network security scanners can help identify vulnerabilities and potential security risks quickly.
Option A (Running a platform security scanner on all instances) might be time-consuming, especially if you have a large number of instances, and it doesn't address other types of publicly exposed assets besides instances.
Option C (Contacting a Google-approved security vendor) is a valid option, but it may introduce delays as you wait for the vendor's availability. It's also likely to involve additional costs.
Option D (Notifying Google about the pending audit) is not a typical step for performing a security audit on your own network assets. It's more applicable if you're engaging with Google for a security review or penetration testing but not for a self-initiated audit.
B. Identify all external assets by using Cloud Asset Inventory, and then run a network security scanner against them.
Cloud Asset Inventory allows you to see all of your Google Cloud assets. By using it, you can quickly identify which assets are externally accessible. Once identified, you can then run a specialized network security scanner against only these assets, making the process efficient.
C. Contact a Google approved security vendor to perform the audit.
While using an external vendor can be beneficial for thoroughness, it may not meet the criteria of accomplishing the task in the "least amount of time."
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Bettoxicity
6 months, 3 weeks agoXoxoo
1 year, 1 month agoXoxoo
1 year, 1 month agocyberpunk21
1 year, 2 months agoanshad666
1 year, 2 months agopfilourenco
1 year, 2 months ago