Your project is using Bigtable to store data that should not be accessed from the public internet under any circumstances, even if the requestor has a valid service account key. You need to secure access to this data. What should you do?
A.
Use Identity and Access Management (IAM) for Bigtable access control.
B.
Use VPC Service Controls to create a trusted network for the Bigtable service.
C.
Use customer-managed encryption keys (CMEK).
D.
Use Google Cloud Armor to add IP addresses to an allowlist.
B
While IAM enables granular identity-based access control, VPC Service Controls enables broader context-based perimeter security, including controlling data egress across the perimeter. We recommend using both VPC Service Controls and IAM for defense in depth.
https://cloud.google.com/vpc-service-controls/docs/overview#how-vpc-service-controls-works
B.
A is wrong because you might have the right credentials but still access Bigtable across the internet. Same is true for C. Cloud Armor could help, but VPC Service Controls is a classic use case of ensuring access is only from within certain VPC networks. From Google’s documentation, “Users can define a security perimeter around Google Cloud resources such as Cloud Storage buckets, Bigtable instances, and BigQuery datasets to constrain data within a VPC and control the flow of data.”
https://cloud.google.com/vpc-service-controls
B: Use VPC Service Controls to create a trusted network for the Bigtable service.
upvoted 1 times
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Zek
5 days, 10 hours agodynamic_dba
1 year, 8 months agochelbsik
1 year, 11 months agopk349
1 year, 11 months ago