Module 3: Securing Cloud Data: Techniques and Best Practices

Looking for ‘Security Best Practices in Google Cloud Module 3 Answers’?

In this post, I provide complete, accurate, and detailed explanations for the answers to Module 3: Securing Cloud Data: Techniques and Best Practices of Course 10: Security Best Practices in Google Cloud – Preparing for Google Cloud Certification: Cloud Security Engineer Professional Certificate.

Whether you’re preparing for quizzes or brushing up on your knowledge, these insights will help you master the concepts effectively. Let’s dive into the correct answers and detailed explanations for each question!

Module Quiz

Graded Assignment

1. Which TWO of the following statements are TRUE when discussing Cloud Storage and IAM permissions?

  • Using deny rules prevent certain principals from using certain permissions, regardless of the roles they’re granted. ✅
  • Access can be granted to Cloud Storage at the organization, folder, project, or bucket levels. ✅
  • Using IAM permissions alone gives you control over your projects, buckets, and individual objects.
  • A user needs permission from both IAM or an ACL to access a bucket or object.

Explanation:

  • Deny rules override allow rules in IAM, making them a powerful way to block access.
  • IAM allows hierarchical access management: org > folder > project > bucket.

2. Which TWO of the following statements are TRUE when discussing storage and BigQuery best practices?

  • Do not use any personally identifiable information as object names. ✅
  • One option to serve content securely to outside users is to use signed URLs. ✅
  • BigQuery data can be adequately secured using the default basic roles available in Google Cloud.
  • In most cases, you should use Access Control Lists (ACLs) instead of IAM permissions.

Explanation:

  • Object names can show up in logs and URLs, so avoid PII in names.
  • Signed URLs are secure, time-limited links to share private objects.

3. Which TWO of the following statements is TRUE with regards to security in BigQuery and its datasets?

  • A BigQuery Authorized View allows administrators to restrict users to viewing only subsets of a dataset. ✅
  • Using IAM, you can grant users granular permissions to BigQuery tables, rows and columns.
  • BigQuery has its own list of assignable IAM roles. ✅
  • It is always better to assign BigQuery roles to individuals as this will help to lower operational overhead.

Explanation:

  • Authorized Views can expose only specific columns or filtered data from a dataset.
  • BigQuery provides predefined IAM roles like roles/bigquery.dataViewer, dataEditor, etc.

Leave a Reply