Security Flashcards

1
Q

Cloud Armor

A

WAF - web application firewall
Layer 7 web app firewall
Prevents DDoS, cross site scripting, SQL injections attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Service account email format

A

[name]@[project_id].[service name].gserviceaccount.com

[name]@appspot.gserviceaccount.com

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

IAM Conditions

  • Definition
  • Language conditions expressed in
A

Access control based on attributes of a resource

Common Expression Language (CEL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Network Tags

A

User level annotation for Compute Engine resources

Used to define security groups, network segment, firewall rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Resource Tags

A

Key value pairs that can be attached to an org, folder, project

Can be used to conditionally allow or deny policies based on whether a resource has a specific tag

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Security Marks

A

Security Command Center annotations for findings and assets for searching, selecting, filtering
Can group marks for policy, integration with workflow, flag for priority, access level, sensitivity classification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Labels

A

User level annotation, metadata for resources
Used for billing and admin
Not inherited by children resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

IAM policies written in what format

A

JSON

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Clou IAM API functions (3)

A

Set policies on resources
Read policies on resources
Test whether an identity has a permission on a resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

IAM Conditions resource attributes (3)

A

Type of resource
Resource name
Tags attached to resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

IAM conditions request attributes (3)

A

Access level
Date and time
Destination IP and port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Identity Aware Proxy

A

Layer 7 based access control for HTTP requests
IAP protected resources can only be accessed via proxy by principal with correct IAM role
Allows fine grained access control and user grouping without requiring VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Organization policy constraint

A

Rule that prevents action or configuration on service or group of services
Implemented across an org

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Data at rest encryption occurs at which levels (3)

A

Platform - database and file data

Infrastructure - data grouped into data chunks in storage system

Hardware - storage device itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Infrastructure level encryption

  • keys used
  • encryption type
A

DEK
KEK
AES256

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Data in transit encryption

  • Data outside Google network (1)
  • Data inside Google network (2)
A

Data outside Google network - authenticated but not necessarily encrypted

Data inside Google network

  • HTTP/HTTPS to GFE - TLS or QUIC
  • Within GCP infrastructure - ALTS for authentication and encryption
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Default encryption keys used

A

Google issued and managed DEK and KEK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Cloud KMS

  • Definition
  • Key type
  • Keys from
  • Key managed by
  • Key rotation
A
Hosted key management
AES, RSA, EC
Customer generated or imported keys
Customer managed by Google hosted
Auto key rotation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Cloud HSM

  • Definition
  • Key type supported
A

GCP hosted HSM to host keys and perform cryptographic operations in a cluster of FIPS 140-2 Level 3 certified HSMs
Cloud KMS as frontend

20
Q

CMEK

A

Cloud managed encryption keys

Keys managed by customers using Cloud KMS

21
Q

Cloud EKM

A

Cloud External Key Manager

Allows customers to manage keys outside GCP and use Cloud KMS to use keys

22
Q

OS Login

A

Enabled through VM instance custom metadata
For SSH access to VM
Ties Linux accounts to Google identities and Cloud IAM

23
Q

Common uses for Organization Policy constraints (3)

A

Limit resources sharing based on domain
Limit usage of IAM service accounts
Restrict physical location of newly created resources

24
Q

Ways to restrict access to resources (4)`

A

Organization Policy Services
Tags
IAM Conditions
VPC Service Controls

25
VPC Service Control
Clients within perimeter do not have access to resources outside Data can't be copied to unauthorized resources Data exchanged between clients and resources separated by perimeter secured via ingress and egress rules
26
Confidential computing services (3)
Confidential VMs Confidential GKE Nodes Dataproc Confidential Compute
27
Confidential VM
Encrypts memory to protect data in use Isolates guests and hypervisor Provides vTPM attestation everytime AMD SEV boots
28
K8 Role Based Access Control
K8 mechanism for fine grained access control to any object or type of object in cluster, or in specific Namespace in cluster
29
BeyondCorp Enterprise
Google's zero trust solution Context based user and device authorization and authentication
30
Cloud IDS
Creates Google managed peered network that has mirrored VMs Palo Alto Networks threat protection technology to mirror and inspect traffic For detecting network intrusions and app performance
31
Workload Identity
Allows K8 service account in GKE cluster to act as an IAM service account. Pods authenticate as IAM service account when accessing Google Cloud APIs
32
Which services support CSEK
Compute Engine | Cloud Storage
33
Acccess Transparency Log
Logs of actions by Google staff when accessing customer content
34
CMEK and CSEK used to encrypt what for Cloud Storage objects (3)
Object data Object's CRC32C checksum Object's MD5 hash
35
reCAPTCHA Enterprise
Finds Bots | provides risk score for progressive action based on risk
36
Web App and API Protection solution components (3)
Cloud Armor reCAPTCHA Enterprise API Security with Apigee
37
Secure Software Development Lifecycle with GCP - End to End Policy Services
Cloud Code Cloud Build Artifact Registry
38
Secure Software Development Lifecycle with GCP - Binary Auth Services
Cloud Deploy | Run - cloud run, cloud functions, GKE
39
Container Analysis service
Provides vulnerability scanning for containers in Artifact Registry and Container Registry Continual analysis
40
Binary Authorization works for which GCP platforms (4)
Cloud Run GKE Anthos Service Mesh Anthos clusters on VMware
41
Shielded VM
VMs with firmware that secures boot
42
Security Command Center
Cloud Asset Inventory - find, monitor, analyze GCP assets Security Health Analytics - Identifies misconfigurations and baselines Web Security Scanner - Finds web app vulnerabilities Event Threat Detection - Finds threats via platform logs Container Threat Detection - Finds top suspicious activity in container deployments
43
Open Source Insights
Tool to see dependencies, security advisory, license across open source code
44
Device Management
API to manage corporate devices and control corporate data on devices
45
Safe Browsing / Web Risk API
Lets client apps check URLs against Google's list of unsafe web resources
46
Titan C
Chip to protect users against phishing attacks Enables 2 factor auth Protects OS from tampering **Chrome devices
47
Web Security Scanner
Crawls app following all links and URLs and attempts to exercise user inputs and event handlers to look for vulnerabilities