Access
Google IDaaS (IDentity as a Service)
Using Existing IdP
Active Directory / Google Cloud Directory Sync (GCDS)
Hybrid Environment
Federating Google Cloud
Automated Provisioning
Configuration Manager
Group
Dynamic Group
Creating and Updating
Automated membership
Manage Group Using API
Security Group
Transfer Consumer Accounts (Unmanaged Users)
Federating Identity
Service Account
Short-lived Credentials
Restricting service account
Manage Service Account Keys
Using Service Account with GCE
Put credentials in the config
Delegation & Impersonation
Undelete Service Account
API security
Cloud Functions security
IAM (Authentication & Authorization)
SSO
Setup SSO
Setup SSO via 3rd Party IdP
SAML with Apigee
Roles
Basic Roles
Predefined Roles
Billing
App Engine
Organization Role Administrator
Custom Role
Access Control
Organization
Folder
Project
Resource
GCS (Google Cloud Storage)
GAE (Google App Engine)
GCE (Google Compute Engine)
Resource Manager
Resource hierarchy
Create and Manage Organization
Cloud Asset Inventory
Shared Responsibility Matrix
Network Security
Network design
Load Balancer
HTTP(s) Load Balancing
External TCP Proxy Load Balancing
SSL Load Balancing
Cloud Armor (WAF)
DDOS Protection
Internal / External IP Address
Firewall / GCE Security Policy
Rule with Service Account
Rule with Tag
Zero Trust
IAP (Identity-Aware Proxy)
Cloud DNS
DNSSEC (Domain Name System Security Extensions)
Cloud Migration
Lift and Shift
Improve and Move
Remove and Replace (Rip and Replace)
Cloud Adoption Framework
Network segmentation
VPC Design
Isolate Data
Isolate with Service Account
DNS Zone
DNS Peering
Forwarding Zone
Peering Zone
Private connection
External
From/To on-premise
Cloud Interconnect
Dedicated Interconnect
Partner Interconnect
Cloud VPN / IPSEC
Cloud NAT
Internet Access from VPC
Internal
VPC Peering
Shared VPC
Google API (Private Google Access)
DNZ Private Zone
Restrict External IP address to VM
Data Protection
IAM Condition
Cloud DLP
InfoTypes
Built-in
Custom
Redaction (e.g., PII)
De-identification
Pseudonymization
Generalization
Date Shifting
Google Vision API
Video Intelligence API
Google Cloud Natural Language API
Inspecting Storage
Sampling
Data Exfiltration Prevention
BigQuery Datasets
Authorized Views
Authorized Datasets
Exporting Data
VPC Service Control
Perimeter Bridge
Example
Context Aware
Example
Service Perimeter
Example
Secrets and Key Management
Cloud KMS
Key Rotation
Key Version State
Encryption
IAM (Segregation of Duties)
Secrets Manager
Access Control
Third Party Secret Management
Detecting Security Keys in Source Repositories
VM
VM Metadata Protection
VM Instance Groups
Encryption
Encryption at Rest
Google default encryption
Customer-Managed Encryption Keys (CMEK)
Customer-Supplied Encryption Keys (CSEK)
External Key Manager (EKM)
Cloud HSM
Storage Classes
Object Lifecycle Management
Confidential VM
Envelope Encryption
Encryption in Transit
Data deletion
Security Operations
SecDevOps - Build and deploy infra and apps
Web Security Scanner
Shielded VM
Image Management
Image Management Best Practices
Secure Boot
Virtual Trusted Platform Module (vTPM)
Measured Boot & Integrity Monitoring
Container Security (Build and Deploy)
Binary Authorization
Container Registry (Container Analysis and Vulnerability Scanning)
Base Images
Google-manage base Images
Custom base Images (secure image pipeline)
Build small container images
Trusted Images
Cluster Hardening
Best Practices for Building Containers
GKE Security
Secure Data Workloads
Overview
GCP Products
Use Case
Isolate Workloads
Threat Modelling
Logging
Cloud Audit Log
Admin Activity Logs
System Event Logs
Data Access Logs
Data Access Audit Logs
BigQuery Data Access Audit Logs
Policy Denied Logs
GKE Logs
Cloud Logging
Docker-explorer
Kubectl Sysdig
Access Transparency Logs
Agent Logs
VPC Flow Logs
Log Retention Compliance
Exporting Logging
To External SIEM
Configure Logging Agent
Monitoring and Detection
Security Command Center
Event Threat Detection
Notification
Alert
Connecting to AWS Account
Cloud Trace
Cloud Debugger
Cloud Profiler
Forseti Security
Architecture
Best Practice
Backup and DRP
Cloud Bigtable Replication
Cloud Storage
Log Analysis
Compliance
Data Classification
Data Retention
Google Cloud Storage
Data Inspection
Standards
HIPAA
Healthcare API
Google Cloud Healthcare Data Protection Toolkit
FedRAMP High
SOX
PCI DSS
ISO 27018
FIPS 140-2 Validated
GDPR
COPPA (Children Online Privacy Protection Act) - 1998
Google Cloud Security Videos
Courses (Need Subscription)
Checklists and Cheatsheets
Exam Recap & Practice