Google Professional Cloud Developer

Google Professional Cloud Developer

Get started today

Ultimate access to all questions.


You are developing an application with multiple microservices deployed in a Google Kubernetes Engine (GKE) cluster. One microservice requires a connection to an on-premises third-party database. How should you securely store and manage the database credentials while enabling credential rotation in alignment with security best practices?




Explanation:

The question focuses on securely storing and rotating credentials for a third-party database. Kubernetes Secrets are the recommended way to handle such sensitive data. However, using Google Cloud Key Management Service (KMS) for encryption ensures that the Secrets are encrypted with a managed key, adhering to security best practices. This setup allows credentials to be rotated by updating the Secret while leveraging Cloud KMS for encryption lifecycle management. Options A and C involve less secure storage methods (sidecar containers or volumes) without built-in key rotation. Option B relates to network traffic control, not credential management.