
Answer-first summary for fast verification
Answer: Provision Cloud KMS in its own project., Grant an owner role for the Cloud KMS project to a different user than the owner of the project where the keys from Cloud KMS are being used.
The question requires adhering to the 'separation of duties' principle and Google's best practices for Cloud KMS. - **Option A** is correct because provisioning Cloud KMS in its own project isolates key management, allowing stricter access controls and reducing the risk of unintended access to keys. This aligns with Google's recommendation to centralize key management in a dedicated project. - **Option E** is correct because assigning a different owner for the Cloud KMS project ensures that the management of keys (KMS project owner) is separate from the usage of keys (application project owner), enforcing separation of duties. - **Option C** is incorrect because co-locating KMS in the same project as resources using keys risks combining access, violating separation of duties. - **Options B and D** are incorrect: projects require at least one owner (B is invalid), and granting cloudkms.admin to the application project owner (D) would centralize control, conflicting with separation of duties. - **Option E** directly addresses the separation by ensuring distinct ownership.
Author: LeetQuiz Editorial Team
Ultimate access to all questions.
To comply with your company's security initiative requiring customer-managed encryption keys for all Google Cloud data, you plan to use Cloud Key Management Service (KMS) while adhering to the "separation of duties" principle and Google's best practices. What are two actions you should take? (Choose two.)
A
Provision Cloud KMS in its own project.
B
Do not assign an owner to the Cloud KMS project.
C
Provision Cloud KMS in the project where the keys are being used.
D
Grant the roles/cloudkms.admin role to the owner of the project where the keys from Cloud KMS are being used.
E
Grant an owner role for the Cloud KMS project to a different user than the owner of the project where the keys from Cloud KMS are being used.
No comments yet.