
Ultimate access to all questions.
How can you restrict access to a Cloud Storage bucket containing sensitive data in Google Cloud project XYZ, so that only instances within VPCs belonging to project XYZ can access the bucket's contents?
A
Configure Private Google Access to privately access the Cloud Storage service using private IP addresses.
B
Configure a VPC Service Controls perimeter around project XYZ, and include storage.googleapis.com as a restricted service in the service perimeter.
C
Configure Cloud Storage with projectPrivate Access Control List (ACL) that gives permission to the project team based on their roles.
D
Configure Private Service Connect to privately access Cloud Storage from all VPCs under project XYZ.
Explanation:
The correct answer is B. VPC Service Controls create a service perimeter around project XYZ, restricting access to the Cloud Storage bucket (via storage.googleapis.com) only to resources within the perimeter. This ensures that only instances in VPCs under project XYZ can access the data, even if external entities have valid credentials.
VPC Service Controls (B) enforce network-level isolation, making it the correct solution.