LeetQuiz Logo
Privacy Policy•contact@leetquiz.com
© 2025 LeetQuiz All rights reserved.
Google Professional Cloud DevOps Engineer

Google Professional Cloud DevOps Engineer

Get started today

Ultimate access to all questions.


You are designing a new multi-tenant Google Kubernetes Engine (GKE) cluster for a customer who is concerned about risks from long-lived credentials. The customer mandates that each GKE workload should have the minimal Identity and Access Management (IAM) permissions, adhering to the principle of least privilege (PoLP). You must design an IAM impersonation solution while following Google's best practices. What is the correct approach?

Exam-Like



Explanation:

The correct approach to designing an IAM impersonation solution for a multi-tenant GKE cluster, following Google-recommended practices and the principle of least privilege (PoLP), involves using Workload Identity. Workload Identity allows you to assign specific Google service accounts to Kubernetes service accounts, which can then be mapped to individual workloads. This method eliminates the need for long-lived credentials by using short-lived tokens and ensures that each workload has only the permissions it needs. Option C correctly outlines this process: creating a Google service account, creating a Kubernetes service account in a Workload Identity-enabled cluster, linking them with the appropriate IAM role and annotation, and then mapping the Kubernetes service account to the workload. This approach is secure, scalable, and adheres to Google's best practices. Options A and B do not utilize Workload Identity and thus do not fully address the customer's concerns about long-lived credentials. Option D involves creating and managing service account keys, which introduces the risk of long-lived credentials and does not follow the recommended practices.

Powered ByGPT-5