
Explanation:
Grant IAM read-only access to users, and use default ACLs on the bucket.
Use signed URLs to generate time-bound access to objects.
Grant no Google Cloud Identity and Access Management (Cloud IAM) roles to users, and use granular ACLs on the bucket.
Create randomized bucket and object names. Enable public access, but only provide specific file URLs to people who do not have Google accounts and need access.
The best practices for securing sensitive data in GCS involve using IAM roles for internal access and signed URLs for temporary, controlled external access.
Ultimate access to all questions.
No comments yet.
Your company plans to transfer all documents from a secure internal NAS drive to a Google Cloud Storage (GCS) bucket. These documents contain personally identifiable information (PII) and sensitive customer data. Additionally, your company's tax auditors require access to certain documents. What security strategy would you recommend for the GCS bucket?
A
Create randomized bucket and object names. Enable public access, but only provide specific file URLs to individuals without Google accounts who need access.
B
Use signed URLs to generate time-bound access to objects.
C
Grant no Google Cloud Identity and Access Management (Cloud IAM) roles to users, and use granular ACLs on the bucket.
D
Grant IAM read-only access to users, and use default ACLs on the bucket.