Google Associate Cloud Engineer

Google Associate Cloud Engineer

Get started today

Ultimate access to all questions.


During a mock audit of your GCP environment by your security team at a large fin-tech company, they inquire about who can access data stored in the production GCP project. What is the most appropriate action to take?




Explanation:

The correct answer is D because reviewing IAM permissions is essential to determine who has read access to data in the production GCP project. IAM provides detailed access control and permission management for GCP resources, making it the most direct method to identify users with data access.

  • A is incorrect as creating a Data Loss Prevention job focuses on detecting and protecting sensitive data rather than identifying who can access it.
  • B is incorrect because Identity-Aware Proxy settings are not universally applicable across all services (e.g., Cloud Storage) and do not provide a comprehensive view of data access permissions.
  • C is incorrect because enabling Audit Logs records activities but does not directly show who has access to the data.

For more information, visit: Google Cloud IAM Documentation.