ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 76 - 312-40 discussion

Report
Export

An organization wants to implement a zero-trust access model for its SaaS application on the GCP as well as its on-premises applications. Which of the following GCP services can be used to eliminate the need for setting up a company-wide VPN and implement the RBAC feature to verify employee identities to access organizational applications?

A.
Cloud Endpoints
Answers
A.
Cloud Endpoints
B.
Identity-Aware Proxy (IAP)
Answers
B.
Identity-Aware Proxy (IAP)
C.
Cloud Security Scanner
Answers
C.
Cloud Security Scanner
D.
Web Application and API Protection
Answers
D.
Web Application and API Protection
Suggested answer: B

Explanation:

1.Zero Trust Access Model: The zero-trust model is a security concept centered on the belief that organizations should not automatically trust anything inside or outside its perimeters and instead must verify anything and everything trying to connect to its systems before granting access1.

1.Eliminating VPNs: The zero-trust model can be implemented without the need for traditional VPNs by using cloud services that verify user identities and device security status before granting access to applications1.

1.Identity-Aware Proxy (IAP): Google Cloud's IAP enables the control of access to applications running on GCP, GKE, and on-premises, based on identity and context of the request (such as the user's identity, device security status, and IP address)1.

1.Role-Based Access Control (RBAC): IAP supports RBAC, which allows organizations to enforce granular access controls based on roles assigned to users within the organization2.

1.Benefits of IAP: By using IAP, organizations can secure their applications by ensuring that only authenticated and authorized users are able to access them. IAP works as a building block for a zero-trust approach on GCP1.

Google Cloud's explanation of applying zero trust to user access and production services1.

Google Cloud's documentation on Role-Based Access Control (RBAC)2.

asked 18/09/2024
Niels de Lange
38 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first