ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 175 - Professional Cloud Developer discussion

Report
Export

You are developing an application that consists of several microservices running in a Google Kubernetes Engine cluster. One microservice needs to connect to a third-party database running on-premises. You need to store credentials to the database and ensure that these credentials can be rotated while following security best practices. What should you do?

A.
Store the credentials in a sidecar container proxy, and use it to connect to the third-party database.
Answers
A.
Store the credentials in a sidecar container proxy, and use it to connect to the third-party database.
B.
Configure a service mesh to allow or restrict traffic from the Pods in your microservice to the database.
Answers
B.
Configure a service mesh to allow or restrict traffic from the Pods in your microservice to the database.
C.
Store the credentials in an encrypted volume mount, and associate a Persistent Volume Claim with the client Pod.
Answers
C.
Store the credentials in an encrypted volume mount, and associate a Persistent Volume Claim with the client Pod.
D.
Store the credentials as a Kubernetes Secret, and use the Cloud Key Management Service plugin to handle encryption and decryption.
Answers
D.
Store the credentials as a Kubernetes Secret, and use the Cloud Key Management Service plugin to handle encryption and decryption.
Suggested answer: D

Explanation:

https://cloud.google.com/kubernetes-engine/docs/how-to/encrypting-secrets

By default, Google Kubernetes Engine (GKE) encrypts customer content stored at rest, including Secrets. GKE handles and manages this default encryption for you without any additional action on your part.

Application-layer secrets encryption provides an additional layer of security for sensitive data, such as Secrets, stored in etcd. Using this functionality, you can use a key managed with Cloud KMS to encrypt data at the application layer. This encryption protects against attackers who gain access to an offline copy of etcd.

asked 18/09/2024
Ben Johnson
34 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first