Skip to content

Latest commit

 

History

History
554 lines (484 loc) · 21.5 KB

File metadata and controls

554 lines (484 loc) · 21.5 KB

Google Professional Cloud Security Engineer Study Notes

Overview

The Professional Cloud Security Engineer certification focuses on designing and implementing secure workloads and infrastructure on Google Cloud. The exam tests your ability to:

  • Configure secure access management
  • Establish secure network boundaries
  • Ensure proper data protection
  • Manage security operations
  • Support compliance requirements

Helpful resources:

Section 1: Configuring Access (~25% of exam)

1.1 Managing Cloud Identity

  • Google Cloud Directory Sync (GCDS):
    • Synchronizes users and groups from existing LDAP/Active Directory to Google Cloud
    • Doesn't migrate passwords; only syncs identity information
  • Single Sign-On (SSO):
    • Configure SAML 2.0 with third-party IdPs like Okta, Azure AD, etc.
    • Allows for centralized authentication management
  • Super Administrator Account:
    • Highest privilege role in Google Workspace/Cloud Identity
    • Best practices:
      • Have at least 2 super admin accounts (for redundancy)
      • Use separate accounts from daily operations
      • Enable 2-step verification
      • Review super admin actions regularly
  • User Lifecycle Management:
    • Automate using Cloud Identity API
    • Implement automated onboarding/offboarding workflows
    • Use Google Groups for managing role-based access
  • Programmatic Administration:
    • Use Directory API, Admin SDK, Cloud Identity API
    • Implement scripts to automate user/group management
  • Workforce Identity Federation:
    • Allows 3rd party identity provider access to Google Cloud services
    • No need to sync users to Cloud Identity
    • Configure trust between Google Cloud and external IdP
    • Map attributes from IdP to Google Cloud

Helpful links:

1.2 Managing Service Accounts

  • Service Account Security Best Practices:
    • Treat service accounts like user accounts (or more strictly)
    • Delete unused default service accounts
    • Follow least privilege principle
    • Regularly audit service account permissions
  • Use Cases for Service Accounts:
    • Running applications on Compute Engine, GKE
    • Executing administrative tasks from scripts/applications
    • Service-to-service authentication
    • Delegating domain-wide authority in Google Workspace
  • Service Account Management:
    • Create only when necessary
    • Disable unused accounts
    • Use IAM roles to authorize service accounts
  • Service Account Keys Management:
    • Avoid keys when possible (use other auth methods)
    • Rotate keys regularly
    • Store keys securely (Secret Manager)
    • Monitor key usage
    • Audit key creation and downloads
  • Short-lived Credentials:
    • Prefer over long-lived keys
    • Use Service Account Token Creator role
    • Implement with signJwt or signBlob IAM methods
  • Workload Identity Federation:
    • Allow applications outside Google Cloud to use IAM
    • Configure identity pool and provider
    • Map external identity to service account
  • Service Account Impersonation:
    • Temporarily assume service account permissions
    • Use --impersonate-service-account in gcloud
    • Grant Service Account Token Creator role

Helpful links:

1.3 Managing Authentication

  • Password and Session Management:
    • Define password complexity requirements
    • Set password expiration policies
    • Configure session timeouts
    • Implement password reset procedures
  • SAML and OAuth:
    • Set up SAML for enterprise IdP integration
    • Configure OAuth for third-party application access
    • Understand token-based authentication flows
  • 2-Step Verification:
    • Enforce MFA for all users
    • Support multiple authentication factors (phone, security key, etc.)
    • Configure verification frequency
    • Set up backup codes process

Helpful links:

1.4 Managing Authorization Controls

  • IAM Roles and Permissions:
    • Basic roles: Owner, Editor, Viewer (avoid when possible)
    • Predefined roles: Service-specific roles with curated permissions
    • Custom roles: Build your own permission sets
  • Separation of Duties:
    • Split sensitive permissions across multiple roles
    • Ensure no single individual can perform all critical functions
    • Establish approval workflows for sensitive operations
  • IAM Conditions:
    • Apply conditional logic to IAM policies:
      • Time-based access
      • Resource attribute-based
      • Request attribute-based
  • IAM Deny Policies:
    • Explicitly deny permissions
    • Override allow policies
    • Set at organization/folder level
  • Resource Hierarchy:
    • Organization → Folders → Projects → Resources
    • Define access at each level
    • Apply principle of least privilege
  • Access Context Manager:
    • Define access levels based on attributes (IP, device, etc.)
    • Implement context-aware access control
    • Use with VPC Service Controls
  • Policy Intelligence:
    • Recommender for IAM
    • IAM Policy Analyzer
    • Policy Troubleshooter
    • Policy Insights
  • Group-based Permissions:
    • Assign roles to groups instead of individual users
    • Manage group membership centrally
    • Implement role-based access control
  • Privileged Access Manager:
    • Just-in-time access to sensitive resources
    • Time-bound elevation of privileges
    • Approval workflows for privileged access

Helpful links:

1.5 Defining Resource Hierarchy

  • Managing at Scale:
    • Use folders to organize projects by department, environment, etc.
    • Implement naming conventions
    • Utilize labels for resource categorization
  • Organization Policies:
    • Define constraints on resources
    • Implement guardrails (e.g., restrict resource creation in certain regions)
    • Pre-built or custom constraints
  • Inheritance Model:
    • Policies inherit down the hierarchy
    • Child policies can't remove parent restrictions
    • Most restrictive policy applies

Helpful links:

Section 2: Securing Communications and Boundary Protection (~22% of exam)

2.1 Designing Perimeter Security

  • Cloud NGFW (Next Generation Firewall):
    • Hierarchical firewall policies
    • Global and regional rules
    • Service perimeters
  • Identity-Aware Proxy (IAP):
    • Context-aware access to applications
    • Layer 7 protection for web apps and VMs
    • Centralized authentication and authorization
  • Load Balancers:
    • SSL/TLS termination
    • Certificate management
    • Health checks and traffic distribution
  • Certificate Authority Service:
    • Deploy and manage private CAs
    • Issue certificates for internal services
    • Integrate with Certificate Manager
  • Layer 7 Inspection:
    • Application-level filtering
    • Content inspection
    • Protocol validation
  • Private vs Public IP Addressing:
    • Internal vs external IP allocation
    • When to use each type
    • Security implications
  • Google Cloud Armor:
    • DDoS protection
    • WAF capabilities
    • Pre-configured and custom rules
    • Edge protection
  • Secure Web Proxy:
    • URL filtering
    • TLS inspection
    • Data loss prevention
    • Centralized egress control
  • Cloud DNS Security:
    • DNS Security Extensions (DNSSEC)
    • Private DNS zones
    • DNS policies and logging
  • API Monitoring and Restriction:
    • Service usage monitoring
    • API key restrictions
    • Quota management
    • Service control policies

Helpful links:

2.2 Configuring Boundary Segmentation

  • VPC Security Properties:
    • Subnet configuration
    • Private Google Access
    • Custom routes
    • Flow logs
  • VPC Peering:
    • Connect VPCs without exposing to internet
    • No transitive peering
    • Security considerations
  • Shared VPC:
    • Centralized network administration
    • Service project access controls
    • Host project permissions
  • Firewall Rules:
    • Hierarchical firewall policies
    • Network tags
    • Service accounts in rules
    • Ingress/egress control
  • N-tier Application Isolation:
    • Network segmentation by function
    • Defense in depth approach
    • Data flow controls
  • VPC Service Controls:
    • Service perimeters
    • Access levels
    • Ingress/egress policies
    • Mitigate data exfiltration risks

Helpful links:

2.3 Establishing Private Connectivity

  • VPC Network Connectivity:
    • Shared VPC
    • VPC peering
    • Private Google Access for on-premises
  • Private Connectivity to Data Centers:
    • Cloud VPN (High Availability)
      • Site-to-site encrypted tunnels
      • BGP for dynamic routing
    • Cloud Interconnect
      • Dedicated Interconnect (physical)
      • Partner Interconnect (via provider)
      • VLAN attachments
  • Private Access to Google APIs:
    • Private Google Access
    • Private Service Connect
    • Restricted Google Access
  • Cloud NAT:
    • Source NAT for outbound connections
    • Configure for VMs without external IPs
    • Regional service with redundancy

Helpful links:

Section 3: Ensuring Data Protection (~23% of exam)

3.1 Protecting Sensitive Data

  • Sensitive Data Protection (SDP):
    • Data discovery for PII
    • De-identification techniques:
      • Masking
      • Tokenization
      • Redaction
    • Content inspection
    • Format-preserving encryption
  • Data Service Access Restrictions:
    • BigQuery authorized views and row-level security
    • Cloud Storage ACLs and signed URLs
    • Cloud SQL authorized networks and IAM
  • Secret Manager:
    • Centralized secret storage
    • Version control for secrets
    • IAM integration
    • Automatic rotation
  • Compute Instance Metadata:
    • Secure metadata server access
    • Custom metadata protection
    • Block project-wide SSH keys

Helpful links:

3.2 Managing Encryption

  • Encryption Types:
    • Google default encryption (always on)
    • Customer-managed encryption keys (CMEK)
    • Customer-supplied encryption keys (CSEK)
    • External Key Manager (EKM)
  • Key Management:
    • Cloud KMS for key management
    • Hardware Security Modules (Cloud HSM)
    • Key rotation policies
    • Key import procedures
  • Use Cases by Service:
    • Storage: CMEK, EKM
    • Compute: Encrypted disks, confidential computing
    • Databases: CMEK integration
  • Cloud Storage Lifecycle:
    • Automatic transition between storage classes
    • Retention policies
    • Object versioning
    • Lifecycle conditions
  • Confidential Computing:
    • Memory encryption with AMD SEV
    • Confidential VMs
    • Confidential GKE Nodes
    • Encrypted-in-use data processing

Helpful links:

3.3 Securing AI Workloads

  • AI/ML System Protection:
    • Data isolation
    • Model access controls
    • Training/serving security boundaries
  • Training Model Security:
    • IaaS-hosted (self-managed)
      • Secure compute environments
      • Network isolation
    • PaaS-hosted (managed)
      • Service-specific security controls
      • Integration with IAM
  • Vertex AI Security Controls:
    • CMEK encryption
    • VPC-SC integration
    • Private endpoints
    • IAM roles for model access

Helpful links:

Section 4: Managing Operations (~19% of exam)

4.1 Automating Security

  • Security Scanning in CI/CD:
    • Container vulnerability scanning
    • Code scanning tools
    • Artifact scanning
    • Automated remediation
  • Binary Authorization:
    • Image signature verification
    • Attestation authorities
    • Policy enforcement
    • Integration with GKE and Cloud Run
  • Automated Image Creation:
    • Hardening templates
    • Packer for VM images
    • Container image best practices
    • Patch management automation
  • Policy and Drift Detection:
    • Cloud Security Posture Management
    • Custom organization policies
    • Security Health Analytics
    • Configuration monitoring

Helpful links:

4.2 Logging, Monitoring, and Detection

  • Network Logs:
    • VPC Flow Logs
    • Cloud NGFW logs
    • Packet Mirroring
    • Cloud IDS
  • Logging Strategy:
    • Centralized log management
    • Log retention policies
    • Log aggregation
    • Cost optimization
  • Security Incident Response:
    • Detection mechanisms
    • Response playbooks
    • Remediation procedures
    • Post-incident analysis
  • Secure Log Access:
    • IAM for logs access
    • Separation of duties
    • Log-based metrics
  • External Log Export:
    • Log sinks to external SIEM
    • Pub/Sub integration
    • BigQuery analytics
    • Cloud Storage archival
  • Audit Logs:
    • Admin Activity logs (always on)
    • Data Access logs (configurable)
    • System Event logs
    • Policy Denied logs
  • Log Exports:
    • Project, folder, and org-level sinks
    • Aggregated sinks
    • Exclusion filters
    • Real-time exports
  • Security Command Center:
    • Threat detection
    • Security posture dashboard
    • Vulnerability management
    • Integration with Chronicle

Helpful links:

Section 5: Supporting Compliance Requirements (~11% of exam)

5.1 Regulatory and Industry Standards

  • Technical Compliance Needs:
    • Compute: Isolation, hardening
    • Data: Encryption, residency, retention
    • Network: Segmentation, encryption
    • Storage: Integrity, durability
  • Shared Responsibility Model:
    • Google responsibilities
    • Customer responsibilities
    • Service model variations (IaaS, PaaS, SaaS)
  • Compliance Controls:
    • Assured Workloads for regulated industries
    • Organization policies
    • Access Transparency
    • Access Approval
    • Data residency configuration
  • Determining Scope:
    • Resource inclusion/exclusion
    • Logical boundaries
    • Risk assessment
    • Compliance mapping
  • Compliance Mapping:
    • Mapping requirements to GCP services
    • Demonstrating control effectiveness
    • Documentation for audits
    • Continuous compliance monitoring

Helpful links:

Exam Preparation Tips

  • Focus on hands-on experience with key security services
  • Learn how to integrate multiple security controls
  • Understand the security implications of architectural decisions
  • Review Google Cloud Security best practices documentation
  • Practice implementing security controls across different resource types
  • Master IAM concepts and the resource hierarchy

Additional Helpful Resources: