Curriculum
Course: Google Cloud Security Best Practices
Login

Curriculum

Google Cloud Security Best Practices

2 - Ensure that IAM policies do not grant access to personal email accounts

0/1

3 - Enable Multi-Factor Authentication (MFA) for All User Accounts

0/1

4 - Enforcing Security Key Usage for Admin Accounts

0/1

5 - Preventing the Use of User-Managed Service Account Keys

0/1

6 - Restricting Service Account Permissions

0/1

7 - Rotate KMS Encryption Keys Regularly

0/1

8 - Preventing Public Access to Cloud Storage Buckets

0/1

9 - Enable Uniform Bucket-Level Access

0/1

10 - Enable VPC Flow Logs for Subnets

0/1

11 - Block Project-Wide SSH Keys

0/1

12 - Disabling Serial Port Access for VM Instances

0/1

13 - Avoid Using Default Service Accounts

0/1

14 - Limiting API Access for Service Accounts

0/1

15 - Enabling OS Login for VM Instances

0/1

16 - Enabling Cloud Audit Logging

0/1

17 - Configuring Log Sinks for All Log Entries

0/1

18 - Setting Retention Policies on Log Buckets

0/1

19 - Enforcing HTTPS for App Engine Applications

0/1

20 - Require SSL for Cloud SQL Connections

0/1

21 - Restricting Public IP Access to Cloud SQL Instances

0/1

22 - Enabling Automated Backups for Cloud SQL

0/1

23 - Preventing Public Access to BigQuery Datasets

0/1

24 - Disabling IP Forwarding on VM Instances

0/1
Video lesson

1 -Ensure that IAM policies do not grant access to personal email accounts