Author Archives: anuj - Page 34
GCP BigQuery and CIS Compliance (CIS Compliance benchmarks)
Certain CIS benchmarks are applicable to BigQuery. Leaving a dataset as PUBLIC (IAM policy allowing ANYONE to access a dataset) is the allUsers -> Represents anyone of the internet allAuthenticatedUsers…
Breakglass Role in GCP
This content is password protected. To view it please enter your password below: Password:
Subnets in GCP
This content is password protected. To view it please enter your password below: Password:
Packet Filtering Options versus Packet Monitoring Options
All public clouds will provide a packet monitoring option in the way of flow logs (VPC Flow Logs) However, packet monitoring is not the same as packet filtering. The closest…
IAM + VPC Service Controls = GCP 2 minute Security Solution
Also read - Identity Aware Proxy in GCP Overview IAM is the most often misconfigured and compromised service. To that end, GCP provides two unique services (boundaries) that go beyond…
F5 Big IP on GCP – Part 2 – Some Advanced Scenarios
HA versus LB Configuration of F5 F5 can be set up on GCP using a High Availability ( HA ) Configuration as well as a Load Balancing Configuration (using GCP's…
Endpoint Protection in GCP
Cloud Armor is the first line of defense for GCP Cloud Endpoint Security
Logging in GCP – A Quick Overview
Also Read Types of GCP Logs Logging, Monitoring, Debugging, Tracing are all part of Stackdriver (aka Operations Suite) Project level Logging by default. Multi Level Project View or Single Project…
Google Workspaces vs GSuite
Remember that you get a month of free workspace (including a valid email) before you commit. Easy to try adding new org units and enabling credentials apis GSuite is basically…
Identity Aware Proxy in GCP
This content is password protected. To view it please enter your password below: Password: