Author Archives: anuj - Page 5
Cloud Storage – Granting access to external users – e.g. Auditors
The simplest thing to do is to create signed URLs (same as what you would do on AWS S3 buckets). The URL can be for the entire bucket or for…
Google App Engine Flex versus Standard
GAE Flex lets you access the underlying OS.
Cloud Identity versus Google Workspace
User management in Workspace occurs through (not a cloud console) However, with cloud identity, you can now manage users directly from the GCP console. This means that there are two…
Synchronizing Users versus Federating Users in GCP
From your Corporate AD, you have two options to bring your users into GCP Federation = Use Cloud Identity to accomplish this Synchronization = Use GCP Cloud Directory Sync Service…
Customer supplied keys and cloud storage
There is often a data compliance requirement - to use your own corporate provided encryption keys. If you want to user your own supplied encryption keys, you HAVE to use…
Organizations in GCP versus Organizations in AWS
What are organizations in GCP used for? Organizations in GCP are used to group resources - not to federate identities ( AWS Control Tower). You can connect VPCs in two…
Object level permissions in GCP Storage
How do you ensure that individual Object level permissions can be set in GCP Storage? Disable Uniform Access (set Fine Grained Access to true). This will allow you to use…
Scopes and GCP Service Accounts
Scopes let you control what services / APIs can be called from DEFAULT service accounts. Only Default SAs get to be defined by scopes (since their default scope can be…
Centralized Logging in GCP – Log Analytics Buckets
Logs - Platform Logs, Application Logs and Networking Logs Platform Logs - are three types of auditable activities: Data Access, Admin Activity, and System Event activity. And thus, there are…
VM Instance Level Metrics in GCP
GCP VM Level Monitoring metrics Active Metric Categories Firewall Metrics - Remember that FW rules are applied at the instance level in GCP. So Ingress Bytes and Egress Bytes are…