Code360 powered by Coding Ninjas X Naukri.com. Code360 powered by Coding Ninjas X Naukri.com
Last updated: Aug 16, 2022

Security and Identity: Security

Security means protection and identity means identifying. This is the key concept of security and identity. Let's understand both concepts.
Access Transparency
This article incorporates the information about the access transparency feature supported in Google cloud and its various features.
Access Context Manager
This article incorporates the information about the Access Context Manager supported in Google cloud and its various features.
Binary Authorization
This article incorporates the information about the BInary Authorization that is a service used in Google Cloud and its various features that we can utilise.
Certificate Manager MEDIUM
In this blog we will discuss the Certificate Manager, its working,  deployment overview and different ways to manage certificates. Further we will also discuss certificate map entries, SSL certificates overview and its limitations.
Cloud Asset Inventory
In this article, we will discuss Cloud Asset Inventory, its key features, and its management. Further we have also discussed frequently asked questions.
Cloud Data Loss Prevention
This article explains Cloud Data Loss Prevention, its advantages and benefits. Further we have also discussed the use cases and some Frequently Asked Questions.
Cloud External Key Manager
This article covers everything you need to know about Google Cloud External Key Manager. It handles your keys outside of Google Cloud.
Author Shiva
0 upvotes
Cloud HSM
This article covers everything you need to know about Google Cloud Hardware Security Module (HSM). It is a cloud-hosted HSM service.
Author Shiva
0 upvotes
Cloud Key Management Service
This article covers everything you need to know about Cloud Key Management Service. It is used to encrypt, decode, or sign data, such as secrets using a key.
Author Shiva
0 upvotes
Risk Manager
This article incorporates Risk Manager in detail.
Secret Manager MEDIUM
In this blog, we will discuss how to create, access, and add a secret version, secret manager best practices, encryption of secrets, and access control with IAM, secret manager audit logging, choosing a replication policy, Enabling Customer-Managed Encryption Keys (CMEK) for Secret Manager, creating and managing expiry secrets, events notifications for the secret manager, rotating secrets, and Secret Manager Service Level Agreement (SLA).
VPC Service Controls
In this blog, we will discuss VPC Service Controls, its supported products and limitations, access control with IAM, Configuring ingress and egress policies, creation of service perimeter and perimeter bridge, Setting up private connectivity to Google APIs and services, Container Registry or Artifact Registry for GKE private clusters, Making bulk changes to service perimeters and Diagnosing issues by using the VPC Service Controls troubleshooter.