In this chapter, we will learn about GCP identity and security. We begin the chapter with a brief overview of Google's infrastructure security layers and its cloud platform security. We will learn about identity access management and the key management service (KMS)—two services that are core to how you allow role-based and key-based access to your GCP environment. We will briefly look into cloud security scanner. We will also learn about security keys, which allow you to secure your account using two-step verification. In this chapter, we will cover the following:
- Infrastructure and cloud platform security
- Identity access management
- Key management service
- Cloud security scanner
- Security keys
There is a lot more to identity and security service offerings than what this chapter covers. This brief overview will help you get...