Book Image

Official Google Cloud Certified Professional Cloud Security Engineer Exam Guide

By : Ankush Chowdhary, Prashant Kulkarni
Book Image

Official Google Cloud Certified Professional Cloud Security Engineer Exam Guide

By: Ankush Chowdhary, Prashant Kulkarni

Overview of this book

Google Cloud security offers powerful controls to assist organizations in establishing secure and compliant cloud environments. With this book, you’ll gain in-depth knowledge of the Professional Cloud Security Engineer certification exam objectives, including Google Cloud security best practices, identity and access management (IAM), network security, data security, and security operations. The chapters go beyond the exam essentials, helping you explore advanced topics such as Google Cloud Security Command Center, the BeyondCorp Zero Trust architecture, and container security. With step-by-step explanations, practical examples, and practice exams to help you improve your skills for the exam, you'll be able to efficiently review and apply key concepts of the shared security responsibility model. Finally, you’ll get to grips with securing access, organizing cloud resources, network and data security, and logging and monitoring. By the end of this book, you'll be proficient in designing, developing, and operating security controls on Google Cloud and gain insights into emerging concepts for future exams.
Table of Contents (19 chapters)
16
Google Professional Cloud Security Engineer Exam – Mock Exam I
17
Google Professional Cloud Security Engineer Exam – Mock Exam II
18
Other Books You May Enjoy

Summary

In this chapter, we looked at the different categories of logs and what types of logs are available in each of those categories. We also looked at key properties of the different types of logs, such as whether they are enabled by default and the default retention period associated with each category. We also looked at the key components of Cloud Logging, such as the Cloud Logging API, the Log Router, log producers, and log consumers. Then, we looked at how to create log exports, how to specify the filters on what you want to exclude or include, and the different destinations that are available to store your logs. We covered the use of logging pipelines for analytics and storage. Finally, we looked at how to address compliance needs through logging and discussed best practices for logging and auditing.

In the next chapter, we will learn about Cloud Monitoring. That chapter will build on top of the knowledge gained in this one and introduce the topics of log-based metrics...