Exam: Cloud Digital Leader 0 Likes

How should they change their cloud security? (Digital Leader)

Updated on 04/25/2024

An organization wants to move from a tactical cloud adoption approach to a transformational approach.

How should they change their cloud security?

A) Provide staff identities using only Google Cloud authentication.
B) Provide multiple layers of network security using a zero-trust model.
C) Emphasize strong perimeter security and trust in their private network.
D) Emphasize three main Identity Access Management roles: owner, editor, and viewer.


Solution

Correct answer: B) Provide multiple layers of network security using a zero-trust model.
Moving from a tactical to a transformational approach in cloud adoption requires a shift in mindset towards a more holistic and strategic view of cloud security. Among the options provided:

A) Providing staff identities using only Google Cloud authentication is a tactical measure and doesn't necessarily address the broader security concerns that come with transformational cloud adoption. It's limited to a single cloud provider and may not cover all aspects of security comprehensively.

B) Providing multiple layers of network security using a zero-trust model is a more transformational approach. Zero-trust security assumes that threats could be both internal and external, and it verifies every request before granting access, regardless of the user's location or network. This approach aligns well with transformational cloud adoption by emphasizing security at every level and not relying solely on perimeter defenses.

C) Emphasizing strong perimeter security and trust in the private network is an outdated approach, especially in the context of cloud adoption. With cloud computing, the traditional network perimeter is increasingly porous, and the focus should shift towards securing data and identities regardless of where they reside.

D) Emphasizing three main Identity Access Management (IAM) roles is a good practice, but it's just one component of a comprehensive cloud security strategy. While IAM roles help manage access control within the cloud environment, a transformational approach would encompass broader security measures beyond just identity management.

Category: Google Cloud security and operations

Language: English

There are no comments yet.

Authentication required

You must log in to post a comment.
Log in to like this solution

Log in
Cookies Consent

We use cookies to enhance your browsing experience, serve personalized ads or content, and analyze our traffic. By clicking "Accept All" you consent to our use of cookies. Privacy Policy.