PART I: MANAGING SECURITY IN GOOGLE CLOUD
Module 1 Foundations of GCP Security
Understand the GCP shared security responsibility model
Understand Google Cloud’s approach to security
Understand the kinds of threats mitigated by Google and by GCP
Define and Understand Access Transparency and Access Approval (beta)
Module 2 Cloud Identity
Cloud Identity
Syncing with Microsoft Active Directory using Google Cloud Directory Sync
Using Managed Service for Microsoft Active Directory (beta )
Choosing between Google authentication and SAML-based SSO
Best practices, including DNS configuration, super admin accounts
Lab: Defining Users with Cloud Identity Console
Module 3 Identity, Access, and Key Management
GCP Resource Manager: projects, folders, and organizations
GCP IAM roles, including custom roles
GCP IAM policies, including organization policies
GCP IAM Labels
GCP IAM Recommender
GCP IAM Troubleshooter
GCP IAM Audit Logs
Best practices, including separation of duties and least privilege, the use of Google groups in policies, and avoiding the use of primitive roles
Labs: Configuring Cloud IAM, including custom roles and organization policies
Module 4 Configuring Google Virtual Private Cloud for Isolation and Security
Configuring VPC firewalls (both ingress and egress rules)
Load balancing and SSL policies
Private Google API access
SSL proxy use
Best practices for VPC networks, including peering and shared VPC use, correct use of subnetworks
Best security practices for VPNs
Security considerations for interconnect and peering options
Available security products from partners
Defining a service perimeter, including perimeter bridges
Setting up private connectivity to Google APIs and services
Lab: Configuring VPC firewalls
PART II: SECURITY BEST PRACTICES ON GOOGLE CLOUD
Module 5 Securing Compute Engine: techniques and best practices
Compute Engine service accounts, default and customer-defined
IAM roles for VMs
API scopes for VMs
Managing SSH keys for Linux VMs
Managing RDP logins for Windows VMs
Organization policy controls: trusted images, public IP address, disabling serial port
Encrypting VM images with customer-managed encryption keys and with customer-supplied encryption keys
Finding and remediating public access to VMs
Best practices, including using hardened custom images, custom service accounts (not the default service account), tailored API scopes, and the use of application default credentials instead of user-managed keys
Lab: Configuring, using, and auditing VM service accounts and scopes
Encrypting VM disks with customer-supplied encryption keys
Lab: Encrypting disks with customer-supplied encryption keys
Using Shielded VMs to maintain the integrity of virtual machines
Module 6 Securing cloud data: techniques and best practices
Cloud Storage and IAM permissions
Cloud Storage and ACLs
Auditing cloud data, including finding and remediating publicly accessible data
Signed Cloud Storage URLs
Signed policy documents
Encrypting Cloud Storage objects with customer-managed encryption keys and with customer-supplied encryption keys
Best practices, including deleting archived versions of objects after key rotation
Lab: Using customer-supplied encryption keys with Cloud Storage
Lab: Using customer-managed encryption keys with Cloud Storage and Cloud KMS
BigQuery authorized views
BigQuery IAM roles
Best practices, including preferring IAM permissions over ACLs
Lab: Creating a BigQuery authorized view
Module 7 Securing Applications: techniques and best practices
Types of application security vulnerabilities
DoS protections in App Engine and Cloud Functions
Cloud Security Scanner
Lab: Using Cloud Security Scanner to find vulnerabilities in an App Engine application
Identity Aware Proxy
Lab: Configuring Identity Aware Proxy to protect a project
Module 8 Securing Kubernetes: techniques and best practices
Authorization
Securing Workloads
Securing Clusters
Logging and Monitoring
PART III: MITIGATING VULNERABILITIES IN GOOGLE CLOUD
Module 9 Protecting against Distributed Denial of Service Attacks
How DDoS attacks work
Mitigations: GCLB, Cloud CDN, autoscaling, VPC ingress and egress firewalls, Cloud Armor (including its rules language)
Types of complementary partner products
Lab: Configuring GCLB, CDN, traffic blacklisting with Cloud Armor
Module 10 Protecting against content-related vulnerabilities
Threat: Ransomware
Mitigations: Backups, IAM, Data Loss Prevention API
Threats: Data misuse, privacy violations, sensitive/restricted/unacceptable content
Threat: Identity and Oauth phishing
Mitigations: Classifying content using Cloud ML APIs; scanning and redacting data using Data Loss Prevention API
Lab: Redacting Sensitive Data with Data Loss Prevention API
Module 11 Monitoring, Logging, Auditing, and Scanning
Security Command Center
Stackdriver monitoring and logging
Lab: Installing Stackdriver agents
Lab: Configuring and using Stackdriver monitoring and logging
VPC flow logs
Lab: Viewing and using VPC flow logs in Stackdriver
Cloud audit logging
Lab: Configuring and viewing audit logs in Stackdriver
Deploying and Using Forseti
Lab: Inventorying a Deployment with Forseti Inventory (demo)
Lab: Scanning a Deployment with Forseti Scanner (demo)