Demo.mp4
flowchart TD
A[Google-Cloud-Security-Environment\npracticum repo] --> B[Security domains]
subgraph B[Security domains]
I1[*Identity & Workload Handling*]
N1[*Network Visibility & Perimeter Defense*]
S1[*Storage Protection & DLP*]
V1[*VPC Fabric & Connectivity Hardenings*]
T1[*Inventory & Telemetry*]
end
%% Identity & Workload Handling subtopics
I1 --> I2a[Least-privilege IAM]
I1 --> I2b[Workload Identity Federation]
I1 --> I2c[Kubernetes RBAC]
I1 --> I2d[Secret Manager]
I1 --> I2e[IAM Conditions]
%% Network Visibility & Perimeter Defense subtopics
N1 --> N2a[Hierarchical Firewalls]
N1 --> N2b[VPC Flow Logs]
N1 --> N2c[Cloud Armor WAF/DDoS]
N1 --> N2d[Private Service Connect]
%% Storage Protection & DLP subtopics
S1 --> S2a[CMEK with Cloud KMS]
S1 --> S2b[Bucket Lock & Retention]
S1 --> S2c[Lifecycle Policies]
S1 --> S2d[Cloud DLP Inspection/Redaction]
S1 --> S2e[Uniform Bucket-level Access]
%% VPC Fabric & Connectivity Hardenings subtopics
V1 --> V2a[Private Google Access]
V1 --> V2b[Cloud NAT]
V1 --> V2c[Shared VPC & Peering]
V1 --> V2d[HA VPN / Interconnect]
V1 --> V2e[Global Routing with Cloud Router]
%% Inventory & Telemetry subtopics
T1 --> T2a[Cloud Asset Inventory]
T1 --> T2b[Audit Logs & Logging]
T1 --> T2c[Cloud Monitoring & SLOs]
T1 --> T2d[Security Command Center]
T1 --> T2e[BigQuery / SIEM Export]
This Guided Project (provided by Google Cloud Skill Labs as part of the Google Cloud Security Engineer Preparation Certificate) consists of multiple independent labs. Each lab connects to real-world scenarios and is documented with commands, configurations, and execution steps.
Each lab was designed to run in a 1–1.5 hour environment, simulating enterprise‑grade challenges and demonstrating proficiency in engineering and securing Google Cloud services across multiple security domains.
- Identity and Workload Handling : https://github.com/devjoshi2005/Google-Cloud-Security-Environment/tree/main/Identity%20and%20workload%20handling
- Network Visibility & Perimeter Defense : https://github.com/devjoshi2005/Google-Cloud-Security-Environment/tree/main/Identity%20and%20workload%20handling
- Storage Protection and DLP : https://github.com/devjoshi2005/Google-Cloud-Security-Environment/tree/main/Identity%20and%20workload%20handling
- VPC Fabric & Connectivity Hardenings : https://github.com/devjoshi2005/Google-Cloud-Security-Environment/tree/main/Identity%20and%20workload%20handling
- Inventory & Telemetry : https://github.com/devjoshi2005/Google-Cloud-Security-Environment/tree/main/Identity%20and%20workload%20handling
-
Technical focus:
- Cloud IAM: Custom roles, least‑privilege assignments, service account scoping.
- Workload Identity Federation: Mapping external identities (e.g., GitHub Actions, on‑prem AD) to GCP service accounts without long‑lived keys.
- Kubernetes RBAC: RoleBindings and ClusterRoleBindings for namespace‑scoped vs cluster‑scoped access.
- Secret Manager integration: Injecting secrets into workloads securely.
- IAM Conditions: Time‑bound or resource‑specific access policies.
-
Pros:
- Enforces least privilege and eliminates over‑privileged accounts.
- Removes static keys → reduces credential sprawl.
- Fine‑grained workload access control → isolates blast radius.
- Auditable, versioned IAM policies → compliance evidence.
- Supports zero‑trust principles by binding identity to context (time, resource, IP).
-
Technical focus:
- VPC Firewall Rules: Ingress/egress restrictions, priority ordering, logging.
- Hierarchical Firewall Policies: Org‑level enforcement across projects.
- VPC Flow Logs: Packet‑level telemetry for analysis in Cloud Logging/BigQuery.
- Cloud Armor: DDoS protection, WAF rules, geo‑based access control.
- Private Service Connect: Restricting API access to Google services via private endpoints.
-
Pros:
- Centralized perimeter enforcement → consistent security posture.
- Flow logs enable anomaly detection and forensic analysis.
- Cloud Armor adds managed protection against volumetric and application‑layer attacks.
- Hierarchical policies prevent “shadow IT” projects from bypassing controls.
- Private Service Connect ensures sensitive workloads never traverse the public internet.
-
Technical focus:
- Cloud KMS CMEK: Customer‑managed encryption keys for buckets and objects.
- Bucket Lock & Retention Policies: Enforce WORM (write once, read many) for compliance.
- Object Lifecycle Policies: Automated archival/deletion.
- Cloud DLP API: Inspecting and redacting sensitive data (PII, PCI, PHI).
- Uniform Bucket‑Level Access: Centralized IAM instead of ACL sprawl.
-
Pros:
- CMEK provides cryptographic control and auditability.
- Retention policies enforce regulatory requirements (e.g., SEC 17a‑4).
- Lifecycle rules reduce storage costs and data exposure.
- DLP API prevents accidental leakage of sensitive identifiers.
- Uniform access simplifies permissions and reduces misconfigurations.
-
Technical focus:
- Private Google Access: Allow private VMs to reach Google APIs without external IPs.
- Cloud NAT: Outbound internet for patching without exposing workloads.
- VPC Peering & Shared VPC: Secure multi‑project connectivity.
- HA VPN / Interconnect: Hybrid connectivity with redundancy.
- Routing Modes: Regional vs Global dynamic routing with Cloud Router.
-
Pros:
- Eliminates need for public IPs → reduces attack surface.
- NAT preserves outbound connectivity while maintaining private posture.
- Shared VPC centralizes network control across projects.
- HA VPN ensures 99.99% SLA for hybrid workloads.
- Global routing simplifies multi‑region architectures with fewer misconfigs.
-
Technical focus:
- Cloud Asset Inventory: Point‑in‑time and historical resource state.
- Cloud Logging & Audit Logs: Admin activity, data access, system events.
- Cloud Monitoring: Metrics, uptime checks, SLOs.
- Security Command Center (SCC): Centralized findings for misconfigs, vulnerabilities.
- BigQuery / SIEM integration: Long‑term log retention and advanced analytics.
-
Pros:
- Full visibility into “what exists” and “who did what.”
- Audit logs provide forensic trail for compliance and incident response.
- Monitoring + alerting ensures proactive detection of anomalies.
- SCC consolidates security signals into a single pane of glass.
- Export to BigQuery/SIEM enables advanced threat hunting and reporting.
- Each lab is independent and demonstrates a specific security control.
- The project demonstrates breadth (multiple domains) and depth (detailed execution) of Google Cloud security engineering.
- This repository serves as a portfolio artifact for enterprise‑grade cloud security proficiency.