Skip to content

devjoshi2005/Google-Cloud-Security-Environment

Repository files navigation

Google-Cloud-Security-Environment

Demo.mp4
flowchart TD
  A[Google-Cloud-Security-Environment\npracticum repo] --> B[Security domains]
  
  subgraph B[Security domains]
    I1[*Identity & Workload Handling*]
    N1[*Network Visibility & Perimeter Defense*]
    S1[*Storage Protection & DLP*]
    V1[*VPC Fabric & Connectivity Hardenings*]
    T1[*Inventory & Telemetry*]
  end

  %% Identity & Workload Handling subtopics
  I1 --> I2a[Least-privilege IAM]
  I1 --> I2b[Workload Identity Federation]
  I1 --> I2c[Kubernetes RBAC]
  I1 --> I2d[Secret Manager]
  I1 --> I2e[IAM Conditions]

  %% Network Visibility & Perimeter Defense subtopics
  N1 --> N2a[Hierarchical Firewalls]
  N1 --> N2b[VPC Flow Logs]
  N1 --> N2c[Cloud Armor WAF/DDoS]
  N1 --> N2d[Private Service Connect]

  %% Storage Protection & DLP subtopics
  S1 --> S2a[CMEK with Cloud KMS]
  S1 --> S2b[Bucket Lock & Retention]
  S1 --> S2c[Lifecycle Policies]
  S1 --> S2d[Cloud DLP Inspection/Redaction]
  S1 --> S2e[Uniform Bucket-level Access]

  %% VPC Fabric & Connectivity Hardenings subtopics
  V1 --> V2a[Private Google Access]
  V1 --> V2b[Cloud NAT]
  V1 --> V2c[Shared VPC & Peering]
  V1 --> V2d[HA VPN / Interconnect]
  V1 --> V2e[Global Routing with Cloud Router]

  %% Inventory & Telemetry subtopics
  T1 --> T2a[Cloud Asset Inventory]
  T1 --> T2b[Audit Logs & Logging]
  T1 --> T2c[Cloud Monitoring & SLOs]
  T1 --> T2d[Security Command Center]
  T1 --> T2e[BigQuery / SIEM Export]
Loading

This Guided Project (provided by Google Cloud Skill Labs as part of the Google Cloud Security Engineer Preparation Certificate) consists of multiple independent labs. Each lab connects to real-world scenarios and is documented with commands, configurations, and execution steps.

Each lab was designed to run in a 1–1.5 hour environment, simulating enterprise‑grade challenges and demonstrating proficiency in engineering and securing Google Cloud services across multiple security domains.

Image

Project Domains


Identity and Workload Handling

  • Technical focus:

    1. Cloud IAM: Custom roles, least‑privilege assignments, service account scoping.
    2. Workload Identity Federation: Mapping external identities (e.g., GitHub Actions, on‑prem AD) to GCP service accounts without long‑lived keys.
    3. Kubernetes RBAC: RoleBindings and ClusterRoleBindings for namespace‑scoped vs cluster‑scoped access.
    4. Secret Manager integration: Injecting secrets into workloads securely.
    5. IAM Conditions: Time‑bound or resource‑specific access policies.
  • Pros:

    1. Enforces least privilege and eliminates over‑privileged accounts.
    2. Removes static keys → reduces credential sprawl.
    3. Fine‑grained workload access control → isolates blast radius.
    4. Auditable, versioned IAM policies → compliance evidence.
    5. Supports zero‑trust principles by binding identity to context (time, resource, IP).

Network Visibility and Perimeter Defense

  • Technical focus:

    1. VPC Firewall Rules: Ingress/egress restrictions, priority ordering, logging.
    2. Hierarchical Firewall Policies: Org‑level enforcement across projects.
    3. VPC Flow Logs: Packet‑level telemetry for analysis in Cloud Logging/BigQuery.
    4. Cloud Armor: DDoS protection, WAF rules, geo‑based access control.
    5. Private Service Connect: Restricting API access to Google services via private endpoints.
  • Pros:

    1. Centralized perimeter enforcement → consistent security posture.
    2. Flow logs enable anomaly detection and forensic analysis.
    3. Cloud Armor adds managed protection against volumetric and application‑layer attacks.
    4. Hierarchical policies prevent “shadow IT” projects from bypassing controls.
    5. Private Service Connect ensures sensitive workloads never traverse the public internet.

Storage Protection and Data Loss Prevention

  • Technical focus:

    1. Cloud KMS CMEK: Customer‑managed encryption keys for buckets and objects.
    2. Bucket Lock & Retention Policies: Enforce WORM (write once, read many) for compliance.
    3. Object Lifecycle Policies: Automated archival/deletion.
    4. Cloud DLP API: Inspecting and redacting sensitive data (PII, PCI, PHI).
    5. Uniform Bucket‑Level Access: Centralized IAM instead of ACL sprawl.
  • Pros:

    1. CMEK provides cryptographic control and auditability.
    2. Retention policies enforce regulatory requirements (e.g., SEC 17a‑4).
    3. Lifecycle rules reduce storage costs and data exposure.
    4. DLP API prevents accidental leakage of sensitive identifiers.
    5. Uniform access simplifies permissions and reduces misconfigurations.

VPC Fabric and Connectivity Hardenings

  • Technical focus:

    1. Private Google Access: Allow private VMs to reach Google APIs without external IPs.
    2. Cloud NAT: Outbound internet for patching without exposing workloads.
    3. VPC Peering & Shared VPC: Secure multi‑project connectivity.
    4. HA VPN / Interconnect: Hybrid connectivity with redundancy.
    5. Routing Modes: Regional vs Global dynamic routing with Cloud Router.
  • Pros:

    1. Eliminates need for public IPs → reduces attack surface.
    2. NAT preserves outbound connectivity while maintaining private posture.
    3. Shared VPC centralizes network control across projects.
    4. HA VPN ensures 99.99% SLA for hybrid workloads.
    5. Global routing simplifies multi‑region architectures with fewer misconfigs.

Inventory & Telemetry

  • Technical focus:

    1. Cloud Asset Inventory: Point‑in‑time and historical resource state.
    2. Cloud Logging & Audit Logs: Admin activity, data access, system events.
    3. Cloud Monitoring: Metrics, uptime checks, SLOs.
    4. Security Command Center (SCC): Centralized findings for misconfigs, vulnerabilities.
    5. BigQuery / SIEM integration: Long‑term log retention and advanced analytics.
  • Pros:

    1. Full visibility into “what exists” and “who did what.”
    2. Audit logs provide forensic trail for compliance and incident response.
    3. Monitoring + alerting ensures proactive detection of anomalies.
    4. SCC consolidates security signals into a single pane of glass.
    5. Export to BigQuery/SIEM enables advanced threat hunting and reporting.

Key Takeaways

  • Each lab is independent and demonstrates a specific security control.
  • The project demonstrates breadth (multiple domains) and depth (detailed execution) of Google Cloud security engineering.
  • This repository serves as a portfolio artifact for enterprise‑grade cloud security proficiency.

About

Google Cloud Security Project related to implementing multiple cloud security services ranging from IAM to storage protection

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors