Securing identities and access to resources
In Chapter 2, Mastering the Basics of Google Cloud, we discussed IAM in Google Cloud and the principle of least privilege. You learned that identity is the new perimeter, and that it is crucial to protect users' identities first and foremost before thinking of protecting your infrastructure resources. You also learned the resource hierarchy on GCP and how that affects access management. The concepts we laid out in that chapter are fundamental and need to be grasped as a prerequisite for understanding how to secure identities. Therefore, if you haven't done so, I encourage you to read through the Understanding identity and access management (IAM) section of Chapter 2, Mastering the Basics of Google Cloud, before continuing.
In this section, you will learn about Cloud Identity and how to approach authentication and authorization on GCP.
Cloud Identity
Cloud Identity is an Identity as a Service (IDaaS) solution used for centrally...