Summary
In this chapter, we have learned what POLP is and seen how it helps to reduce the attack surface of our systems. We learned how to authenticate with GCP services, using service accounts with the roles and permissions required for an application to operate. We found out about IAM and related concepts such as identity, roles, and resources, and the association of these concepts through a policy. We looked at the hierarchy of resources within Google Cloud, and saw how this hierarchy affects the permissions that an entity may have on specific resources.
We examined the OAuth 2.0 protocol and how it relates to authentication between our application and GCP services, and learned how to manage secrets in a secure way using Google Secret Manager.
Finally, we reviewed the good practices recommended by Google for the development of our applications in order to create secure applications in the GCP cloud.