Implementing Identity and Security in Google Cloud
In the previous chapters, topics such as roles, users, and service accounts often appeared in the context of what permissions are needed to access or configure a specific Google Cloud service. This chapter will provide more visibility on identity and access in Google Cloud. In addition, we will focus on the security aspter and learn about preventing unauthorized access and auditing user actions on Google Cloud resources.
Furthermore, the Google Cloud setup checklist section in Chapter 3 briefly mentioned a checklist that guided users through the initial setup of Google Cloud foundation in order to run enterprise ready workloads.The first points on this list were Cloud Identity users and groups, and administrative access. As those topics are important from the identity and security perspective, we will cover them in detail.
In this chapter, we will explore the following main topics:
- Creating a cloud identity for an organization...