Regulatory Compliance and Security Policies (GCP PCSE) Flashcards
GCP Professional Cloud Security Engineer Flashcards

| Front | Back |
| How can Audit Logs help with regulatory compliance | Tracks user and admin activity on GCP resources |
| How can GCP Assured Workloads assist in regulatory compliance | Provides preconfigured environments tailored for compliance requirements |
| How can GCP Resource Manager help with compliance | Provides management controls for hierarchical resources like projects and folders |
| How can GCP simplify regulatory compliance for global enterprises | Provides region-specific resources and controls for compliance across multiple jurisdictions |
| How can Identity-Aware Proxy (IAP) assist with regulatory compliance | Ensures user authentication for web applications |
| How do GCP security tools like **Cloud Armor** support compliance | Defends against threats like DDoS attacks with firewall capabilities |
| How does Cloud Audit Logging differ from general logging | Provides detailed activity logs specifically for compliance and audit purposes |
| How does Cloud Key Management Service support security and compliance | Manages encryption keys securely for both automatic and manual use |
| How does GCP's Confidential Computing help achieve compliance | Protects data in use by isolating sensitive workloads in secure enclaves |
| How does Private Google Access contribute to compliance | Provides private connectivity for resources without exposing them to public internet |
| What are the benefits of GCP Data Catalog in compliance management | Facilitates organization and tagging of sensitive and regulated data |
| What compliance frameworks does GCP support with Assured Workloads | HIPAA, PCI DSS, FedRAMP, and similar frameworks |
| What does the Cloud Security Command Center provide | Real-time monitoring and reporting on security vulnerabilities and threats |
| What is the benefit of using GCP Shielded VMs | Protects virtual machines from rootkit and bootkit attacks |
| What is the difference between customer-managed encryption keys and Google-managed | Customer-managed allows greater control over encryption strategies |
| What is the function of Data Loss Prevention in GCP compliance | Identifies, classifies, and anonymizes sensitive data |
| What is the purpose of Access Transparency in GCP | Logs access by Google administrators to customer data for accountability |
| What is the purpose of GCP Compliance Resource Center | Provides tools and guidance for meeting regulatory requirements |
| What is the purpose of GCP Policy Troubleshooter | Helps identify and resolve issues with IAM policies impacting access |
| What is the purpose of VPC Service Controls in GCP | Restricts the data communication between services to ensure security |
| What is the role of Cloud CDN in enhancing security and compliance | Secures content delivery by mitigating cache poisoning and optimizing encrypted traffic |
| What is the role of Cloud Identity and Access Management (IAM) in compliance | Enforces least privilege access and manages internal user permissions |
| What is the role of Cloud Security Posture Management (CSPM) in GCP | Continuously assesses and improves security configurations to meet compliance standards |
| What is the role of Organization Policies in managing security on GCP | Allows enforcement of specific security practices across all projects |
| Which GCP tool helps detect compliance violations in resources | Forseti Security |
| Which report can Google Cloud customers use to demonstrate compliance with regulations | Compliance and audit reports available in the Compliance Resource Center |
| Why are Service Accounts important for security and compliance | Provides managed identities for machine-to-machine interactions |
| Why is encryption important for regulatory compliance on GCP | Protects sensitive data in transit and at rest |
| Why is monitoring resource configurations crucial for compliance | Ensures settings align with regulatory and security standards to prevent violations |
About the Flashcards
Flashcards for the GCP Professional Cloud Security Engineer exam explore Google Cloud Platform's built-in controls that help organizations satisfy stringent regulatory obligations. Review essential terminology and learn how tools like Cloud Security Command Center, Forseti Security, and VPC Service Controls detect vulnerabilities, restrict data movement, and report on policy compliance.
Understand how IAM enforces least-privilege access, why encryption keys managed in Cloud KMS or customer vaults protect data in transit and at rest, and how audit logs, Access Transparency, and Cloud Security Posture Management provide continuous evidence for HIPAA, PCI DSS, FedRAMP, and other frameworks. These cards focus on practical actions exam takers must recall to secure projects and pass compliance-related questions.
Topics covered in this flashcard deck:
- GCP compliance frameworks
- Identity and access management
- Encryption and key management
- Audit logging & monitoring
- Network security controls
- Threat detection tools