GCP Professional Cloud Architect Practice Question
Your fintech company is migrating its fraud-detection analytics to Google Cloud. Compliance mandates that all encryption keys be generated in, and remain in, an on-premises HSM; Google must never have access to the plaintext key material. Keys must rotate every 90 days without forcing re-encryption of existing BigQuery tables or Cloud Storage objects. The security operations team must control key lifecycle, while data engineers may only encrypt and decrypt data. Which approach best satisfies these requirements?
Generate a new key in Cloud HSM and export its material to the on-prem HSM for backup; enforce rotation by re-encrypting all existing data with each new key version and give security operations the Owner role on the projects.
Configure Cloud External Key Manager (EKM) with an externally managed key backed by the on-prem HSM; automate creation of a new external key version every 90 days, grant the security team the Cloud KMS Admin role, and grant data engineers the Cloud KMS CryptoKey Encrypter/Decrypter role.
Create a customer-managed symmetric key in Cloud KMS (software protection level), import the HSM-generated material into a new key version every 90 days, and make data engineers key Owners for direct management.
Store the HSM-generated key in Secret Manager and rotate it by updating the secret every 90 days; have data engineers retrieve the secret at runtime to encrypt and decrypt data.
Using Cloud External Key Manager (EKM) ensures that the key is generated and stored solely in your on-premises HSM, so Google never sees the plaintext material. Each encryption or decryption call from BigQuery or Cloud Storage is proxied to the external HSM, meeting the data-sovereignty constraint. You can meet the 90-day rotation requirement by automating the creation of a new external key version every 90 days-for example, with Cloud Scheduler triggering a Cloud Function that calls the Cloud KMS API. Previous key versions remain available for decryption, so no re-encryption is needed. Assign the Cloud KMS Admin role to the security operations team for key lifecycle control, and the Cloud KMS CryptoKey Encrypter/Decrypter role to data engineers so they can use, but not manage, the key. The other options fail because importing the key into a Cloud KMS software key stores the plaintext within Google's boundary, Secret Manager is not intended for cryptographic key operations and would expose the key to Google, and Cloud HSM keys are non-exportable so they cannot originate in an on-premises HSM.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Cloud External Key Manager (EKM) and how does it integrate with an on-premises HSM?
Open an interactive chat with Bash
How does automating the creation of new external key versions ensure compliance with a 90-day rotation policy?
Open an interactive chat with Bash
How do Cloud KMS Admin and CryptoKey Encrypter/Decrypter roles differ in terms of permissions?
Open an interactive chat with Bash
What is Cloud External Key Manager (EKM)?
Open an interactive chat with Bash
Why is re-encryption not required when rotating keys in Cloud EKM?
Open an interactive chat with Bash
What is the difference between the Cloud KMS Admin role and the CryptoKey Encrypter/Decrypter role?
Open an interactive chat with Bash
GCP Professional Cloud Architect
Designing for security and compliance
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
Pass with Confidence.
IT & Cybersecurity Package
You have hit the limits of our free tier, become a Premium Member today for unlimited access.
Military, Healthcare worker, Gov. employee or Teacher? See if you qualify for a Community Discount.
Monthly
$19.99 $11.99
$11.99/mo
Billed monthly, Cancel any time.
$19.99 after promotion ends
3 Month Pass
$44.99 $26.99
$8.99/mo
One time purchase of $26.99, Does not auto-renew.
$44.99 after promotion ends
Save $18!
MOST POPULAR
Annual Pass
$119.99 $71.99
$5.99/mo
One time purchase of $71.99, Does not auto-renew.
$119.99 after promotion ends
Save $48!
BEST DEAL
Lifetime Pass
$189.99 $113.99
One time purchase, Good for life.
Save $76!
What You Get
All IT & Cybersecurity Package plans include the following perks and exams .