GCP Professional Cloud Security Engineer Practice Question
A financial-services company runs workloads in GKE clusters located in two separate production projects. All clusters must read the same third-party API key. Compliance mandates that:
the key is encrypted with a hardware-backed customer-managed key,
a new key is issued automatically every 30 days,
previous key material is retained for rollback but must not exist longer than 15 days,
workloads receive only read-only access to the secret. Which design satisfies all of these requirements?
Upload the API key to a Cloud Storage bucket encrypted with a customer-supplied encryption key (CSEK), enable uniform bucket-level access, configure an object lifecycle rule to delete objects older than 15 days, and distribute new signed URLs to the clusters every 30 days.
Store the API key as a Kubernetes Secret in each cluster, enable application-layer secrets encryption with a software-protected Cloud KMS key, and run a cluster CronJob that rewrites the secret every 30 days and deletes prior versions after 15 days.
Use Cloud Runtime Configurator to store the API key, protect it with a Cloud HSM key, and rely on the service's automatic variable refresh feature to rotate the value every 30 days while retaining prior versions for 15 days.
Create a Secret Manager secret in a dedicated security project, encrypt it with a Cloud HSM-backed CMEK key, grant the Secret Manager Secret Accessor role to the GKE service accounts, and configure a 30-day rotation schedule that triggers a Cloud Function to add a new secret version and destroy versions older than 15 days.
Secret Manager is designed for centralized, versioned storage of sensitive data and integrates with Cloud KMS for CMEK protection. By selecting a Cloud HSM-backed key ring, the secret is encrypted with hardware-backed keys that meet the compliance requirement. Secret Manager supports rotation schedules that publish to Pub/Sub; a Cloud Function (or Cloud Run job) subscribed to that topic can create a new secret version every 30 days and then destroy versions older than 15 days, keeping roll-back capability for up to 15 days. Granting only the Secret Manager Secret Accessor role to the service accounts used by the GKE workloads enforces least-privilege, read-only access.
The other options fail one or more requirements:
Kubernetes Secrets (option B) are only base-64 encoded unless application-layer encryption is configured; even then they are protected by a software key and are project-local, so they do not provide hardware-backed encryption or centralized access across projects.
Storing the key in Cloud Storage with CSEK and signed URLs (option C) does not enforce read-only IAM-based access or automatic rotation, and CSEK is not hardware-backed.
Cloud Runtime Configurator (option D) has no native CMEK or rotation feature and is not recommended for new workloads, so it cannot meet the encryption or rotation requirements.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Secret Manager in GCP and why is it suitable for this scenario?
Open an interactive chat with Bash
What is the role of Cloud HSM-backed CMEK keys in ensuring compliance?
Open an interactive chat with Bash
How does the rotation and versioning feature in Secret Manager work?
Open an interactive chat with Bash
What is Secret Manager and how does it ensure security?
Open an interactive chat with Bash
What is a Cloud HSM-backed CMEK, and why is it important?
Open an interactive chat with Bash
How does Secret Manager rotation work, and why is it useful?
Open an interactive chat with Bash
GCP Professional Cloud Security Engineer
Ensuring data protection
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
Pass with Confidence.
IT & Cybersecurity Package
You have hit the limits of our free tier, become a Premium Member today for unlimited access.
Military, Healthcare worker, Gov. employee or Teacher? See if you qualify for a Community Discount.
Monthly
$19.99 $11.99
$11.99/mo
Billed monthly, Cancel any time.
$19.99 after promotion ends
3 Month Pass
$44.99 $26.99
$8.99/mo
One time purchase of $26.99, Does not auto-renew.
$44.99 after promotion ends
Save $18!
MOST POPULAR
Annual Pass
$119.99 $71.99
$5.99/mo
One time purchase of $71.99, Does not auto-renew.
$119.99 after promotion ends
Save $48!
BEST DEAL
Lifetime Pass
$189.99 $113.99
One time purchase, Good for life.
Save $76!
What You Get
All IT & Cybersecurity Package plans include the following perks and exams .