GCP Professional Cloud Security Engineer Practice Question
An online retailer is migrating its card-holder data environment (CDE) to Google Cloud and must prepare for a PCI DSS audit. Architects need to keep the CDE out of scope for non-PCI workloads yet still allow internal HTTP API calls from services running in other projects. Which design best achieves PCI scope reduction while keeping administration effort low?
Deploy CDE instances with public IP addresses in a separate VPC and rely on Cloud Armor policies to limit access to the IP ranges of non-PCI services.
Keep CDE and non-PCI workloads in distinct projects but interconnect the two VPCs with VPC Network Peering, using IAM Conditions to restrict which service accounts can initiate traffic.
Create a dedicated project that hosts its own standalone VPC for the CDE, place the project in a "PCI" folder, and expose required APIs through an Internal HTTP(S) Load Balancer or Private Service Connect; do not establish any VPC peering to other projects.
Attach every project, including the CDE, to a single organization-wide Shared VPC and use firewall rules to block all traffic except TCP 443 between CDE and non-PCI subnets.
Keeping the CDE in a completely separate VPC that is owned by a dedicated project under a PCI-only folder prevents any implicit Layer-3 reachability from non-PCI workloads. Exposing the necessary services through an Internal HTTP(S) Load Balancer (or Private Service Connect endpoint) lets other projects consume the API without creating network peering, so the non-PCI networks are not brought into PCI scope. Relying on a single Shared VPC, subnet separation, public IPs, or VPC Network Peering would mean that the larger network-or even the public internet-becomes in scope, greatly increasing audit surface and contradicting PCI segmentation guidance.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is PCI DSS and why is it important for cloud workloads?
Open an interactive chat with Bash
What is an Internal HTTP(S) Load Balancer and how does it secure traffic within Google Cloud?
Open an interactive chat with Bash
What is Private Service Connect and how can it be used to minimize audit scope?
Open an interactive chat with Bash
What is PCI DSS and why is scope reduction important?
Open an interactive chat with Bash
How does an Internal HTTP(S) Load Balancer or Private Service Connect help in separating PCI and non-PCI workloads?
Open an interactive chat with Bash
Why is VPC peering not suitable for PCI DSS compliance in this scenario?
Open an interactive chat with Bash
GCP Professional Cloud Security Engineer
Supporting compliance requirements
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
Pass with Confidence.
IT & Cybersecurity Package
You have hit the limits of our free tier, become a Premium Member today for unlimited access.
Military, Healthcare worker, Gov. employee or Teacher? See if you qualify for a Community Discount.
Monthly
$19.99 $11.99
$11.99/mo
Billed monthly, Cancel any time.
$19.99 after promotion ends
3 Month Pass
$44.99 $26.99
$8.99/mo
One time purchase of $26.99, Does not auto-renew.
$44.99 after promotion ends
Save $18!
MOST POPULAR
Annual Pass
$119.99 $71.99
$5.99/mo
One time purchase of $71.99, Does not auto-renew.
$119.99 after promotion ends
Save $48!
BEST DEAL
Lifetime Pass
$189.99 $113.99
One time purchase, Good for life.
Save $76!
What You Get
All IT & Cybersecurity Package plans include the following perks and exams .