GCP Professional Cloud Security Engineer Practice Question
Your organization runs an internal web application on Compute Engine VMs that have only internal IP addresses and sit behind an Internal HTTP(S) Load Balancer (ILB). Auditors outside the corporate network now need temporary, browser-based access to the application over the public internet. The security team requires that:
All traffic is encrypted in transit without exposing the VMs to the internet.
Only members of the Google Workspace group [email protected] can reach the application after strong authentication.
Access must be blocked if users connect from untrusted IP ranges or unmanaged devices.
You want to implement this as quickly as possible while changing as little of the existing backend architecture as you can. Which solution meets all requirements?
Deploy Cloud Endpoints in front of the application, secure it with an API key issued to [email protected], and enable VPC Service Controls to restrict access to trusted networks.
Place a global External HTTP(S) Load Balancer with Google-managed SSL in front of the existing Internal HTTP(S) Load Balancer, enable Identity-Aware Proxy on the external load balancer, grant the [email protected] group the IAP-secured Web App User role, and attach an Access Level that restricts source IP ranges and requires managed devices.
Expose each VM with an external IP address protected by a Google Cloud Armor policy that allows traffic only from [email protected] and approved IP ranges, and terminate TLS on the instances.
Create a site-to-site HA VPN between auditors' networks and the VPC, advertise the ILB's subnet routes over BGP, and rely on VPC firewall rules to limit access to the [email protected] group's source IP ranges.
Using Identity-Aware Proxy (IAP) for HTTPS is the simplest way to publish an internal web service securely to the internet without adding external IPs to the backend VMs. You create an external HTTPS load balancer whose backend service points at the existing Internal HTTP(S) Load Balancer via a regional internal backend service or an internal passthrough Network Endpoint Group; the external load balancer terminates TLS and forwards traffic privately to the ILB over the VPC. Enabling IAP on the external HTTP(S) load balancer lets Google handle user authentication and inject an identity token on each request. Granting the IAP-secured Web App User role (roles/iap.httpsResourceAccessor) on the load balancer to the auditors' Google Workspace group restricts access to those users.
To add context-aware constraints (such as allowed IP ranges and device status), you create an Access Level in Access Context Manager that defines the required conditions, then bind that access level to the IAP policy. The combined effect is that only authenticated group members coming from trusted IPs and managed devices can connect. No external IPs are assigned to the VMs, and the solution reuses the existing ILB, satisfying the requirement to minimize architectural changes.
Alternative answers fall short:
Deploying Cloud VPN would encrypt traffic but still requires auditors to set up tunnels and does not enforce user identity or device context.
Exposing the ILB through a TCP proxy with IAP for TCP would not work for HTTP layer-7 policies and would require client connector software.
Cloud Endpoints secures APIs, not generic web apps, and cannot enforce device-based context access without additional components.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an Identity-Aware Proxy (IAP)?
Open an interactive chat with Bash
What is an Internal HTTP(S) Load Balancer (ILB)?
Open an interactive chat with Bash
What is Access Context Manager and how is it used with IAP?
Open an interactive chat with Bash
GCP Professional Cloud Security Engineer
Securing communications and establishing boundary protection
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
Pass with Confidence.
IT & Cybersecurity Package
You have hit the limits of our free tier, become a Premium Member today for unlimited access.
Military, Healthcare worker, Gov. employee or Teacher? See if you qualify for a Community Discount.
Monthly
$19.99
$19.99/mo
Billed monthly, Cancel any time.
3 Month Pass
$44.99
$14.99/mo
One time purchase of $44.99, Does not auto-renew.
MOST POPULAR
Annual Pass
$119.99
$9.99/mo
One time purchase of $119.99, Does not auto-renew.
BEST DEAL
Lifetime Pass
$189.99
One time purchase, Good for life.
What You Get
All IT & Cybersecurity Package plans include the following perks and exams .