🔥 40% Off Crucial Exams Memberships — Deal ends today!

1 hour, 0 minute remaining!

GCP Professional Cloud Security Engineer Practice Question

Your organization uses an infrastructure-as-code pipeline to spin up new Google Cloud projects and VM instances for internal development teams. Security has discovered that many Compute Engine VMs still run with the Compute Engine default service account, which in each new project is automatically granted the Project Editor role. Compliance now requires:

  • No new project may automatically grant broad roles (such as Editor) to its default service account or allow VMs to run with that account unless engineers explicitly choose to do so.
  • Existing applications that already depend on the default service account must keep working until they are migrated to least-privilege, so the account itself must remain active.
  • Any future creation of user-managed keys for the default service accounts must be detected immediately and routed to the security operations Pub/Sub topic for investigation.

Which solution meets all of these requirements with the least operational disruption?

  • Disable the Compute Engine default service account at the organization level, force each project to create a new service account, and rely on Cloud Asset Inventory exports to detect any user-managed key creation via daily batch reports.

  • Remove the Editor role from each default service account, create an IAM Deny policy blocking iam.serviceAccounts.actAs on that account, and enable the constraints/iam.disableServiceAccountKeyUpload policy to satisfy the detection requirement.

  • Enable the constraints/iam.automaticIamGrantsForDefaultServiceAccounts Organization Policy, update the Terraform module to set a specific service account or no-service-account on new instances, and create an organization-level log sink that exports ServiceAccountKeyOperations.Create audit logs to a Pub/Sub topic subscribed to by the security team.

  • Delete the default service account in every existing project, enable the constraints/iam.disableServiceAccountCreation policy, and configure Access Transparency to notify the security team when new service account keys are created.

GCP Professional Cloud Security Engineer
Configuring Access
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot