GCP Professional Cloud Security Engineer Practice Question
Your security team uses a single symmetric key in Cloud KMS as the customer-managed encryption key (CMEK) for both a Cloud Storage bucket that holds seven years of audit logs and a BigQuery dataset that contains the same logs for analytics. When the legally mandated retention period ends, the team must ensure the encrypted objects and tables become permanently unreadable, while keeping the bucket and dataset metadata for audit purposes. They want a one-time, deterministic action that meets this "crypto-shredding" requirement with minimal operational effort. What should they do?
Schedule destruction of the specific CMEK key version in Cloud KMS once the seven-year period ends.
Create lifecycle rules that delete the objects and tables after seven years so the CMEK is no longer referenced.
Rotate the CMEK annually and rely on automatic retirement of old key versions after seven years.
Delete IAM roles that grant the storage and BigQuery service accounts access to the CMEK after seven years.
In Google Cloud, data protected by a CMEK remains encrypted but readable as long as the key version used for encryption is enabled. Disabling the version only suspends access and can be reversed. Scheduling or executing DestroyCryptoKeyVersion on that version permanently removes the key material after the mandatory waiting period; once destroyed, any Cloud Storage objects or BigQuery tables encrypted with it can never be decrypted, yet the resources themselves continue to exist for auditing. Object lifecycle policies, IAM permission changes, or key rotation do not satisfy an irreversible crypto-shred requirement because data can still be decrypted by reenabling the key or through newer key versions.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is 'crypto-shredding' and why is it relevant in this solution?
Open an interactive chat with Bash
What is the process for using DestroyCryptoKeyVersion in Cloud KMS?
Open an interactive chat with Bash
Why do lifecycle rules, IAM permission changes, and key rotation not meet the crypto-shredding requirement?
Open an interactive chat with Bash
What is Cloud KMS and how does it support customer-managed encryption keys (CMEK)?
Open an interactive chat with Bash
What is crypto-shredding, and why is it used in data security?
Open an interactive chat with Bash
What is the difference between disabling and destroying a key version in Cloud KMS?
Open an interactive chat with Bash
GCP Professional Cloud Security Engineer
Ensuring data protection
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
Pass with Confidence.
IT & Cybersecurity Package
You have hit the limits of our free tier, become a Premium Member today for unlimited access.
Military, Healthcare worker, Gov. employee or Teacher? See if you qualify for a Community Discount.
Monthly
$19.99 $11.99
$11.99/mo
Billed monthly, Cancel any time.
$19.99 after promotion ends
3 Month Pass
$44.99 $26.99
$8.99/mo
One time purchase of $26.99, Does not auto-renew.
$44.99 after promotion ends
Save $18!
MOST POPULAR
Annual Pass
$119.99 $71.99
$5.99/mo
One time purchase of $71.99, Does not auto-renew.
$119.99 after promotion ends
Save $48!
BEST DEAL
Lifetime Pass
$189.99 $113.99
One time purchase, Good for life.
Save $76!
What You Get
All IT & Cybersecurity Package plans include the following perks and exams .