Automating Role-Based Security in GCP

By Saravanan Dhandapani

This course will teach you how to automate the many security-related tasks for credentials, policies, and identity management.

2.7 hours
  • 23 Lessons
  • 1 Course Quiz

About the course

In this course, Automating Role-Based Security in GCP, you’ll learn how to automate securing users, groups, service accounts, and their permissions to access various resources in a project, as well as the best practices to achieve this security. First, you’ll explore how to automate password management and rotate secrets consistently. Next, you’ll learn about Policy Intelligence, the many security tools that are part of it, and their usage in automating various security-related tasks. Finally, you’ll learn how to manage service accounts and rotate service account keys. When you’re finished with this course, you’ll have the skills and knowledge to automate your security needs, eliminate the manual steps in your operation process, and automatically secure the users, groups, and service accounts in a project.

  • Chapter 1 1 Lesson Introduction 1:58

    Course Introduction

    1:58
  • Chapter 2 6 Lessons Automating Credential Management 36:21

    Introduction

    2:22

    Getting Up to Speed with IAM

    8:17

    Demo: Automating Password Management

    5:49

    Demo: Rotating Secrets and Keys

    10:40

    Best Practices in Managing Credentials

    5:52

    Summary

    3:21
  • Chapter 3 8 Lessons Automating Policy Management 43:17

    Introduction

    2:19

    Demo: Configuring Constraints on Resources Using Organization Policy

    9:44

    Introducing Policy Intelligence

    4:29

    Demo: Implementing Least Privilege Using IAM Recommender

    6:20

    Demo: Analyzing Policies Using Policy Analyzer

    6:28

    Demo: Debugging Policies Using Policy Troubleshooter

    5:15

    Demo: Securely Rolling Out Policies Using Policy Simulator

    5:01

    Summary

    3:41
  • Chapter 4 7 Lessons Automating Identity Management 45:58

    Introduction

    2:12

    Demo: Managing User Accounts and Groups

    8:57

    Demo: Using Audit Logs to Detect Potential Security Breaches

    4:38

    Interacting with Google Services Using a Service Account

    6:53

    Demo: Monitoring Service Accounts and Service Account Keys

    8:19

    Best Practices in Identity Management

    11:30

    Summary

    3:29
  • Chapter 5 2 Lessons Conclusion 33:33

    Course Summary and Next Steps

    3:33

    Quiz - Automating Role Based Security in GCP

    30:00 Quiz

Practice alongside courses in Cloud Playground

What is Cloud Playground? Cloud Playground lets you build skills in real-world AWS, Google Cloud, and Azure environments. Spin up risk-free Sandboxes, Servers and Terminals and follow along with courses, test a new idea or prepare for exams.

Get Started
Who’s going to be learning?
Sign In
Welcome Back!

Psst…this one if you’ve been moved to ACG!