Google Cloud Professional Cloud Security Engineer Practice Exam

Disable ads (and more) with a membership for a one time $4.99 payment

Question: 1 / 330

What two actions should a company take to manage IAM permissions between users in development and production environments? (Choose two.)

Create a folder for each development and production environment

Creating a folder for each development and production environment is a sound approach to manage IAM permissions effectively. By organizing environments into distinct folders, the company can apply specific IAM policies tailored to each environment. This structure helps restrict access, ensuring that development users cannot inadvertently or maliciously interfere with production resources. It also simplifies the management of permissions; changes can be made at the folder level rather than individually or across a broader organizational structure.

In addition to creating folders, assigning users to groups based on their permission levels complements this organizational strategy. Group-based access controls streamline permission management by enabling the assignment of roles to a collective user group rather than individual assignments. This is particularly beneficial in environments where multiple users require similar access rights, ensuring that each user has the appropriate level of access based on their role, whether it be in development or production. By managing permissions at the group level, the organization maintains better oversight and reduces administrative overhead.

Implementing an organizational policy constraint could potentially control some aspects of permissions, but it does not directly address the distinct separation of environments or the efficient management of user roles. Meanwhile, multi-factor authentication, while crucial for enhancing overall security, does not directly pertain to IAM permission management between environments. Therefore, the combination of folders and groups represents a

Create an Organizational Policy constraint for each folder environment

Assign users to groups based on their permission levels

Implement a multi-factor authentication process for all users

Next

Report this question