(T-GCPAZURE-B) Module 2 - Getting Started With Google Cloud Platform
(T-GCPAZURE-B) Module 2 - Getting Started With Google Cloud Platform
Google Cloud
Cloud security requires collaboration
● Google is responsible Responsibility On-
premises
Infrastructure
as a Service
Platform as a
Service
Managed
services
for managing its
Content
infrastructure security. Access policies
Usage
● You are responsible Deployment
Identity
Network
Customer-managed
Storage and encryption
Google-managed Hardware
Resource hierarchy levels define trust boundaries
● Group your resources according Org Node Company
Product 1 Product 2
Test Prod
Projects
Cloud Cloud
Project Project
Resources
VMs Storage
All Google Cloud services you
use are associated with a project
Assigned by Google
Project number Globally unique Immutable
Cloud
Folders offer flexible management
● Folders group projects under an
organization. example.com
● Folders can contain projects, other
folders, or both.
● Use folders to assign policies.
Folder A Folder B
Create
Notable organization
roles:
[email protected] example.com
Organization Policy
Organization Admin
Administrator: Broad
control over all cloud
resources
Create
Project Creator:
Fine-grained control of
[email protected] project_1 project_2 project creation
Project Creator
An example IAM resource hierarchy
● A policy is set on a resource.
Organization
○ Each policy contains a set example.com
of roles and role members.
● Resources inherit policies
Policy Inheritance
Project
from parent.
bookshelf bookshelf bookshelf
○ Resource policies are a
union of parent and
resource.
Compute App Cloud Cloud Cloud
● A less restrictive parent
Resources
BigQuery
Engine Engine Storage Storage Pub/Sub
Google Cloud
Management Groups
Organization
Folders Subscriptions
Resources Resources
Google Cloud and Azure billing have different levels of
flexibility
Google Cloud billing by project Azure billing by subscription
contract contract
Google Cloud
Management Groups
Organization
Folders Subscriptions
Resources Resources
Google Cloud and Azure billing have different levels of
flexibility
Google Cloud billing by project Azure billing by subscription
contract contract
Google Cloud
Management Groups
Organization
Folders Subscriptions
Resources Resources
Google Cloud and Azure billing have different levels of
flexibility
Google Cloud billing by project Azure billing by subscription
contract contract
Google Cloud
Management Groups
Organization
Folders Subscriptions
Resources Resources
Google Cloud and Azure billing have different levels of
flexibility
Google Cloud billing by project Azure billing by subscription
contract contract
Google Cloud
Management Groups
Organization
Folders Subscriptions
Resources Resources
Google Cloud and Azure billing have different levels of
flexibility
Google Cloud billing by project Azure billing by subscription
contract contract
Google Cloud
Management Groups
Organization
Folders Subscriptions
Resources Resources
Google Cloud and Azure billing have different levels of
flexibility
Google Cloud billing by project Azure billing by subscription
contract contract
Google Cloud
Management Groups
Organization
Folders Subscriptions
Resources Resources
Summary of resource hierarchy differences
Summary of resource hierarchy differences
Google Cloud term Azure term
Billing
Many per account One per account
accounts
Summary of resource hierarchy differences
Google Cloud term Azure term
Billing
Many per account One per account
accounts
Management groups,
Account, org, folder,
Policy levels subscriptions, Resource
project
groups
Summary of resource hierarchy differences
Google Cloud term Azure term
Billing
Many per account One per account
accounts
Management groups,
Account, org, folder,
Policy levels subscriptions, Resource
project
groups
Management groups,
Account, org, folder,
Policy levels subscriptions, Resource
project
groups
Service account
test@project_id.iam.gserviceaccount.com
Google group
Who [email protected]
A project can have multiple owners, editors, viewers, and billing administrators
IAM predefined roles apply to a particular Google Cloud
service in a project
Google
Group ✔ compute.instances.delete
✔ compute.instances.get
InstanceAdmin ✔ compute.instances.list
Role ✔ compute.instances.setMachineType
✔ compute.instances.start
✔ compute.instances.stop
...
project_a
IAM custom roles let you define a precise set of permissions
Google
Group
✔ compute.instances.get
✔ compute.instances.list
InstanceOperator
Role ✔ compute.instances.start
✔ compute.instances.stop
...
project_a
Service Accounts control server-to-server interactions
● Provide an identity for carrying out server-to-server interactions in a project
● Used to authenticate from one service to another
● Used to control privileges used by resources
○ So that applications can perform actions on behalf of authenticated end
users
● Identified with an email address:
[email protected]
[email protected]
Service Accounts and IAM
● Service accounts authenticate using keys.
○ Google manages keys for Compute Engine and App Engine.
● You can assign a predefined or custom IAM role to the service account.
bucket_1
Key differences between Google Cloud and Azure for access
management
IAM concept Google Cloud Azure
User identity Managed outside Cloud IAM. Managed via Active Directory.
Identity federated to external Identity federated to external
identity management system. identity management system.
Key differences between Google Cloud and Azure for access
management
IAM concept Google Cloud Azure
User identity Managed outside Cloud IAM. Managed via Active Directory.
Identity federated to external Identity federated to external
identity management system. identity management system.
User identity Managed outside Cloud IAM. Managed via Active Directory.
Identity federated to external Identity federated to external
identity management system. identity management system.
User identity Managed outside Cloud IAM. Managed via Active Directory.
Identity federated to external Identity federated to external
identity management system. identity management system.
>_
Google Cloud Console