Google Cloud DevOps Certification Practice Test

Session length

1 / 20

Which IAM policy ensures compliance with security standards while allowing necessary access?

Roles/logging.viewer for all team members

Roles/logging.privateLogViewer assigned to groups

The choice of assigning "Roles/logging.privateLogViewer" to groups is effective because it balances the need for compliance with security standards while ensuring that team members have the appropriate level of access to perform their roles. This role specifically grants access to view private logs, which is crucial for auditing and compliance without overwhelming users with excessive permissions.

Using predefined roles like "Roles/logging.privateLogViewer" helps maintain a clear boundary of what users can access, fostering a controlled environment that aligns with security practices. This approach minimizes the risk of data leaks or unauthorized access, as it limits visibility to only what is necessary for the teams designated to monitor or audit log data.

In contrast, providing "Roles/logging.viewer" to all team members could lead to more widespread access than needed, potentially violating security policies. Custom roles for selective access can be beneficial, but they require significant upfront planning and management to ensure they meet the compliance requirements effectively. Admin roles assigned for audit purposes may unintentionally grant higher privileges than necessary, which could also conflict with the principle of least privilege, a key aspect of security compliance.

Get further explanation with Examzify DeepDiveBeta

Custom roles for selective access

Admin roles for audit purposes

Next Question
Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy