Independence Day Deal! Unlock 25% OFF Today – Limited-Time Offer - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Google Exam Professional Cloud Security Engineer Topic 1 Question 64 Discussion

Actual exam question for Google's Professional Cloud Security Engineer exam
Question #: 64
Topic #: 1
[All Professional Cloud Security Engineer Questions]

Your organization is using GitHub Actions as a continuous integration and delivery (Cl/CD) platform. You must enable access to Google Cloud resources from the Cl/CD pipelines in the most secure way.

What should you do?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

Felicidad
1 months ago
Option C with a GKE cluster and Workload Identity is also a good choice. But if I had to pick one, I'd go with D. Gotta keep those cloud credentials secure, ya know?
upvoted 0 times
Glory
14 days ago
C) Configure a Google Kubernetes Engine cluster that uses Workload Identity to supply credentials to GitHub.
upvoted 0 times
...
Fanny
16 days ago
B) Create a service account key and add it to the GitHub repository content.
upvoted 0 times
...
Yan
19 days ago
A) Create a service account key and add it to the GitHub pipeline configuration file.
upvoted 0 times
...
...
Pamella
1 months ago
Haha, storing a service account key in the repo? That's like leaving your house keys under the doormat. Option D is the clear winner here.
upvoted 0 times
Jose
7 days ago
C) Configure a Google Kubernetes Engine cluster that uses Workload Identity to supply credentials to GitHub.
upvoted 0 times
...
Cyril
15 days ago
B) Create a service account key and add it to the GitHub repository content.
upvoted 0 times
...
Juliana
16 days ago
A) Create a service account key and add it to the GitHub pipeline configuration file.
upvoted 0 times
...
...
Kirby
1 months ago
I agree, option D is the way to go. Workload identity federation is the recommended approach for this use case. Storing sensitive service account keys in the pipeline config or repository is a big no-no.
upvoted 0 times
...
Janey
1 months ago
Option D seems like the most secure way to enable access to Google Cloud resources from the CI/CD pipelines. Using workload identity federation to integrate GitHub as an identity provider is a best practice.
upvoted 0 times
Chanel
6 days ago
D) Configure workload identity federation to use GitHub as an identity pool provider.
upvoted 0 times
...
Darell
7 days ago
B) Create a service account key and add it to the GitHub repository content.
upvoted 0 times
...
Adelle
10 days ago
A) Create a service account key and add it to the GitHub pipeline configuration file.
upvoted 0 times
...
...
Yong
3 months ago
I'm not sure, but configuring workload identity federation to use GitHub as an identity pool provider could also be a good option.
upvoted 0 times
...
Kirby
3 months ago
I agree with Reita, adding the service account key to the pipeline configuration file seems like the most secure option.
upvoted 0 times
...
Reita
3 months ago
I think we should create a service account key and add it to the GitHub pipeline configuration file.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77