Your security team wants to implement a defense-in-depth approach to protect sensitive data stored in a Cloud Storage bucket. Your team has the following requirements:
✑ The Cloud Storage bucket in Project A can only be readable from Project B.
✑ The Cloud Storage bucket in Project A cannot be accessed from outside the network.
✑ Data in the Cloud Storage bucket cannot be copied to an external Cloud Storage bucket.
What should the security team do?
Baburao
Highly Voted 1 year, 11 months agoGHOST1985
1 year, 10 months agoanshad666
Most Recent 11 months, 3 weeks agoTonytheTiger
1 year, 8 months agoAzureDP900
1 year, 9 months agoAwesomeGCP
1 year, 10 months agotangac
1 year, 11 months ago