Your security team wants to implement a defense-in-depth approach to protect sensitive data stored in a Cloud Storage bucket. Your team has the following requirements:
✑ The Cloud Storage bucket in Project A can only be readable from Project B.
✑ The Cloud Storage bucket in Project A cannot be accessed from outside the network.
✑ Data in the Cloud Storage bucket cannot be copied to an external Cloud Storage bucket.
What should the security team do?
Baburao
Highly Voted 1 year, 7 months agoGHOST1985
1 year, 7 months agoanshad666
Most Recent 8 months, 1 week agoTonytheTiger
1 year, 5 months agoAzureDP900
1 year, 5 months agoAwesomeGCP
1 year, 6 months agotangac
1 year, 7 months ago