You are implementing security for and plan to store API keys and certificates used across your Google cloud. Which of the below will you plan to use?
Click on the arrows to vote for the correct answer
A. B. C. D.Correct Answer: A.
Option A is Correct.
A secret manager can be used to store API keys, passwords, and certificates.
Option B is Incorrect.
Cloud Key Management helps manage encryption keys and cannot be used for storing API keys and certificates.
Option C is Incorrect.
The security command center cannot be used for storing API keys and certificates, but it is appropriate to be used to defend Google cloud assets against threats.
Option D is Incorrect.
Cloud Key management is an incorrect option.
https://cloud.google.com/security-command-center https://cloud.google.com/secret-manager https://cloud.google.com/security-key-managementThe recommended solution for storing API keys and certificates in Google Cloud is to use a combination of Secret Manager and Cloud Key Management. Therefore, the correct answer is option D, A & B.
Here's a brief overview of each of these services:
By using Secret Manager to store API keys and certificates, you can ensure that sensitive data is stored securely and access to it is tightly controlled.
By using Cloud KMS, you can ensure that your API keys and certificates are encrypted and stored securely. You can also manage the lifecycle of your keys, and control access to them.
While Security Command Center is a useful service for monitoring security across your cloud environment, it is not specifically designed for storing API keys and certificates.
In summary, to ensure the security of your API keys and certificates in Google Cloud, you should use Secret Manager to store your secrets, and Cloud KMS to encrypt and manage access to your secrets.