Google Updates Cloud Access Management Policies

  /     /     /  
Publicated : 22/11/2024   Category : security


Google Updates Cloud Access Management Policies


Custom roles for Cloud Identity and Access Management will give users full control of 1,287 public permissions in the Google Cloud.



Google today released a beta version of custom roles for Cloud Identity and Access Management (IAM) on the Google Cloud Platform (GCP) that provides more granular control over data access permissions.
IAM has three basic roles for Owner, Editor, and Viewer, and more than 100 service-specific predefined roles that combine curated permissions to perform tasks on the GCP. Predefined roles are often used to control access to GCP services; for example, the Cloud SQL Viewer role combines all the permissions needed to let users browse and export databases.
Custom roles give users precise control over the 1,287 public permissions for GCP services. This tightens data security in the case someone like an auditor needs to access a database and gather data, but doesnt need to read the actual information. Admins can build a custom role so auditors have permission to access databases but cannot export their contents.
Google advises building custom roles by starting with a predefined role and adjusting it for the organizations needs. IAM supports custom roles across projects and full organizations to centralize role development, testing, maintenance, and sharing.
Read more details on the new Google offering 
here
.
Join Dark Reading LIVE for two days of practical cyber defense discussions. Learn from the industry’s most knowledgeable IT security experts. Check out the INsecurity
agenda here
.

Last News

▸ ArcSight prepares for future at user conference post HP acquisition. ◂
Discovered: 07/01/2025
Category: security

▸ Samsung Epic 4G: First To Use Media Hub ◂
Discovered: 07/01/2025
Category: security

▸ Many third-party software fails security tests ◂
Discovered: 07/01/2025
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Google Updates Cloud Access Management Policies