Academy

Module 1 Β· Google Cloud Platform Security πŸ”’

Manish Garg
Manish Garg Associate CISSP Β· RingSafe
April 22, 2026
5 min read

Google Cloud Platform (GCP) has a different design philosophy from AWS or Azure: hierarchical resource management with projects as the primary isolation unit, IAM that’s simpler in some ways and more powerful in others, and tooling that reflects Google’s internal infrastructure heritage. This module covers GCP’s security model and the practical hardening checklist.

The resource hierarchy

ORGANIZATION (your company's GCP root)
  └─ FOLDER (e.g., "Production")
      └─ FOLDER (e.g., "App-Team-A")
          └─ PROJECT (e.g., "app-prod-12345")
              └─ RESOURCE (Compute Engine VM, GCS bucket, etc.)

Permissions inherit downward. Granting a role at Organization scope = role on every project in the org. Project is the primary isolation boundary β€” separate billing, separate API enablement, separate IAM policy.

IAM model

  • Members: Google accounts, service accounts, Google groups, Cloud Identity domains, allAuthenticatedUsers (any Google account), allUsers (anyone)
  • Roles: bundles of permissions. Three types:
    • Basic roles (legacy) β€” Owner, Editor, Viewer. Avoid; too broad
    • Predefined roles β€” service-specific (e.g., Cloud SQL Admin, Storage Object Viewer)
    • Custom roles β€” define your own permission set
  • Conditions: attribute-based access conditions (e.g., grant only during business hours, only from specific IPs)
  • IAM bindings attach members to roles at a specific resource scope

Service accounts β€” the most-confused element

Service accounts are GCP’s machine identities. Patterns:

πŸ” Intermediate Module Β· Basic Tier

Continue reading with Basic tier (β‚Ή499/month)

You've read 30% of this module. Unlock the remaining deep-dive, quiz, and every other Intermediate module.

99+ modulesAll levels up to this tier
20-question quizzesUnlimited retries with explanations
Completion certificatesShareable on LinkedIn
4 more sections locked below