This chapter delves into perimeter and boundary security for GCP workloads, moving beyond identity and resource access control to focus on network protection.
In our actor analogy, while Chapter 2’s focus was the “who can do something on what,” this chapter’s focus is the “where.” The “who” is the identity or the principal. The “what” is the GCP resource—always exposed by a service—which the principal ...