What is the appropriate action to secure a multi-tenant platform on Google Kubernetes Engine?

Disable ads (and more) with a premium pass for a one time $4.99 payment

Prepare for the Google Cloud Professional Cloud Developer Test. Benefit from mock assessments featuring flashcards and multiple-choice format, each furnished with hints and detailed explanations. Excel in your exam with confidence!

Using a namespace per tenant and employing Network Policies is a well-established approach for securing multi-tenant applications deployed on Google Kubernetes Engine (GKE). Namespaces in Kubernetes provide a mechanism for isolating resources, allowing you to maintain a clear boundary between different tenants. This helps prevent tenants from accessing each other’s resources, providing an essential layer of security in a multi-tenant environment.

Network Policies further enhance this security by defining rules for how pods communicate with each other and with other network endpoints. By applying specific network policies to the namespace, you can restrict communication between different tenants’ pods. This way, even if multiple tenants are deployed in the same cluster, the risk of data leakage or unauthorized access is minimized, as network traffic can be controlled effectively.

Although other options may provide additional security measures, they do not directly address the fundamental need for isolation and controlled interaction between tenants in a multi-tenant architecture. Proper namespace management complemented by Network Policies establishes a foundational security posture that is crucial for protecting sensitive tenant data within a shared environment.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy