Section 4: Data Management - DEEPSEEK

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/59

flashcard set

Earn XP

Description and Tags

DEEPSEEK

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

60 Terms

1
New cards
Least Privileged Access
Granting users only the permissions essential for their tasks to minimize security risks.
2
New cards
IAM Basic Roles
Predefined roles (e.g., Viewer, Editor, Owner) offering broad access across Google Cloud services.
3
New cards
IAM Predefined Roles
Granular roles for specific services (e.g., BigQuery Data Viewer, Cloud Storage Admin).
4
New cards
Cloud Storage Access Control
Methods like IAM policies, ACLs, or signed URLs to manage data access permissions.
5
New cards
Public Access
Allowing anonymous users to read/write Cloud Storage buckets (use with caution).
6
New cards
Uniform Access Control
Applying consistent IAM policies across all objects in a Cloud Storage bucket.
7
New cards
Analytics Hub
A service for securely sharing and subscribing to curated datasets across organizations.
8
New cards
Data Sharing Governance
Policies and tools to control how data is shared internally or externally.
9
New cards
Cloud Storage Classes
Storage tiers (Standard, Nearline, Coldline, Archive) optimized for cost and access frequency.
10
New cards
Lifecycle Rules
Automated policies to delete, archive, or downgrade storage class of objects over time.
11
New cards
Retention Requirements
Business or regulatory rules dictating how long data must be preserved.
12
New cards
Object Deletion Rules
Configuring automatic deletion of Cloud Storage objects after a set period.
13
New cards
Data Archiving
Storing rarely accessed data in low-cost services like Archive Storage or Coldline.
14
New cards
High Availability
Designing systems to remain operational during outages (e.g., multi-regional redundancy).
15
New cards
Disaster Recovery
Strategies to restore data after catastrophic events (e.g., backups, cross-region replication).
16
New cards
Backup Solutions
Google-managed options (e.g., Cloud SQL automated backups) or custom snapshots.
17
New cards
Replication Use Cases
Copying data across regions for compliance, latency reduction, or redundancy.
18
New cards
Primary Storage Location
The main region where data is stored and accessed (e.g., regional buckets).
19
New cards
Secondary Storage Location
A backup region for redundancy (e.g., dual-regional or multi-regional buckets).
20
New cards
Regional Redundancy
Storing data in multiple zones within a single geographic region.
21
New cards
Multi-Regional Redundancy
Distributing data globally across regions for maximum availability.
22
New cards
CMEK (Customer-Managed Keys)
Encryption keys managed by the user via Cloud KMS for granular control.
23
New cards
CSEK (Customer-Supplied Keys)
Encryption keys provided by the customer for Cloud Storage object encryption.
24
New cards
GMEK (Google-Managed Keys)
Default encryption keys managed automatically by Google Cloud.
25
New cards
Encryption in Transit
Securing data during transfer using protocols like TLS/SSL.
26
New cards
Encryption at Rest
Protecting stored data using encryption keys (e.g., CMEK, CSEK).
27
New cards
Cloud KMS
A service for managing encryption keys, including rotation and access policies.
28
New cards
GDPR Compliance
Adhering to EU data privacy regulations for user consent and data protection.
29
New cards
CCPA Compliance
Following California Consumer Privacy Act rules for data transparency and opt-out.
30
New cards
Data Sovereignty
Ensuring data is stored and processed in specific geographic locations per legal requirements.
31
New cards
Least Privileged Access
Granting users only the permissions essential for their tasks to minimize security risks.
32
New cards
IAM Basic Roles
Predefined roles (e.g., Viewer, Editor, Owner) offering broad access across Google Cloud services.
33
New cards
IAM Predefined Roles
Granular roles for specific services (e.g., BigQuery Data Viewer, Cloud Storage Admin).
34
New cards
Cloud Storage Access Control
Methods like IAM policies, ACLs, or signed URLs to manage data access permissions.
35
New cards
Public Access
Allowing anonymous users to read/write Cloud Storage buckets (use with caution).
36
New cards
Uniform Access Control
Applying consistent IAM policies across all objects in a Cloud Storage bucket.
37
New cards
Analytics Hub
A service for securely sharing and subscribing to curated datasets across organizations.
38
New cards
Data Sharing Governance
Policies and tools to control how data is shared internally or externally.
39
New cards
Cloud Storage Classes
Storage tiers (Standard, Nearline, Coldline, Archive) optimized for cost and access frequency.
40
New cards
Lifecycle Rules
Automated policies to delete, archive, or downgrade storage class of objects over time.
41
New cards
Retention Requirements
Business or regulatory rules dictating how long data must be preserved.
42
New cards
Object Deletion Rules
Configuring automatic deletion of Cloud Storage objects after a set period.
43
New cards
Data Archiving
Storing rarely accessed data in low-cost services like Archive Storage or Coldline.
44
New cards
High Availability
Designing systems to remain operational during outages (e.g., multi-regional redundancy).
45
New cards
Disaster Recovery
Strategies to restore data after catastrophic events (e.g., backups, cross-region replication).
46
New cards
Backup Solutions
Google-managed options (e.g., Cloud SQL automated backups) or custom snapshots.
47
New cards
Replication Use Cases
Copying data across regions for compliance, latency reduction, or redundancy.
48
New cards
Primary Storage Location
The main region where data is stored and accessed (e.g., regional buckets).
49
New cards
Secondary Storage Location
A backup region for redundancy (e.g., dual-regional or multi-regional buckets).
50
New cards
Regional Redundancy
Storing data in multiple zones within a single geographic region.
51
New cards
Multi-Regional Redundancy
Distributing data globally across regions for maximum availability.
52
New cards
CMEK (Customer-Managed Keys)
Encryption keys managed by the user via Cloud KMS for granular control.
53
New cards
CSEK (Customer-Supplied Keys)
Encryption keys provided by the customer for Cloud Storage object encryption.
54
New cards
GMEK (Google-Managed Keys)
Default encryption keys managed automatically by Google Cloud.
55
New cards
Encryption in Transit
Securing data during transfer using protocols like TLS/SSL.
56
New cards
Encryption at Rest
Protecting stored data using encryption keys (e.g., CMEK, CSEK).
57
New cards
Cloud KMS
A service for managing encryption keys, including rotation and access policies.
58
New cards
GDPR Compliance
Adhering to EU data privacy regulations for user consent and data protection.
59
New cards
CCPA Compliance
Following California Consumer Privacy Act rules for data transparency and opt-out.
60
New cards
Data Sovereignty
Ensuring data is stored and processed in specific geographic locations per legal requirements.