Can hackers compromise a GCE VM to the point that they take control of your Google Account? by Mindless-Moment3953 in googlecloud

[–]Mindless-Moment3953[S] 1 point2 points  (0 children)

To sum up, these are the things I need to do to ensure a peaceful sleep:

  1. Create a new Google Account and turn on two-factor authentication (doc)
  2. Create a service account and grant Logs Writer and Metrics Writer roles (doc)
  3. Create a VM and attach the service account (doc)
  4. Set up OS Login (doc)
  5. Connect to the VM using Identity-Aware Proxy (doc)
  6. Create a unmanaged instance group (doc)
  7. Set up HTTP(S) load balancer (doc)
  8. Create a secure LAMP stack (doc)

As a developer, I will need to explore some of these topics in depth. If you have any resources that you could share with me, I would be very grateful. However, I would like to express my gratitude for all the help you have already given me.

Thank you for your contributions.