An application running on a Compute Engine instance needs to read data from a Cloud Storage bucket. Your team does not allow Cloud Storage buckets to be globally readable and wants to ensure the principle of least privilege. Which option meets the requirement of your team?
A. Create a Cloud Storage ACL that allows read-only access from the Compute Engine instance’s IP address and allows the application to read from the bucket without credentials
B. Use a service account with read-only access to the Cloud Storage bucket, and store the credentials to the service account in the config of the application on the Compute Engine instance
C. Use a service account with read-only access to the Cloud Storage bucket to retrieve the credentials from the instance metadata
D. Encrypt the data in the Cloud Storage bucket using Cloud KMS, and allow the application to decrypt the data with the KMS key
A. Use Forseti with Firewall filters to catch any unwanted configurations in production
B. Mandate use of infrastructure as code and provide static analysis in the CI/CD pipelines to enforce policies
C. Route all VPC traffic through customer-managed routers to detect malicious patterns in production
D. All production applications will run on-premises