This is a dedicated watch page for a single video.
At AegisSoft Ltd , an application hosted on a Compute Engine VM needs to read data from a Cloud Storage bucket . For security compliance, the IT team prohibits public access to storage buckets and follows the principle of least privilege . Which solution best satisfies the security requirements?