This is a dedicated watch page for a single video.
You oversee a mission-critical workload for your organization in a highly regulated industry. The workload employs Compute Engine VMs to analyze and process sensitive data after it's uploaded to Cloud Storage from endpoint computers. However, your compliance team has identified that the workload doesn't adhere to the data protection requirements for sensitive data. To meet these requirements, which include managing encryption keys outside the Google Cloud boundary and maintaining full control over encryption keys via a third-party provider, while also encrypting and decrypting sensitive data, what actions should you take? Choose two options: