This is a dedicated watch page for a single video.
As a security administrator at your company, you oversee access controls (identification, authentication, and authorization) on Google Cloud. Which Google-recommended best practices should you follow when configuring authentication and authorization? (Choose two.)