This is a dedicated watch page for a single video.
Scenario: Your company's Google Cloud project utilizes BigQuery for data warehousing. A VPN tunnel is set up between the on-premises environment and Google Cloud through Cloud VPN. The security team is concerned about preventing data exfiltration by malicious insiders, compromised code, and accidental oversharing. Question: What steps should the security team take to address the risk of data exfiltration in this setup?