Featured resource
2025 Tech Upskilling Playbook
Tech Upskilling Playbook

Build future-ready tech teams and hit key business milestones with seven proven plays from industry leaders.

Check it out
  • Lab
    • Libraries: If you want this lab, consider one of these libraries.
Labs

Designing Zero Trust Access for Hybrid Environments on Google Cloud

This hands-on lab demonstrates how to create isolated Virtual Private Cloud (VPC) environments to simulate both cloud and on-premises infrastructure. It explores the application of least-privilege firewall rules and the implementation of secure, identity-based SSH access using Identity-Aware Proxy (IAP) without relying on public IP addresses. The lab also highlights common security risks associated with traditional network-based access models. By modifying the infrastructure configuration, the environment is transitioned to a more secure architecture that removes public IP access and restricts SSH connectivity through IAP, reinforcing Zero Trust access principles.

Lab platform
Lab Info
Level
Intermediate
Last updated
Mar 24, 2026
Duration
30m

Contact sales

By clicking submit, you agree to our Privacy Policy and Terms of Use, and consent to receive marketing emails from Pluralsight.
Table of Contents
  1. Challenge

    Create Isolated VPC Environments to Simulate Cloud and on Premises Infrastructure
    • Provision separate VPC networks that represent a cloud environment and a simulated on-premises environment.
    • Deploy virtual machines within these networks to model a hybrid architecture that will later be evaluated and secured using Zero Trust principles.
  2. Challenge

    Configure Identity Aware Proxy to Enable Secure SSH Access without Public IP Addresses
    • Configure Identity-Aware Proxy (IAP) to enable secure SSH connectivity to virtual machines without exposing them to the public internet.
    • Implement identity-based access controls that authenticate users through IAM before allowing SSH access to private virtual machines.
  3. Challenge

    Apply Firewall Rules That Enforce Least Privilege Network Access
    • Configure firewall rules that restrict network access to only the required sources and ports, reducing unnecessary exposure of infrastructure resources.
    • Implement least privilege network access by allowing SSH connectivity only from trusted sources, such as the Identity-Aware Proxy (IAP) IP range.
About the author

Pluralsight Skills gives leaders confidence they have the skills needed to execute technology strategy. Technology teams can benchmark expertise across roles, speed up release cycles and build reliable, secure products. By leveraging our expert content, skill assessments and one-of-a-kind analytics, keep up with the pace of change, put the right people on the right projects and boost productivity. It's the most effective path to developing tech skills at scale.

Real skill practice before real-world application

Hands-on Labs are real environments created by industry experts to help you learn. These environments help you gain knowledge and experience, practice without compromising your system, test without risk, destroy without fear, and let you learn from your mistakes. Hands-on Labs: practice your skills before delivering in the real world.

Learn by doing

Engage hands-on with the tools and technologies you’re learning. You pick the skill, we provide the credentials and environment.

Follow your guide

All labs have detailed instructions and objectives, guiding you through the learning process and ensuring you understand every step.

Turn time into mastery

On average, you retain 75% more of your learning if you take time to practice. Hands-on labs set you up for success to make those skills stick.

Get started with Pluralsight