Cloud Privacy

It is often asked - what happens to my data in cloud? Is it safe and secure? Who has access? We all know that trust is created through transparency. For this reason; Google Cloud has created trust principles.
Read full article on medium

Security Fundamentals

You may be wondering about the kind of security measures available to you when building apps in the cloud? How can Google Cloud help with security of your apps? In this issue of GCP Comics we are covering exactly that!
Read full article on medium

Defense in Depth

Defense in depth describes the multiple layers of defense that Google uses to protects it's network from external attacks. Only authorized services and protocols that meet the security requirements are allowed.
Read full article on medium

Encryption

Encryption is a process that takes plaintext as input, and transforms it into an output (ciphertext) that reveals little or no information about the plaintext. When you use Google Cloud, the data is encrypted at rest and in transit to protect the data.
Read full article on medium

Identity & Zero Trust

In a zero trust network no person, device, or network enjoys inherent trust. All trust, which allows access to information, must be earned, and the first step of that is demonstrating valid identity. System identifies who you are, what you have access to and then adds authorization to it.
Read full article on medium

Zero Trust & Keys

A security key is a physical device that works alongside your username and password to verify your identity to a site or app. The same device can be used for many services, so you don't need to carry around a necklace of dongles and fobs providing stronger protection.
Read full article on medium

Know your Devices

In a Zero Trust environment, every device has to earn trust in order to be granted access. To do that, the security system relies on device metadata, such as what software is running or when the OS was last updated, and checks to see if the device meets that organization's minimum bar for health.
Read full article

Protect it with a Proxy

A reverse proxy stands in front of your data, services, or virtual machines, catching requests from anywhere in the world and carefully checking each one to see if it is allowed. In order to decide (yes or no) the proxy will look at who and what.
Read full article

Glue it with Policy

A reverse proxy stands in front of your data, services, or virtual machines, catching requests from anywhere in the world and carefully checking each one to see if it is allowed. In order to decide (yes or no) the proxy will look at who and what.
Read full article