Csaba Kassai | January 22, 2018
2 Minutes Read
Google Cloud Platform (GCP) has many security features built in and provided by default to its users. You can read more about the platform’s security on this link: https://cloud.google.com/security/. But, as always, security is made up of many separate, highly tunable controls. Each of these can be improved upon until you achieve complete unusability of your system. This series of blog posts will be about how to make your Google Cloud Platform project secure.
Article II.: How to Make Your Google Cloud Platform Project More Secure: IAM security
Article III.: How to Make Your Google Cloud Platform Project More Secure: Built-In GCE Security
Article IV.: How to Make Your Google Cloud Platform Project More Secure: GCE Network Security
Article V.: How to Make Your Google Cloud Platform project more secure: GCE OS Security
Keeping Up With Security Standards
With security controls, your goal is usually to set up an initial target level of security. Look for specific guidelines for your industry or stored data types to find where this level should be for your specific use case. For example, if you store or handle credit card information in any way, you must meet the Payment Card Industry Data Security Standard (PCI DSS). If you’ve determined the right security target for your application, you should aim to reach that while maximizing the ease of system use.
The Concept of Defense in Depth
There’s also a concept in security called defense in depth. This says that you’ll never be able to patch every possible hole in your system. However, you should create security measures with multiple layers. So, if there is a way to circumvent one, there’ll be other measures in place before an attacker can seize full control of your resources. It’s highly advisable to practice defense in depth in most situations regarding information systems. On Google Cloud Platform, besides the built-in security measures, there are some settings and additional controls given to the administrators.
I’ve decided to write a series of posts to describe some of these settings. I also highlighted the expected or at least reasonable values to set them to. In the next post, I’ll write about the security-related options for Identity & Access Management (IAM). Since everything starts there, you should consider securing that part of your project first. If you follow the steps written in the next post, you’ll have a much better chance of protecting yourself against account compromises. You will be protected against runaway spending or even mistakes by human administrators.
How to Power Banking Services with Google Cloud
June 23, 2022
4 Minutes Read
Here’s why your company should be using the Google Cloud features to power banking services and how it makes things easy for financial service organizations.
Google Cloud Infrastructure Modernization - Stay Agile With An Open Architecture
February 17, 2022
3 Minutes Read
Learn more about how Google Cloud infrastructure modernization solutions can help your business to become more competitive.
Google BigQuery materialized view test drive
April 7, 2022
3 Minutes Read
I have tested the BigQuery materialized views against the documentation. While most of the functionality and limitations are accurate, there are a few gotchas you need to be aware of.
Reach out, and let’s take your business to the next level.