How to make your Google Cloud Platform project secure: An introduction

How to make your Google Cloud Platform project secure: An introduction
How to make your Google Cloud Platform project secure: An introduction

Google Cloud Platform (GCP) has many security features built in and provided by default to its users. You can read more about the platform’s security on this link: https://cloud.google.com/security/. But, as always, security is made up of many separate, highly tunable controls. Each of these can be improved upon until you achieve complete unusability of your system. This series of blog posts will be about how to make your Google Cloud Platform project secure.

Keeping Up With Security Standards

With security controls, your goal is usually to set up an initial target level of security. Look for specific guidelines for your industry or stored data types to find where this level should be for your specific use case. For example, if you store or handle credit card information in any way, you must meet the Payment Card Industry Data Security Standard (PCI DSS).

If you’ve determined the right security target for your application, you should aim to reach that while maximizing the ease of system use.

The Concept of Defense in Depth

There’s also a concept in security called defense in depth. This says that you’ll never be able to patch every possible hole in your system. However, you should create security measures with multiple layers. So, if there is a way to circumvent one, there’ll be other measures in place before an attacker can seize full control of your resources. It’s highly advisable to practice defense in depth in most situations regarding information systems.

On Google Cloud Platform, besides the built-in security measures, there are some settings and additional controls given to the administrators. I’ve decided to write a series of posts to describe some of these settings. I also highlighted the expected or at least reasonable values to set them to.

In the next post, I’ll write about the security-related options for Identity & Access Management (IAM). Since everything starts there, you should consider securing that part of your project first. If you follow the steps written in the next post, you’ll have a much better chance of protecting yourself against account compromises. You will be protected against runaway spending or even mistakes by human administrators.