This is the first part of a series on Google Cloud Platform. Part I will discuss GCP security infrastructure.
You might be wondering what makes GCP so appealing to companies like Spotify, Apple, Evernote, Evernote, Evernote, and Netflix. Despite Google’s late entry into the public cloud business in 2011, they have a long-running history with high-demand services such as Google Search and Google Maps. This is built on their custom-made infrastructure. It proves that they can offer world-class products that we all depend upon. Google Cloud Platform is an expansion of their existing services. However, the backbone of these products and the company philosophy is to ensure data safety.
Google’s years of experience as a target for hackers and denial-of-service bots has made them a leader in security. Google built a sophisticated security infrastructure that few other companies or organizations can match. Google views security holistically. It covers everything from the physical data centres, to the data pipelines connecting them, and down to the training of each employee responsible for managing the infrastructure.
Let’s take a look at the security infrastructure one by one and see how Google has built a data fortress.
The Human Element
It’s useless if your employees don’t understand security. Google employees are given extensive training in security issues from the very beginning of their job. Google continues to strengthen their “security culture” by hosting security conferences and training.
Google Access Transparency is a tool that allows you to see in real-time logs how GCP administrators access your content. This includes during support events you initiate. It integrates with StackDriver and allows you to include the GCP administrator monitoring access in your regular monitoring routinet. Additional data protection controls are included to limit Google’s access to your data, except for when it is necessary to fulfill their contractual obligations to them. Google has already committed to keeping your data secure, but it is comforting to know that there are controls for you to verify and trust.
There are many types of physical security, from locks to redundancies. The data centers have the most advanced security features, including multi-factor authentication and biometrics for anyone who has access to the floor. The data centers are protected by highly-trained, well-vetted security personnel. The power is redundant. It comes from at least two sources equal with backup generators. Overheating can cause hardware failures, and cooling systems prevent heat from causing fire detection and suppression systems to stop fires. They also use the most environmentally friendly technologies to reduce their power consumption, and rely less on the grid.
Google custom-designs hardware and manufactures it to minimize vulnerabilities found on public hardware. They also customized the Linux-based OS to provide the most secure and fault-tolerant environment while still being flexible enough to meet customer needs. The custom software monitors the system for any modifications and returns it to the original image if detected. This ensures that the system is always running smoothly.
Google closely monitors all hardware to ensure that data is not removed by anyone else. They use a multi-stage process to extract data from malfunctioning drives and then secure destroy the drives before they can be recycled.
Google’s network is vast and covers a lot of the globe.