Archives for Google Cloud Security - Page 3
Breakglass Role in GCP
This content is password protected. To view it please enter your password below: Password:
Packet Filtering Options versus Packet Monitoring Options
All public clouds will provide a packet monitoring option in the way of flow logs (VPC Flow Logs) However, packet monitoring is not the same as packet filtering. The closest…
IAM + VPC Service Controls = GCP 2 minute Security Solution
Also read - Identity Aware Proxy in GCP Overview IAM is the most often misconfigured and compromised service. To that end, GCP provides two unique services (boundaries) that go beyond…
Endpoint Protection in GCP
Cloud Armor is the first line of defense for GCP Cloud Endpoint Security
Default Firewall Rules in GCP
Also read - Best practices for GCP Firewall Rules and Firewall Policies in GCP For a VM that lives in the default VPC, there are a few default firewall rules…
GCP Encrypted Traffic – How to Monitor
By default all traffic in GCP is encrypted. How does one capture traffic in logs ( VPC Flow logs) if it is all encrypted? GCP stores (logs) a copy of…
Unsafe Practices on GCP and recommendations
(Also read, AWS Security Audits ) Google Cloud is leading the way in terms of several PaaS offerings. GCP's App Engine, GKE and BigQuery are among the leaders in the…