Sunteți pe pagina 1din 6

Google Cloud Platform Security

F. A. Author
Your name, University etc.

Abstract— This research paper will examine Google Cloud Platform security
infrastructure. It will be analyzed how Google Cloud Platform security is designed,
as well as the infrastructure features. The paper will investigate how Google
Cloud protect its data, including the organizational and technical controls,
followed by Google compliance regulatory requirements.

1. INTRODUCTION multi-national businesses and corporations,


can simply use any type of service from the
In today’s digitalized era, organizations are Cloud [2].
utilizing IT operations in order to develop Currently, there are many Cloud providers,
applications quicker and sustain innovations but only few are the biggest players on the
to preserve their competitive position in the market. One of the cloud pioneers and
modern digital world. As indicated by many revolutionizers is Google, which today offers
prestigious specialists from the IT industry, 90 products that belong to Google Cloud.
cloud computing is the third huge wave in the Therefore, Google provides these wide range
Information Technology business, which of services for numerous organizations and
became a vital aspect in different sectors and individuals globally. Google Cloud Platform is
areas [1]. a part of Google Cloud, which provides
The integration of cloud computing today is Infrastructure as a Service, Platform as a
generating a change in the way organizations Service and serverless computing
operate and in general the way people live. environments. Google Cloud Platform delivers
The Cloud can offer convenient, ubiquitous cost efficient architectures that support the
and on demand network access and transmission, storage and intensive
application to resources like: storage services, computing of data [3].
networks, computing services, infrastructure Nevertheless, the main question is, all the
etc. without the need of any funds or data, private information, confidential
expenditures. From an individual user to possessions of organizations or personal

Your name*
University* Year*
property of individuals are safe and secure? In
today’s modern society, information has
become the most expensive commodity.
This research paper will examine Google
Cloud Platform security infrastructure. It will
be analyzed how Google Cloud Platform
security is designed, as well as the
infrastructure features. The paper will
investigate how Google Cloud protect its data,
including the organizational and technical
controls, followed by Google compliance
regulatory requirements.

2. LITERATURE REVIEW
Figure 1: Cloud security

As previously stated, Cloud Security is very


important aspect when it comes to
organizations and individuals. Security is the GOOGLE INFRASTRUCTURE SECURITY LAYERS
main retrain that is holding back the growth
of cloud computing in the long run.
Nowadays, cloud providers main worry is From the picture bellow it can be seen that
forfeiting customer information or data to Google Infrastructure is consistent of 6 layers,
cyber attackers. Google’s global network of which start from physical security data
users reaches billions of customers. centers lifting to hardware and software
Therefore, one of the main challenges the structure. Therefore, all the six layers are
company faces is persistent protection of its properly situated in place in order to define all
global network against cyber threats, which the processes involved in sequence to support
are continuously growing. For the same operational security [5].
reason, Google invests profoundly in securing
its infrastructure from the possible dangers.
Consequently, Google Cloud Platform has
become one of the most secure Cloud
providers and preferred platforms globally.
This chapter will elaborate how GCP plays a
vital role in the Cloud industry and how it
became the most secure platform [4].

Figure 2: Google Infrastructure Security Layer

2
Hardware Infrastructure
2. Inter-Service Access Management: With
Hardware infrastructure or the lowest level
assistance of Google engineers, this
infrastructure is basically consistent of three
infrastructure operates in a way that detects
components:
individual identities, so that services can
1. Security of Physical Premises: Include data accept or deny the following access. Strong
centers, which have numerous coatings of management systems are operating to
physical security fortification. These data provide approval of identities, notifications
centers are secured with technologies as: and chains [6].
biometric identification, cameras, laser-based
detection systems. Also, only limited 3. Encryption of Inter-Service Communication:
specialized personnel can access these data With cryptographic authorization and
centers [5]. authentication the infrastructure is proficient
to secure inter-service communication. This
ensures that any third party do not have
2. Hardware Design and Provenance: Google access to the private network [6].
custom designed networking equipment that
is consistent of thousands of server machines. 4. Access management of End User Data: The
(Google custom chips, deployed on servers infrastructure is designed in a way to run
and peripherals, used for security central user identity service that verifies the
identification of Google devices at the end user login. After the verification provides
hardware level) [5]. users authorizations to the client’s device [6].

Secure Data Storage


3. Secure Boot Stack and Machine Identity:
Google server machines with specific The numerous Google storage services are
identification that are ensuring the security of designed to use keys from a central key
hardware and software machine boots [5]. management service to encrypt the data in
advance. In order to avoid possible threats,
such as malicious disk firmware, the
infrastructure at the application layer is
premeditated to preform encryption. Also, for
further protection, encryption is done at other
Service Deployment layers, such as at the hardware layer [6].

Furthermore, deletion of data is performed.


This layer of security confirms that a service Most frequently Google develops specific data
is properly deployed on Google’s as “Scheduled for Deletion” instead of
infrastructure from the base hardware and completely eliminating the data. The data
software. The listed points below are briefly deletion permits easy recovery from
examining the Service Deployment [6]. accidental deletions, whether its customer
originated or just a bug [7].
1. Service Identity, Integrity and Isolation:
Through cryptographic verification and
authorization, this layer provides strong Secure Internet Communication
control and security.

3
This layer covers the secure communication Google Cloud Platform trust principles are
between Google and the internet. This is constructed for thorough protection of
conducted through private IP space which customers privacy. Consequently, GCP
exposes subset of machines straight to practice six different trust principles, which
outside internet traffic and attacks. Google are going to be listed below:
Front End (GFE) services guarantee that all
the transportation layer security connections 1. The first and main principle Google use is
are completed and in coordination with the customer safety. The platform is designed to
accurate certificates [6]. provide instant notification to users if a safety
The Google Front End ensures proper breach is crossed and customer data is in
protection counter to DDoS attacks. danger.
Furthermore, the central identity service, that
consumers view as Google log in page which 2. GCP security provides comprehensive
request username and password, and control over customer’s data.
evaluates risk factors, which may include
whether the individual logged in from same 3. One of the trust principles include strict
device or location [7]. advertising principle. Google maintains
rigorous differentiation between the user’s
Operational Security Cloud data and the one used for business
advertising.
This layer includes various technologies for
measuring and improving security recognition 4. Google’s data centers have the most
and response. Manual security reviews, as advanced security systems, which locations
well as automated tools are included for are publicly accessible. This allows users to
security formation. Google creates important have knowledge regarding their data storage
outlays, specifically created for protection of and constant availability.
user’s devices and credentials, with usage of
different technologies and regulations for 5. Independent auditors evaluate, validate
physical, data, computers, access and certify GCP security practices.
management, network security etc. [8]. Accordingly, international security and privacy
regulations assure GCP security.
The operational security consists of four
sections: 6. Last and most important, Google does not
provide “backdoor” access to customer data
1. Intrusion Detection to any governmental agencies or units [9].
2. Safe Software Development
3. Keeping Employee Devices and Credentials
Safe Independent Third-Party Certifications
4. Reducing Insider Risk

GOOGLE CLOUD PLATFORM COMPLIANCE AND Google Cloud Platform implements various
TRUST security controls in order to ensure its
customers with high protection and security.
Therefore, GCP is implementing independent
Google Cloud Security – Trust Principles third-party audits and regulations, which not
only comply with data security, but they have

4
been certified. Google Cloud Platform has Google Cloud Platform main objective is
certifications such as: ISO 27001, ISO 27017, protection of customers data and its security,
ISO 27018, AICPA, SOC 2 and 3, PCI DSS, CSA this became a part of the company’s
Star and FedRAMP [10]. initiatives and vital focus. Google Cloud
Platform is a major leader on the market for
Privacy and Compliance Standards data protection and innovation of security and
encryption systems. The company considers
that data protection is more than security, for
Google Cloud Platform follows European
the same reasons, with all possible efforts and
Union’s General Data Protection
innovation investments, Google earns trust
Regulations (GDPR). These laws and
with today’s most valuable asset –
regulations stand for fortification of
information.
European user’s data privacy and
protection. Moreover, Google Cloud
Platform follows Australian Privacy
Principles (APPs), Australian Prudential REFERENCES
Regulations Authority (APRA), Multi-Tier M. Ali and
M. H. Miraz, "Cloud Computing Applications," in Proceedings of
Cloud Security (MTCS), Singapore
the International Conference on Cloud Computing and
Standard (SS), Japan Center for Financial eGovernance, Wales, 2013.
Industry Information Systems (FISC) and
UK NCSC Cloud Security Principles [11]. P. Srivastava and R. Khan, "A Review Paper on Cloud
Computing," International Journals of Advanced Research in
Nevertheless, Google Cloud Platform for Computer Science and Software Engineering , vol. 8, no. 6,
2018.
having the most secure payment services
follows ISO/IEC 27001 and Payment Card Google, "Google Cloud," 2019. [Online]. Available:
Industry Data Security Standards (PCI https://cloud.google.com/security/. [Accessed 2 4 2020].
DSS). With pioneering encryption credit
I. Shabani and A. Dika, "The Benefits of Using Google Cloud
card details, storage and personal
Computing for Developing Distributed Applications," Journal of
information of clients, Google has achieved Mathematics and System Science, vol. 5, pp. 156-164, 2015.
radical security [11].
N. . J. Mitchell and K. Zunnurhain, "Google cloud platform
security," in the 4th ACM/IEEE Symposium, 2019.

3. CONCLUSION Google, "Google Infrastructure Security Design Overview,"


Google Cloud, 2017.

G. C. P. Whitepaper, "Screenleap," 26 5 2015. [Online]. Available:


Google’s cloud platform is considered as a https://www.screenleap.com/doc/Google_Cloud_Platform_Sec
major secrecy cloud provider and more urity_Whitepaper.pdf. [Accessed 2 4 2020].
secured and safer than the other Cloud
Google, "Google’s Approach to IT Security. A Google White
companies on the market. They are a go to
Paper," Google , 2012.
shop for cloud computing work and they have
proven track record on anything they touched K. Fritchen, "Managed Methods," 2019. [Online]. Available:
turned to gold. Consequently, companies can https://managedmethods.com/blog/google-cloud-platform-
security-features/. [Accessed 3 4 2020].
rest assured and continue with Google Cloud
Platforms as their preferred cloud service S. V. Tuan , . K. Heydemann, A. d. Grandmaison and A. Cohen,
"Secure Delivery of Program Properties Through Optimizing
providers. Compilation," in ACM International Conference on Compiler
Construction, 2020.

Google, "Google Cloud’s Approach to Security," Google Cloud .

5
Google, "Security, compliance and GDPR Google Cloud,"
[Online]. Available: file:///C:/Users/Ena/Downloads/Security,
%20compliance%20and%20GDPR%20and%20Google
%20Cloud%20(2).pdf. [Accessed 2 4 2020].

S-ar putea să vă placă și