From the course: Google Cloud Security for Beginners: Tools and Services

Unlock this course with a free trial

Join today to access over 25,300 courses taught by industry experts.

Data security best practices

Data security best practices

- [Instructor] Imagine data as the treasure chest 2 of your organization, 3 and security as the guardian protecting it 4 from unwanted individuals lurking on the internet. 5 Here are some resources you can add to your toolkit 6 to help you secure your environment. 7 They are encryption, 8 identity and access management, 9 multifactor authentication, 10 network security, 11 and logging and monitoring. 12 Next, let's connect the dots 13 of these security concepts into tangible tools 14 that you can implement in GCP today. 15 The first resource you can implement 16 is the Google Cloud Key Management Service, 17 which will allow your users to create, 18 use, rotate and destroy cryptographic keys 19 for data encryption, 20 both at rest and in transit. 21 The second resource is identity-aware proxy. 22 This is a security service 23 that allows you to control access 24 to your web applications, 25 such as Compute Engine,…

Contents