From the course: Google Cloud Security for Beginners: Tools and Services
Unlock this course with a free trial
Join today to access over 25,300 courses taught by industry experts.
Data security best practices - Google Cloud Platform Tutorial
From the course: Google Cloud Security for Beginners: Tools and Services
Data security best practices
- [Instructor] Imagine data as the treasure chest 2 of your organization, 3 and security as the guardian protecting it 4 from unwanted individuals lurking on the internet. 5 Here are some resources you can add to your toolkit 6 to help you secure your environment. 7 They are encryption, 8 identity and access management, 9 multifactor authentication, 10 network security, 11 and logging and monitoring. 12 Next, let's connect the dots 13 of these security concepts into tangible tools 14 that you can implement in GCP today. 15 The first resource you can implement 16 is the Google Cloud Key Management Service, 17 which will allow your users to create, 18 use, rotate and destroy cryptographic keys 19 for data encryption, 20 both at rest and in transit. 21 The second resource is identity-aware proxy. 22 This is a security service 23 that allows you to control access 24 to your web applications, 25 such as Compute Engine,…