05 Trust and Security
05 Trust and Security
01)
📒 Trust and Security with Google Cloud – Notebook Summary
i)
📒 Cloud Security – Notebook Summary
ii)
iii)
The CIA Triad: Three Core Principles of Security
1. Confidentiality (Keeping Data Private & Secure) 🔒
o Ensures only authorized users can access sensitive data.
o Prevents unauthorized access or leaks.
o Encryption plays a key role in securing stored and transmitted data.
o Example: A password-protected document can only be accessed by
authorized people.
2. Integrity (Keeping Data Accurate & Unchanged) ✅
o Ensures data remains correct and trustworthy.
o Prevents modification, tampering, or corruption.
o Checksums & digital signatures verify data authenticity.
o Example: A sent email should arrive exactly as written, without changes.
3. Availability (Keeping Systems & Services Accessible) 📡
o Ensures systems and services remain online and functional.
o Uses backup plans, failover mechanisms, and redundancy to prevent
downtime.
o Example: A banking app should be accessible 24/7, even if one server
fails.
iv)
i)
ii)
✅ Key Facts
iii)
Encryption is like a secret code that transforms data into an unreadable format using special
algorithms.
iv)
3. Auditing
• Auditing (or accounting) involves tracking and monitoring user activity within
the system.
• It collects data about user actions, system events, and other activities.
• It helps detect issues like anomalies, security breaches, and policy violations.
• Auditing provides a record of what happened, which is useful during:
o Security investigations
o Compliance checks
o System performance evaluations
• It's like having surveillance cameras to monitor activities in a shopping mall.
v)
🔹 Conclusion
• Google Cloud provides advanced security tools to protect cloud networks.
• Key security measures include:
✅ Zero Trust Security Model
✅ Secure cloud-to-on-premises connections
✅ Network perimeter protection (firewalls, VPCs)
✅ DDoS protection with Cloud Armor
✅ Automating infrastructure provisioning for stability
• Every organization should tailor security strategies based on business needs
and risk tolerance.
Las)
🔹 What is SecOps?
• SecOps (Security Operations) focuses on protecting an organization’s data
and cloud systems.
• Combines processes + technologies to prevent:
✅ Data breaches
✅ System outages
✅ Other security threats
• Think of it as a security shield keeping your valuable data safe.
2⃣ Log Management
🔹 Conclusion
• SecOps strengthens an organization’s security and minimizes risks.
• By adopting SecOps practices, businesses can fortify defenses against ever-
changing cyber threats.
• A strong security strategy leads to safer data, smoother operations, and
better compliance. 🚀
3)
i)
1⃣ Google’s Seven Trust Principles
Google Cloud follows seven core trust principles to ensure data security and privacy:
✔ Security: Protecting customer data with advanced security measures.
✔ Compliance: Meeting global and industry-specific regulations.
✔ Transparency: Providing clear insights into data usage and policies.
✔ Privacy: Ensuring that customer data remains private and confidential.
✔ Resilience: Keeping services reliable and available.
✔ Control: Giving customers full control over their data.
✔ Responsibility: Upholding strong ethical standards in handling data.
Google Cloud provides data residency and sovereignty options, allowing customers to:
✅ Store data in specific geographic locations to comply with regulations.
✅ Use sovereign cloud solutions for enhanced control over sensitive data.
✅ Maintain security and compliance while meeting country-specific legal requirements.
Google Cloud offers compliance tools to help businesses meet legal and industry standards:
🔹 Compliance Resource Center: A hub for security and compliance guidance.
🔹 Compliance Reports Manager: Provides easy access to audit reports and certifications
for regulatory needs.
These features ensure that organizations can confidently use Google Cloud while staying
secure, compliant, and in control of their data. 🚀
ii)
Google
🔹 Cloud Trust Principles: Ensuring Security & Transparency
Core Trust Principles
1⃣ You own your data, not Google – Customers have full control over their data, including
access, export, deletion, and permissions.
2⃣ Google does not sell customer data – Your data is never sold to third parties.
3⃣ No customer data is used for advertising – Google Cloud does not analyze or use
customer data to serve ads.
4⃣ Encryption by default – All customer data is automatically encrypted for security.
5⃣ Protection against insider access – Strict security controls prevent unauthorized
employee access.
6⃣ No government backdoor access – No entity can access your data without proper
authorization.
7⃣ Audited privacy practices – Google Cloud undergoes independent audits to maintain
compliance with global standards.
Transparency & Compliance Measures
🔹
✔ Transparency Reports – Regular reports provide insights into data requests and privacy
policies.
✔ Independent Audits & Certifications – Ensures compliance with industry and legal
standards.
✔ EU Cloud Code of Conduct Participation – Aligns Google Cloud with European data
protection regulations.
Google Cloud’s commitment to security, privacy, and transparency ensures customers can
trust and control their data with confidence. 🔐✨
iii)
Data Sovereignty vs. Data Residency: Key DiUerences & Google Cloud
Solutions
🔹 Core Concepts
✅ Data Sovereignty – Legal concept stating that data is subject to the laws of the country
where it is stored.
✔ Example: GDPR in the EU ensures personal data is protected regardless of location.
📍 Regional Data Storage – Choose from multiple Google Cloud regions (e.g., UK,
Germany, Finland) to keep data in specific locations.
🔒 Organization Policy Constraints – Prevents accidental data storage in non-compliant
regions.
🌐 VPC Service Controls – Restricts network access to data using security perimeters.
🚦 Google Cloud Armor – Blocks unauthorized traffic based on geographic location.
By leveraging these security and compliance tools, organizations can maintain control
over their data, meet legal requirements, and ensure regulatory compliance in Google
Cloud. 🔐✅
iv)
✅ Importance of Compliance:
• Compliance ensures data security and helps meet legal & regulatory
requirements.
• Failure to comply can lead to hefty fines, legal actions, and reputational
damage.
📌 What is it?
📌 What is it?
• If you're seeking ISO 27001 certification, you can download the necessary
documents easily.
• Helps organizations streamline compliance reporting & governance e0iciently.
🔗 Useful Links:
➡ Compliance Resource Center: cloud.google.com/security/compliance
➡ Compliance Reports Manager: cloud.google.com/security/compliance/compliance-
reports-manager
By leveraging Google Cloud’s compliance tools, organizations can enhance security, meet
regulatory standards, and build trust with customers. ✅🔐