Google Cloud Fundamentals: Core Infraestructure - Introducing Google Cloud -> Security

Google Cloud Fundamentals: Core Infraestructure - Introducing Google Cloud -> Security

Google Cloud prioritizes security across its infrastructure, encompassing physical data centers, hardware and software, and operational practices. Let's delve into some key features:

Hardware Infrastructure:

  • Hardware Design and Provenance: Google custom-designs its server boards, networking equipment, and even security chips to ensure control and integrity.
  • Secure Boot Stack: Secure boot technologies safeguard against unauthorized software by cryptographically verifying the boot process (BIOS, bootloader, etc.).
  • Physical Security: Google builds and controls its data centers with robust physical security measures, granting access only to authorized personnel. Third-party data centers must adhere to Google's physical security standards.

Service Deployment

  • Encryption of Inter-Service Communication: All communication between Google services (using remote procedure calls or RPCs) is encrypted within and between data centers. Additionally, Google is deploying hardware accelerators to extend this encryption further.

User Identity

  • Advanced User Authentication: Beyond usernames and passwords, Google's central identity service employs risk-based challenges and supports multi-factor authentication using U2F security keys.

Storage Services

  • Encryption at Rest: Data stored on Google's infrastructure is encrypted at rest using centrally managed keys. Additionally, hardware encryption on storage devices is enabled.

Internet Communication

  • Secure Connections: Google services leverage the Google Front End (GFE) to establish secure TLS connections using public-private key pairs, X.509 certificates, and best practices like perfect forward secrecy. The GFE also safeguards against denial-of-service (DoS) attacks.
  • Denial-of-Service (DoS) Protection: Google's vast infrastructure can absorb DoS attacks. Additionally, multi-layered DoS protections further mitigate risks.

Operational Security

  • Intrusion Detection: Google utilizes rules and machine learning to detect potential security incidents. Additionally, Red Team exercises evaluate and improve detection and response mechanisms.
  • Mitigating Insider Threats: Google meticulously monitors and restricts access for employees with administrative privileges.
  • Employee U2F Security: To combat phishing attacks, Google employees require U2F security keys for account access.
  • Stringent Software Development Practices: Google enforces central source control, two-party code review, and utilizes security libraries to prevent common vulnerabilities. Google also runs a vulnerability rewards program to incentivize bug discovery and reporting.