Identity and Security
Detect, investigate, and protect against threats with security best practices for cloud, on-premises, or hybrid deployments.
- 54 Topics
- 40 Replies
Need to maintain a consistent security posture across your Internet-facing applications, but want the flexibility to tweak requirements for applications? Welcome back to Go Deep with Google Cloud Armor, where Debi Cabrera, Developer advocate show you what features are available, how to use them, and how you can leverage them in your environment. Watch to learn how you can configure Cloud Armor policies and rules to secure your applications!Click on the video below to watch it in detail.Chapters:0:00 - Intro1:03 - What this video covers2:03 - How to create a new rule from scratch4:54 - How to clone an existing out-of-the-box rule and modify it to create a new rule7:44 - How to copy a rule or policy and apply it to multiple backends / Rate limiting feature12:46 - How to use a Rule in Preview mode and test a new rule before enabling it / Threat intelligence feature17:35 - Wrap upExtra Credit:You can find Cloud Armor's pre-configured, out of the box WAF rules for the OWASP Top 10 (sourced
Workforce Identity Federation allows you to set up an identity pool to use an external identity provider to authenticate and authorize access to resources within your company's Google Cloud. In this video, Google Cloud developer advocate show how you can set up this identity pool using Workforce Identity Federation. Watch to learn the configuration setups you might use depending on your provider!Click on the video below to watch it in detail. Chapters:0:00 - Intro0:23 - Getting started: Pre-requisites0:42 - Documentation1:51 - Permissions2:08 - Configure the Workforce identity pool2:51 - WIF pool providers3:34 - Create OIDC IDP4:30 - Configure our pool5:51 - Wrap upExtra CreditWorkforce Identity Federation → https://goo.gle/workforce-identity-fe... Documentation: Documentation for Configuring workforce identity federation → https://goo.gle/3zL1Hco Documentation for Configuring WIF with Azure AD → https://goo.gle/3zKCZch Documentation for Configuring WIF with Okta → https://goo.gle/3zFx
Christoph Grotz, Google Cloud developer advocate discussed about software supply chain security, and how Google Cloud can help improve your end-to-end software supply chain security from dependencies to deploy. No matter where you are on your software supply chain security journey, you will find value in video , and see how our flexible and pluggable tools can get you started today. Click on the video below to watch it in detail:
Exabeam, a cybersecurity company and leader in SIEM and security analytics, gives customers a cloud-based platform that can help them detect and respond to threats and get a holistic view of the cybersecurity threat landscape. In this video of Data Journeys, Bruno Aziza talks with Sanjay Chaudhary, Vice President of Product Management at Exabeam. Sanjay shares how Exabeam built its newest cybersecurity platform on Google Cloud, organized the teams that support it, and best practices for forecasting and controlling costs.Click on the video below to watch it in detail:
Are you unsure when to use service accounts? Not sure how to grant applications access to Google Cloud Resources? When to use the OAuth consent flow? Then check out this video and learn the best practices for using and managing service accounts. This video also cover how to choose the right authentication method when using a service account based on your use case.Click on the video below to watch it in detail:Chapters:0:00 - Intro0:07 - What are service accounts?0:23 - When to use service accounts?1:23 - OAuth consent flow1:49 - Authentication methods2:53 - Best practices for managing service accounts Best practices for working with service accounts → https://goo.gle/3C11hQO
The modern attack surface requires modern, automated attack surface management to ensure security teams have the visibility they need to keep organizations safe. Join this program on how to manage your unknown cloud. Learn about the integration between Prisma Cloud and Cortex Xpanse to help bring unmanaged cloud assets and users under management. Also get details on the type of information provided by Xpanse, including priority and attribution data, and how to respond to Xpanse alerts regarding newly discovered unmanaged cloud assetsclick on the video below to watch it more details.
BBVA, a Spanish multinational financial services company based in Madrid and Bilbao, Spain, is one of the largest financial institutions in the world. They partnered with Google Cloud and Chronicle to augment their homegrown security operations platform, allowing them to digest more data and extend threat detection and response use cases into the cloud. Click on the video below to watch it in detail: Extra Credit:Click on the link below to read it more detail:https://f.hubspotusercontent40.net/hubfs/2567647/BBVA_Case_%20Study.pdf
Only with Google Cloud and Mandiant can you leverage our planet scale analytics to action threat intel from the frontlines - providing you a faster way to detect, investigate, and respond to incidents at scale.Today Thomas Kurian CEO, Google Cloud to share the completion of Google Cloud acquisition of Mandiant, a leader in dynamic cyber defense, threat intelligence and incident response services. Mandiant shares google cloud cybersecurity vision and will join Google Cloud to help organizations improve their threat, incident and exposure management. Combining Google Cloud’s existing security portfolio with Mandiant’s leading cyber threat intelligence will allow Google Cloud to deliver a security operations suite to help enterprises globally stay protected at every stage of the security lifecycle. With the scale of Google’s data processing, novel analytics approaches with AI and machine learning, and a focus on eliminating entire classes of threats, Google Cloud and Mandiant will help or
Protecting Google Applications with Fortinet’s Web & API SecurityDigital innovation is causing increased risk as cyber threats take advantage of the disruption. Learn about our cloud native SaaS based web application firewall (WAF) that protects web applications and APIs from the OWASP Top 10 threats, zero-day attacks and other application layer attacks. Simple to set up and with in-built AI/ML, the Fortinet WAF automatically adapts to learn and protect your specific application. Click on the video below to watch it in detail:.
Identity and Access management, or IAM, in Google Cloud gives you precise control over the permissions that users have. In this video, will discuss using the Policy Troubleshooter to investigate group membership and resource hierarchy permissions to understand how you can allow users to access and modify resources.Click on the video below to watch it in detail: Chapters:0:00 - Intro0:51 - Example permissions in Cloud Storage1:40 - Using the Policy Troubleshooter2:03 - Understanding the resultsExtra Credit :Policy TroubleshooterTroubleshoot IAM permissions → https://goo.gle/3Q6rJw0Full resource names → https://goo.gle/3CVzwKk
Do you currently know each location you might store sensitive data? How about the data you collect from customers and partners? If not, you’re not alone. In this video, Scott Ellis, Product Manager, Google Cloud will cover how Google can help you gain understanding and visibility into what data you are storing, and where it is located - regardless if it’s unstructured data in BigQuery or scanned images in storage. This allows you to take appropriate measures to protect your data, and build a comprehensive data security strategy that adapts as quickly as your data changes. To view it in detail, click on the video below: https://cloudonair.withgoogle.com/events/emea-security-talks/watch?talk=talk7
How to get started with network-based threat detection in Google Cloud. As more and more applications move to the cloud, network security teams must protect them against an ever-evolving threat landscape. Shielding applications from network-based threats is also one of the most important criteria for regulatory compliance. In this video you will see a live demonstration of Cloud IDS, our cloud-native, managed, industry-leading network based threat detection, and how you can integrate its findings into your security operations ecosystems and workflows, including cloud-native SIEM, third party XDR, and SOAR systems. To view it in detail, click on the video below:
Creating compliant environments in the cloud doesn’t need to be difficult or force you to compromise on using the latest and most innovative services. In this video, Bryce Buffaloe, product manager security & compliance, google cloud will show how you can manage requirements for your regulated workloads with just a few clicks. See how you can set controls for where your cloud data is stored and processed, the personnel who are authorized to support your deployment, and who can access cloud resources on a workload-by-workload basis, with seamless platform compatibility between regulated and commercial cloud environments.Click on the video below to watch it in details:
Whether building an application on Kubernetes, Serverless, or Virtual Machine, end-to-end security is crucial to mitigate the rapid growth in open source software, as well as recent cybersecurity attacks and data breaches. The following video will help you to learn about how you can adopt an in-depth, security-first approach with Google Cloud that embeds security and compliance at every step of your software lifecycle. 1. Secure Software Supply Chain KeynoteSpeaker: Pali Bhat, Eric Brewer, Aparna Sinha, Phil Venables, Brenna Washington, Dustin Ingram, Shane Lawrence They We'll discuss the state of the container security industry, including the lessons you can learn from recent breaches, plus best practices you can implement today to secure the software supply chain and establish trust throughout the delivery process. 2. Lurking in the deep: Control your open source dependenciesSpeaker: Nicky Ringland, Don McCasland Nearly all software depends on open source and other external, thir
Cloud loggingCloud Logging is now FedRAMP High certified!As enterprise and public sector cloud adoption continues to accelerate, having an accurate picture of who did what in your cloud environment is important for security and compliance purposes.Logs are critical when you are attempting to detect a breach, investigating ongoing security issues, or performing forensic investigations.These five must-know Cloud Logging security and compliance features can help customers create logs to best conduct security audits.The first three features were launched recently in 2022, while the last two features have been available for some time. Cloud Logging is a part of Assured Workloads. Cloud Logging is now FedRAMP High certified. “Manage your own Keys,” also known as customer managed encryption keys (CMEK), can encrypt Cloud Logging log buckets. Setting a high bar for cloud provider transparency with Access Transparency. Track who is accessing your Log data with Access Approval Logs.
Migrating existing workloads or deploying new workloads in the cloud provides the opportunity to improve protection against attacks. Come learn about approaches to defend your network perimeter and prevent lateral movement of threats. Tracy Jiang, Senior project manager, Google Cloud will discuss the unique capabilities of Google Cloud firewalls that can deliver a no-compromise zero-trust posture. She will also discuss how firewall insights and Cloud IDS can monitor for gaps in protection and prevent attacks. Click on the following video to watch it in detail : Video insights:
Are you moving your organization from on-premise PKI services to Google Cloud? With Certificate Authority Service (CAS), you can achieve zero-trust policies for secure communication with your CAs. Watch along and learn how CAS provides fully managed, cloud-native CAs for Google Cloud Platform customers in conjunction with VPC Service controls to maintain zero-trust in the cloud.Click on the following video to watch it in detail : 0:00 - Intro0:33 - Today’s on-premise PKI deployments0:54 - Certificate Authority Service (CAS) + Virtual Private Cloud (VPC) SC1:26 - Virtual Private Cloud service controls2:16 - VPC access controls2:57 - What is Access Context Manager (ACM)?3:13 - CAS & VPC SC perimeter example4:51 - Wrap up Extra Credit:Access Context Manager → https://goo.gle/3cfBJ7V Endpoint verification → https://goo.gle/3PdNsTa VPC Service Controls→ https://goo.gle/3aKg5bu
The Google Cloud team has given hard work on virtual machine scaling the service, refining virtual machine detection capabilities, and preparing google cloud's next major feature set. VMTD in general availability has been scaled to support significantly more frequent scanning across a tremendously large number of instances. Scaling the scanning of memory from the Google Cloud Compute Engine (GCE) fleet has posed unique challenges, and google cloud invested in caching scan results to enable more frequent scans of smaller – but more important – sections of memory.Today Google cloud are announce that their unique, first-to-market detection capability with Virtual Machine Threat Detection (VMTD) in Security Command Center is now generally available for all Google Cloud customers. Follow the link below to read more details: https://cloud.google.com/blog/products/identity-security/introducing-virtual-machine-threat-detection-to-block-critical-threats
A critical component of any security operations team’s job is to deliver high-fidelity detections of potential threats across the breadth of adversary tactics. But increasingly sophisticated threat actors, an expanding attack surface, and an ever-present cybersecurity talent shortage make this task more challenging than ever. Google keeps more people safe online than anyone else. Individuals, businesses and governments globally depend on our products that are secure-by-design and secure-by-default. Part of the “magic” behind Google’s security is the sheer scale of threat intelligence google cloud are able to derive billions of users, browsers, and devices. Please visit the following link for more details:https://cloud.google.com/blog/products/identity-security/introducing-curated-detections-in-chronicle-secops-suite
To understand the differences between on-premises and cloud cybersecurity mental models, consider the types of threats that each is attempting to block, detect, or investigate. A new article based on the CISOs' mental models for cloud security was written by Seth Rosenblatt, security editor at Google Cloud, and Anton Chuvakin, senior staff consultant at the Office of the CISO. In the article, it was mentioned that many security leaders enter the cloud equipped primarily with on-premises-developed tools, procedures, skills, and, ultimately, mental models of how security functions. By aligning their current mental models with those of the cloud, these issues with cost and efficiency can be resolved. They explain the following important key points in this article: Network security Endpoint security Detection and response Data security Identity and access management Shared fate for greater trust in cloud security Get ready to go cloud native Please click on the following link t
Want to simplify your policy controls while also making them more specific? In this episode of Certificate Authority Service, we’ll show the other side of policy controls with fine-grained policies, using templates. Watch to learn about templates which allow for defining a set of policy controls that are not tied to a single CaPool. Click on the following video to watch it in detail. Chapters:0:00 - Intro1:23 - Fine grained policies using templates2:20 - Roles needed2:52 - How to create a template3:59 - Wrap up Extra Credit:Creating certificate templates → https://goo.gle/3SVYBu6 Certificate templates → https://goo.gle/3pxiH01 Certificate profiles → https://goo.gle/3pnp8my Configure new CaPool to require using the new template → https://goo.gle/3K5yCwm Create certificates using the new template → https://goo.gle/3QTpDQK
An incredible story, proving the point around security and reliability on Google Cloud! Emil Kiner, Senior Product Manager, Cloud Armor, and Satya Konduru Technical Lead at google cloud have described full insight of the report based on the latest Google Cloud blocked the largest Layer 7 DDoS attack at 46 million rps.Click on the following link to read more detail about outstanding google cloud armor action against DDoS attacks. https://cloud.google.com/blog/products/identity-security/how-google-cloud-blocked-largest-layer-7-ddos-attack-at-46-million-rps
Login to the community
Social LoginLogin With Your C2C Credentials
Enter your username or e-mail address. We'll send you an e-mail with instructions to reset your password.