Identity and Security
Detect, investigate, and protect against threats with security best practices for cloud, on-premises, or hybrid deployments.
- 84 Topics
- 61 Replies
The Google Cloud team has given hard work on virtual machine scaling the service, refining virtual machine detection capabilities, and preparing google cloud's next major feature set. VMTD in general availability has been scaled to support significantly more frequent scanning across a tremendously large number of instances. Scaling the scanning of memory from the Google Cloud Compute Engine (GCE) fleet has posed unique challenges, and google cloud invested in caching scan results to enable more frequent scans of smaller – but more important – sections of memory.Today Google cloud are announce that their unique, first-to-market detection capability with Virtual Machine Threat Detection (VMTD) in Security Command Center is now generally available for all Google Cloud customers. Follow the link below to read more details: https://cloud.google.com/blog/products/identity-security/introducing-virtual-machine-threat-detection-to-block-critical-threats
A critical component of any security operations team’s job is to deliver high-fidelity detections of potential threats across the breadth of adversary tactics. But increasingly sophisticated threat actors, an expanding attack surface, and an ever-present cybersecurity talent shortage make this task more challenging than ever. Google keeps more people safe online than anyone else. Individuals, businesses and governments globally depend on our products that are secure-by-design and secure-by-default. Part of the “magic” behind Google’s security is the sheer scale of threat intelligence google cloud are able to derive billions of users, browsers, and devices. Please visit the following link for more details:https://cloud.google.com/blog/products/identity-security/introducing-curated-detections-in-chronicle-secops-suite
To understand the differences between on-premises and cloud cybersecurity mental models, consider the types of threats that each is attempting to block, detect, or investigate. A new article based on the CISOs' mental models for cloud security was written by Seth Rosenblatt, security editor at Google Cloud, and Anton Chuvakin, senior staff consultant at the Office of the CISO. In the article, it was mentioned that many security leaders enter the cloud equipped primarily with on-premises-developed tools, procedures, skills, and, ultimately, mental models of how security functions. By aligning their current mental models with those of the cloud, these issues with cost and efficiency can be resolved. They explain the following important key points in this article: Network security Endpoint security Detection and response Data security Identity and access management Shared fate for greater trust in cloud security Get ready to go cloud native Please click on the following link t
Want to simplify your policy controls while also making them more specific? In this episode of Certificate Authority Service, we’ll show the other side of policy controls with fine-grained policies, using templates. Watch to learn about templates which allow for defining a set of policy controls that are not tied to a single CaPool. Click on the following video to watch it in detail. Chapters:0:00 - Intro1:23 - Fine grained policies using templates2:20 - Roles needed2:52 - How to create a template3:59 - Wrap up Extra Credit:Creating certificate templates → https://goo.gle/3SVYBu6 Certificate templates → https://goo.gle/3pxiH01 Certificate profiles → https://goo.gle/3pnp8my Configure new CaPool to require using the new template → https://goo.gle/3K5yCwm Create certificates using the new template → https://goo.gle/3QTpDQK
An incredible story, proving the point around security and reliability on Google Cloud! Emil Kiner, Senior Product Manager, Cloud Armor, and Satya Konduru Technical Lead at google cloud have described full insight of the report based on the latest Google Cloud blocked the largest Layer 7 DDoS attack at 46 million rps.Click on the following link to read more detail about outstanding google cloud armor action against DDoS attacks. https://cloud.google.com/blog/products/identity-security/how-google-cloud-blocked-largest-layer-7-ddos-attack-at-46-million-rps
Join the event “Show-and-Tell” Edition of Google Cloud Security Talks.This Google Security Talks will not just share what you need to know about google portfolio of products, it will show you how to use them. Explore Google cloud latest security products and innovations in a unique and refreshing way: by watching google cloud security experts put the solutions they helped build to the test via hands-on, fast-paced and highly visual demos. Each best-practice session will highlight top use cases for Google’s key security solutions and demonstrate step-by-step instructions for how you can apply these exact same scenarios in your own environment. Don’t just see products in action. Learn how you and your team can extract real value. Join the Google Cloud Security Talks to learn more! *To best accommodate varying schedules, Google Cloud security experts are offering two Security Talks sessions per topic throughout the day. Register for your preferred session time below.* Plus, enjoy a spec
Dave Herrald, senior security strategist at Google Cloud and a former CISO at a payment processes company. How can you succeed in the cloud’s new detection (and response) context, architect a more resilient cloud, keep SOC teams less frustrated and more upbeat, and most of all leverage the cloud to kickstart your security operations transformation? In the below video, Herald boils down a very big conversation—cloud security—into something salient and actionable. Enjoy!
How would you feel if you found that you could have your SIEM and also enhance it? For three examples of real-world use scenarios, scroll through the infographic below. If you add Chronicle to your current legacy SIEM, it will help your security operations team scale, be more affordable, and have a stronger reaction. However, replacing a SIEM can sometimes be an expensive endeavour, and every firm is at a different point of its security operations journey. One choice is to "augment" their stack using Chronicle SIEM from Google, which may help you rapidly and inexpensively achieve better security outcomes. What can you truly accomplish with a Chronicle enhancement, beyond the numbers? A new infographic makes three real-world application scenarios easier to understand. Google chronicle defines them in three titles:The “Cover All Your Bases” use case The “Hoarding is Rewarding” use case The “Automation Station” use caseClick on the following link to view the infographic:https://chronicle.
The U.S. Department of Homeland Security (DHS) recently announced the results of the first report from the Cyber Safety Review Board (CSRB) on the log4j software library vulnerabilities discovered in late 2021. Google welcomed the opportunity to participate in the development of the CSRB report and share our own experiences responding to this and other incidents. Building on this momentum, today we are going to share Google’s approach to address the log4j report’s recommendations. We see this as an important part of our effort to support others in the industry as we all work together to increase open source security. This includes: Driving adoption of best practices; Building a better software ecosystem; and Making long term investments in digital security. Together, these efforts demonstrate the steps we take to protect others and reflect our broader commitment to improve security for everyone. Here is the linik to read more details.https://cloud.google.com/blog/products/ident
A cloud service called Chronicle was developed enabling businesses to privately store, process, and search the enormous volumes of security and network telemetry they produce. It was constructed as a customised layer on top of the basic Google infrastructure. Chronicle normalises, indexes, correlates, and analyses the data to offer immediate insight and context on dangerous conduct.Using data, immediately analyse Google Cloud assists your security operations team in navigating this still developing paradigm by providing best practises and critical answers that will better equip it to deal with threats in the cloud.It contains: A technical primer on what makes cloud security different than on premises How detection and response can be best achieved in the cloud Clarity on who is responsible for detection and response in the cloud, between user and provider Why moving to the cloud is an opportunity to transform how you can achieve your SecOps goals of confidentiality, integrity, and
The Google Cloud documentation is not clear on this. We’ve been trying to understand if Google Cloud can access data stored in Google Storage when using Google-managed encryption keys.If yes, is there a way to restrict such access?
Ameer Abbas, Senior Product Manager at Google will discuss about ever-growing risk of network threats and bad actors, many organizations are turning to zero trust networks to ensure that only trusted users and devices are given access. In this session, we’ll discuss what zero trust networks are, what risks they mitigate, and common patterns found in a dynamic microservices environment. To Join this session please check the following link: https://cloudonair.withgoogle.com/events/innovators-architecting-zero-trust-networks
Here are the latest updates, products, services and resources from GCP security teams on May: PSP protocol now open source: In order to better scale the security GCP offer their customers, they created a new cryptographic offload protocol for internal use that they open sourced in May. Intentionally designed to meet the requirements of large-scale data-center traffic, the PSP Protocol is a TLS-like protocol that is transport-independent, enables per-connection security, and is offload-friendly. Updating Siemplify SOAR: The future of security teams is heading towards “anywhere operations,” and the latest version of Siemplify SOAR can help get us there. It gives organizations the building blocks needed across cloud infrastructure, automation, collaboration, and analytics to accelerate processes for more timely responses and automated workflows. In turn, this can free up teams to focus on more strategic work. Guardrails and governance for Terraform: Popular open-source Infrastruct
Source: official Google Cloud BlogWe have Data Security:at Rest, in-transit & in-useEncryption is a core control for data security, and Google Cloud offers multiple encryption options for the data.@Priyanka Vergadia is shedding some light on each of them in her new articleI would like to hear-read your thoughts on how you secure your data @bngejane, @Ananth@enzonil70 and @Irtaza Ali do you think it is enough for cybersecurity issues?
Hey Google Cloud Security Community! Join us for the Google Cloud Security Summit on May 17 to learn from experts, explore the latest tools, and share our vision for the future of security. Discover new ways to define and drive your security strategy and solve for your biggest challenges. During the event, you’ll:Gain insights on how you can move to zero trust architectures, bolster software supply chain security, and defend against ransomware and other emerging threats. Be among the first to explore new products and enhanced capabilities in cloud governance, digital sovereignty and security operations. Uncover innovative approaches from your peers that can help solve your toughest security challenges. Register today for this digital event and view the full agenda now. We look forward to seeing you there!
What is IDENTITY? What is ACCESS? What is I&AM? What are the differences between Authentication and Authorization?🤔🖐Welcome to the complex world of Application Security! No worries! You will understand IAM easily from this 3-minute simple story of your own life: “IAM in the Airport”."I&AM in Airport" -IAM Explained Simply in Fun Story Hi🖐, I am Della, I am a cloud professional, IT professor, and learning designer. I want to help you understand cloud, and understand career in cloud, in simple, easy, and fun stories!If you like this video, you can find more from my channel “Simple ‘it’ Story Shows” on cloud services, resources, and IT works. Yes, Cloud is complicated. But you can understand "it", one story at a time, and have fun! 😀 https://www.youtube.com/channel/UC1bu...
Information Week recently invited C2C Global President Josh Berman (@josh.berman) to contribute an article about the shared roles of businesses and cloud service providers in ensuring cloud security. For broader perspective on this critical topic, Berman spoke with Paul Lewis, CTO of Pythian, a C2C Foundational Platinum Partner and Google Cloud Premier Partner, about the nuanced distinction between “Security of the Cloud” and “Security in the Cloud.”Read more about it in the following article: