Cloud Security 101: Data Redaction Drives GCP Security

Posted by Dale Treece, Data & Analytics Practice Lead

May 02, 2017


Google Cloud always addresses vital cloud security and compliance needs of today's IT leaders by offering  crucial security features to avoid data loss and security breaches in Google Cloud Platform.

Data Loss Prevention and Data Redaction

One major control is Data Loss Prevention (DLP) system. This feature locates and redacts sensitive data with speed and efficiency. Users can scan their own sensitive data for information like payment card numbers, passport information or Social Security numbers and quickly classify and redact it. It goes a long away to mitigating data breach threats.

If you’ve ever had to identify sensitive data for security purposes, you know that data redaction can be a labor-intensive task for companies with massive amounts of data to manage. That’s where Google’s advanced technology makes data redaction more efficient and accurate. Google always keeps cloud security top of mind.

According to Google’s official description, “The API classifies this data using more than 40 predefined detectors to identify patterns, formats, and checksums, and even understands contextual clues. The DLP API supports text and images; just send data to the API or specify data stored on your Google Cloud Storage and Datastore instances.”

Cloud Key Management

Cloud Key Management (Cloud KMS) offers another security boost to Google Cloud Platform by empowering users with a heightened level of control over their encryption keys. Given that the protection or loss of keys can make or break a security program, this new feature offers critical assistance in helping your organization manage its life cycle.

Whether your team is generating, rotating or destroying encryption keys, Cloud KMS is hosted on Google Cloud Platform to make your key management smoother and more controlled. It’s also integrated with Cloud Identity and Access Management (Cloud IAM) and Cloud Audit Logging, giving you the ability to manage permissions for individual keys and monitor usage – a vital security measure.

Hardware Two-Factor Authentication

A third feature concerns two-factor authentication options Google Cloud Platform users. Your administrators can require the use of a hardware token as an extra layer of protection. While codes sent via SMS are still widely used, hardware options are considered safer and almost impossible for attackers to overcome. Mandating the use of a token such as a Yubikey secure login is another step toward a stronger defense shield of your perimeter.

Security is the baseline of productive technology and Google Cloud Platform users benefit from stronger protection with redacted data in addition to other Google advantages.

Subscribe for Updates

Dale Treece, Data & Analytics Practice Lead

Dale Treece is the Data & Analytics Practice Lead at Onix. He has been working with organizations of various sizes to organize, structure, and use their data to advance their business goals for over 35 years. Through data & analytics modernization, Dale helps businesses become agile, ready to scale, accelerate their path to innovation while improving overall performance and reducing costs.

Popular posts

AWS 101: What is Amazon S3 and Why Should I Use It?

Kubernetes 101: What are Nodes and Clusters?

Google Workspace vs. Microsoft 365: A Comparison Guide (2022)