Technology Background

Data Redaction Among Top GCP Security Features

Posted by Cloud Computing Alerts on May 2, 2017

Google Cloud Platform Data Redaction Feature Google Cloud continues to address the robust cloud security and compliance needs of today’s IT leaders. To remain a top competitor in the cloud computing space, Google announced new security features for the Google Cloud Platform and G Suite.

Data Loss Prevention and Data Redaction

One interesting new control that was recently highlighted in this article is a Data Loss Prevention (DLP) system for Google Cloud Platform. You may have seen it during the Google Cloud Next ’17 event; the feature locates and redacts sensitive data with speed and efficiency. Users can scan their own sensitive data for information like payment card numbers, passport information or Social Security numbers and quickly classify and redact it.

If you’ve ever had to identify sensitive data for security purposes, you know that data redaction can be a labor-intensive task for companies with massive amounts of data to manage. That’s where Google’s advanced technology makes data redaction more efficient and accurate. Google always keeps cloud security top of mind.

According to Google’s official description, “The API classifies this data using more than 40 predefined detectors to identify patterns, formats, and checksums, and even understands contextual clues. The DLP API supports text and images; just send data to the API or specify data stored on your Google Cloud Storage and Datastore instances.”

Cloud Key Management

Cloud Key Management (Cloud KMS) offers another security boost to Google Cloud Platform by empowering users with a heightened level of control over their encryption keys. Given that the protection or loss of keys can make or break a security program, this new feature offers critical assistance in helping your organization manage its life cycle.

Whether your team is generating, rotating or destroying encryption keys, Cloud KMS is hosted on Google Cloud Platform to make your key management smoother and more controlled. It’s also integrated with Cloud Identity and Access Management (Cloud IAM) and Cloud Audit Logging, giving you the ability to manage permissions for individual keys and monitor usage – a vital security measure.

Hardware Two-Factor Authentication

A third new feature concerns two-factor authentication options for G Suite and Google Cloud Platform users. Your administrators can now require the use of a hardware token as an extra layer of protection. While codes sent via SMS are still widely used, hardware options are considered safer and almost impossible for attackers to overcome. Mandating the use of a token such as a Yubikey secure login is another step toward a stronger defense shield of your perimeter.

Security is the baseline of productive technology – and now G Suite and Google Cloud Platform users will benefit from stronger protection with redacted data in addition to other Google advantages.

Topics: Cloud Infrastructure, G Suite, GCP


Flexibility, Reliability, Scalability — and Peace of Mind.

Google Cloud Platform

Request a Consultation


Cloud Computing Alerts

Cloud Computing Alerts

Keeping up with the fast-paced nature and impressive growth of the cloud computing industry can be daunting. Onix is here to help you stay alert and in the know through its news series — Cloud Computing Alerts. Coverage is written by Onix and includes updates about the cloud computing industry and specific trends relating to the Google Cloud Platform.