Cloud Security 101: Data Redaction Drives GCP Security

Posted by Cloud Computing Alerts, - May 2, 2017

Google Cloud always addresses the cloud security and compliance needs of today’s IT leaders. To remain a top competitor in the cloud computing space, it offers crucial security features for GCP to avoid data loss and security breaches.

Data Loss Prevention and Data Redaction

One major control is Data Loss Prevention (DLP) system for Google Cloud Platform. This vital feature locates and redacts sensitive data with speed and efficiency. Users can scan their own sensitive data for information like payment card numbers, passport information or Social Security numbers and quickly classify and redact it. It goes a long away to mitigating data breach threats.

If you’ve ever had to identify sensitive data for security purposes, you know that data redaction can be a labor-intensive task for companies with massive amounts of data to manage. That’s where Google’s advanced technology makes data redaction more efficient and accurate. Google always keeps cloud security top of mind.

According to Google’s official description, “The API classifies this data using more than 40 predefined detectors to identify patterns, formats, and checksums, and even understands contextual clues. The DLP API supports text and images; just send data to the API or specify data stored on your Google Cloud Storage and Datastore instances.”

Cloud Key Management

Cloud Key Management (Cloud KMS) offers another security boost to Google Cloud Platform by empowering users with a heightened level of control over their encryption keys. Given that the protection or loss of keys can make or break a security program, this new feature offers critical assistance in helping your organization manage its life cycle.

Whether your team is generating, rotating or destroying encryption keys, Cloud KMS is hosted on Google Cloud Platform to make your key management smoother and more controlled. It’s also integrated with Cloud Identity and Access Management (Cloud IAM) and Cloud Audit Logging, giving you the ability to manage permissions for individual keys and monitor usage – a vital security measure.

Hardware Two-Factor Authentication

A third feature concerns two-factor authentication options Google Cloud Platform users. Your administrators can require the use of a hardware token as an extra layer of protection. While codes sent via SMS are still widely used, hardware options are considered safer and almost impossible for attackers to overcome. Mandating the use of a token such as a Yubikey secure login is another step toward a stronger defense shield of your perimeter.

Security is the baseline of productive technology and Google Cloud Platform users benefit from stronger protection with redacted data in addition to other Google advantages.

Post Your Comments


SEARCH Blog

MEET THE AUTHOR

Cloud Computing Alerts

Cloud Computing Alerts

Keeping up with the fast-paced nature and impressive growth of the cloud computing industry can be daunting. Onix is here to help you stay alert and in the know through its news series — Cloud Computing Alerts. Coverage is written by Onix and includes updates about the cloud computing industry and specific trends relating to the Google Cloud Platform.

MORE POSTS BY CLOUD COMPUTING ALERTS