App Engine
A Practical Approach To
Cyber Security
WCA - 2019
Cyber Security WCA - 2019 1 BILLION users Lets level set with - - PowerPoint PPT Presentation
App Engine A Practical Approach To Cyber Security WCA - 2019 1 BILLION users Lets level set with some Defjnitions and Examples Protecting digital data and assets (a subset of information security) Confidentiality 1 Integrity 2
App Engine
WCA - 2019
Let’s level set with some
Confidentiality
1
Integrity
2
Availability
3
Activists
1
Profiteers
2
Nation States
3
Data Exfiltration
1
Ransomware
2
Advanced Persistent Threats
3
As you conduct periodic assessments of risk, here are
A view of the Google’s cyber security landscape from
Google Cloud Platgorm
Our global infrastructure
PLCN (HK, LA) 2019 Faster (US, JP, TW) 2016 Unity (US, JP) 2010 Dunant (US, FR) 2020 Monet (US, BR) 2017 Junior (Rio, Santos) 2018 Tannat (BR, UY, AR) 2018 SJC (JP, HK, SG) 2013 Indigo (SG, ID, AU) 2019 HK-G (HK, GU) 2019 JGA (AU, GU, JP) 2019 Curie (CL, US) 2019 Havfrue (US, IE, DK) 2019
Network Edge points
CDN nodes
Mumbai Singapore Kuala Lumpur Sydney Tokyo Chennai Taipei Seatule San Francisco Montréal Hamburg Zurich Madrid Paris London Hong Kong Osaka Toronto Chicago Los Angeles Denver Dallas Miami Atlanta Washington DC New York Rio de Janeiro São Paulo Buenos Aires Munich Milan Marseille Amsterdam Stockholm Frankfuru
Dedicated Interconnect Current regions and number of zones Future regions and number of zones
3 3 3 3 3 3 3 3 3 3 3 3 3 3 4 3 3 3 3 3 3 3 3
Usage Operations Deployment Application Network Storage OS + IPC Boot Hardware
Usage
Log Auditing Safe Browsing API BeyondCorp Security Key Enforcement
Operations
Compliance & Certifications Live Migration Infra maintenance & patching Threat analysis and intelligence Open Source Forensics tools Anomaly Detection (Infrastructure) Incident Response (Infrastructure)
Deployment
Google Services TLS encryption with perfect forward secrecy Certificate Authority Free and automatic certificates DDoS Mitigation (PaaS & SaaS)
Application
Peer code review & Static Analysis (Infrastructure SLDC) Source code/Image provenance (Infrastructure) Binary authorization (Infrastructure code) WAF (PaaS & SaaS Use cases) IDS/ IPS (PaaS & SaaS Use cases) Web Application Scanner (Google Services)
Network
Infrastructure RPC encryption in transit between data centres DNS Global Private Network Andromeda SDN Controller Jupiter Datacenter Network B4 SDN Network
Storage
Encryption at rest Logging Identity and Access Management Global at scale Key Management Service
OS + IPC
Hardened KVM Hypervisor Authentication for each host and each job Curated Host Images Encryption of Interservice Communications
Boot
Trusted Boot Cryptographic Credentials
Hardware
Purpose-built Chips Purpose-built Servers Purpose-built Storage Purpose-built Network Purpose-built Data Centers