{"id":1283,"date":"2022-09-23T11:50:47","date_gmt":"2022-09-23T11:50:47","guid":{"rendered":"https:\/\/swifta.com\/blog\/?p=1283"},"modified":"2023-05-22T12:27:02","modified_gmt":"2023-05-22T12:27:02","slug":"google-cloud-security-best-practices","status":"publish","type":"post","link":"https:\/\/swifta.com\/blog\/google-cloud-security-best-practices\/","title":{"rendered":"Google Cloud Security Best Practices"},"content":{"rendered":"<section class=\"l-section wpb_row height_medium\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row type_default valign_top\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"w-video align_left ratio_16x9\"><div class=\"w-video-h\"><iframe src=\"\/\/www.youtube.com\/embed\/jwgO8M1N8JM?autoplay=0&controls=1&origin=https%3A%2F%2Fswifta.com%2Fblog\" allowfullscreen=\"1\"><\/iframe><\/div><div class=\"w-video-icon\" style=\"font-size:1.5rem;background:rgba(0,0,0,0.5);color:#fff;\"><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row height_medium\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row type_default valign_top\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column\" ><div class=\"wpb_wrapper\"><p><span style=\"font-weight: 400;\">You are about to solve a problem and turned to Google Cloud Platform and followed GCP security best practices to build and host your solution. You create your account and are all set to brew some coffee and sit down at your workstation to architect, code, build, and deploy. Except\u2026 you aren\u2019t. There are many knobs you must tweak and practices to put into action if you want your solution to be operative, secure, reliable, performant, and cost effective. First things first, the best time to do that is now right from the beginning, before you start to design and engineer.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">First, a word of caution: Never use a non-corporate account.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Instead, use a fully managed corporate Google account to improve visibility, auditing, and control of access to Cloud Platform resources. Don\u2019t use email accounts outside of your organization, such as personal accounts, for business purposes.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Cloud Identity\u00a0 is a stand-alone Identity-as-a-Service (IDaaS) that gives Google Cloud users access to many of the identity management features that Google Workspace provides. It is a suite of secure cloud-native collaboration and productivity applications from Google. Through the Cloud Identity management layer, you can enable or disable access to various Google solutions for members of your organization, including Google Cloud Platform (GCP).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Signing up for Cloud Identity also creates an organizational node for your domain. This helps you map your corporate structure and controls to Google Cloud resources through the Google Cloud resource hierarchy.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Let&#8217;s discuss some Google Cloud security best practices<\/span><\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row height_medium\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row type_default valign_top\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">[vc_custom_heading text=&#8221;1. Ensure your IAM (Identify &amp; Access Management) policies are active&#8221; font_container=&#8221;tag:h3|text_align:left&#8221; google_fonts=&#8221;font_family:Roboto%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C500%2C500italic%2C700%2C700italic%2C900%2C900italic|font_style:400%20regular%3A400%3Anormal&#8221;]<div class=\"wpb_text_column\" ><div class=\"wpb_wrapper\"><p><span style=\"font-weight: 400;\">Like all major clouds, Google Cloud provides an Identity and Access Management (IAM) framework that you can use to define access controls for resources in your cloud environment. IAM is one of the pillars of constructing a secure cloud. To make the most of Google Cloud IAM, create rules that enforce least privilege. Least privilege means that each user can access only the specific services or resources required for their role. Avoid assigning broad sets of access rights, and grant rights to individual users rather than groups wherever possible.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">You should also validate your Google Cloud IAM configurations with Cloud Security Posture Management (CSPM) tools that can detect configuration oversights or errors that may expose your cloud environment to attack.<\/span><\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row height_medium\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row type_default valign_top\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">[vc_custom_heading text=&#8221;2. Ensure Multi Factor Authentication is enabled&#8221; font_container=&#8221;tag:h3|text_align:left&#8221; google_fonts=&#8221;font_family:Roboto%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C500%2C500italic%2C700%2C700italic%2C900%2C900italic|font_style:400%20regular%3A400%3Anormal&#8221;]<div class=\"wpb_text_column\" ><div class=\"wpb_wrapper\"><p><span style=\"font-weight: 400;\">Multi-factor authentication requires more than one mechanism to authenticate a user. This secures user logins from attackers exploiting stolen or weak credentials. By default, multi-factor authentication is not set.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Make sure that for each Google Cloud Platform project, folder, or organization, multi-factor authentication for each account is set and, if not, set it up.<\/span><\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row height_medium\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row type_default valign_top\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">[vc_custom_heading text=&#8221;Enjoy Seamless Operation With&#8221; google_fonts=&#8221;font_family:Roboto%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C500%2C500italic%2C700%2C700italic%2C900%2C900italic|font_style:400%20regular%3A400%3Anormal&#8221;]<h1 class=\"w-itext type_fadeIn align_left dynamic_bold\" onclick='return {&quot;duration&quot;:300,&quot;delay&quot;:3000,&quot;disablePartAnimation&quot;:false,&quot;html_nbsp_char&quot;:true}'>Swifta\u00a0<span class=\"w-itext-part changesat_0 changesat_1 changesat_2 changesat_3 dynamic\" onclick='return [&quot;Employment\\u00a0&quot;,&quot;Leave\\u00a0&quot;,&quot;Performance\\u00a0&quot;,&quot;Payroll\\u00a0&quot;]'><span>Employment&nbsp;<\/span><\/span>Management<\/h1><div class=\"w-btn-wrapper width_auto align_left\"><a class=\"w-btn us-btn-style_1\" target=\"_blank\" href=\"https:\/\/swiftahrms.com\/\" rel=\"noopener\"><span class=\"w-btn-label\">GET STARTED<\/span><\/a><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row height_medium\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row type_default valign_top\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">[vc_custom_heading text=&#8221;3. Ensure Security Key Enforcement for all admin account&#8221; font_container=&#8221;tag:h3|text_align:left&#8221; google_fonts=&#8221;font_family:Roboto%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C500%2C500italic%2C700%2C700italic%2C900%2C900italic|font_style:400%20regular%3A400%3Anormal&#8221;]<div class=\"wpb_text_column\" ><div class=\"wpb_wrapper\"><p><span style=\"font-weight: 400;\">GCP users with Organization Administrator roles have the highest level of privilege in the organization.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">These accounts should be protected with the strongest form of two-factor authentication: Security Key Enforcement. Ensure that admins use Security Keys to log in instead of weaker second factors, like SMS or one-time password (OTP). Security Keys are actual physical keys used to access Google Organization Administrator Accounts. They send an encrypted signature rather than a code, ensuring that logins cannot be phished.<\/span><\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row height_medium\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row type_default valign_top\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">[vc_custom_heading text=&#8221;4. Prevent use of User-Managed Service Account keys&#8221; font_container=&#8221;tag:h3|text_align:left&#8221; google_fonts=&#8221;font_family:Roboto%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C500%2C500italic%2C700%2C700italic%2C900%2C900italic|font_style:400%20regular%3A400%3Anormal&#8221;]<div class=\"wpb_text_column\" ><div class=\"wpb_wrapper\"><p><span style=\"font-weight: 400;\">Anyone with access to the keys can access resources through the service account. GCP-managed keys are used by Cloud Platform services, such as App Engine and Compute Engine. These keys cannot be downloaded. Google holds the key and rotates it automatically almost every week.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">On the other hand, user-managed keys are created, downloaded, and managed by the user and only expire 10 years after they are created.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">User-managed keys can easily be compromised by common development practices, such as exposing them in source code, leaving them in the downloads directory, or accidentally showing them on support blogs or channels. Please be aware that deleting user-managed service account keys may break communication with the applications using the corresponding keys.<\/span><\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row height_medium\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row type_default valign_top\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">[vc_custom_heading text=&#8221;Enjoy Seamless Operation With&#8221; google_fonts=&#8221;font_family:Roboto%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C500%2C500italic%2C700%2C700italic%2C900%2C900italic|font_style:400%20regular%3A400%3Anormal&#8221;]<h1 class=\"w-itext type_fadeIn align_left dynamic_bold\" onclick='return {&quot;duration&quot;:300,&quot;delay&quot;:3000,&quot;disablePartAnimation&quot;:false,&quot;html_nbsp_char&quot;:true}'>Swifta\u00a0<span class=\"w-itext-part changesat_0 changesat_1 dynamic\" onclick='return [&quot;Employee\\u00a0Lifecycle&quot;,&quot;Reports&quot;]'><span>Employee&nbsp;Lifecycle<\/span><\/span><\/h1><div class=\"w-btn-wrapper width_auto align_left\"><a class=\"w-btn us-btn-style_1\" target=\"_blank\" href=\"https:\/\/swiftahrms.com\/\" rel=\"noopener\"><span class=\"w-btn-label\">GET STARTED<\/span><\/a><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row height_medium\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row type_default valign_top\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">[vc_custom_heading text=&#8221;5. Ensure Cloud Storage is not anonymously or publicly accessible&#8221; font_container=&#8221;tag:h3|text_align:left&#8221; google_fonts=&#8221;font_family:Roboto%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C500%2C500italic%2C700%2C700italic%2C900%2C900italic|font_style:400%20regular%3A400%3Anormal&#8221;]<div class=\"wpb_text_column\" ><div class=\"wpb_wrapper\"><p><span style=\"font-weight: 400;\">Allowing anonymous or public access gives everyone permission to access bucket content. Such access may not be desirable if you are storing sensitive data. Therefore, make sure that anonymous or public access to the bucket is not allowed.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Also, you might want to prevent Storage buckets from becoming publicly accessible by setting up the Domain restricted sharing organization policy. <\/span><\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row height_medium\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row type_default valign_top\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">[vc_custom_heading text=&#8221;Conclusion&#8221; font_container=&#8221;tag:h3|text_align:left&#8221; google_fonts=&#8221;font_family:Roboto%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C500%2C500italic%2C700%2C700italic%2C900%2C900italic|font_style:400%20regular%3A400%3Anormal&#8221;]<div class=\"wpb_text_column\" ><div class=\"wpb_wrapper\"><p><span style=\"font-weight: 400;\">Moving to the cloud opens a new world of possibilities, but it also requires learning a new set of Google Cloud Platform security best practices. Each new cloud service you leverage has its own set of potential dangers you need to be aware of.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Luckily, Swifta Systems can guide you through these Google Cloud Platform security best practices, and help you meet your compliance requirements and set you up.<\/span><\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row height_medium\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row type_default valign_top\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><\/div><\/div><\/div><\/div><\/div><\/section>\n","protected":false},"excerpt":{"rendered":"You are about to solve a problem and turned to Google Cloud Platform and followed GCP security best practices to build and host your solution. You create your account and are all set to brew some coffee and sit down at your workstation to architect, code, build, and deploy. Except\u2026 you aren\u2019t. There are many...","protected":false},"author":3,"featured_media":1295,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1,23],"tags":[],"class_list":["post-1283","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-our-products","category-swifta-cloud"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v19.0.1 (Yoast SEO v24.9) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Google Cloud Security Best Practices - Swifta Blog<\/title>\n<meta name=\"description\" content=\"You\u2019ve got a problem to solve and turned to GCP and followed google cloud security best practices to build and host your solution....\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swifta.com\/blog\/google-cloud-security-best-practices\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Google Cloud Security Best Practices\" \/>\n<meta property=\"og:description\" content=\"You\u2019ve got a problem to solve and turned to GCP and followed google cloud security best practices to build and host your solution....\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swifta.com\/blog\/google-cloud-security-best-practices\/\" \/>\n<meta property=\"og:site_name\" content=\"Swifta Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/web.facebook.com\/swiftasystemsandservices\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-09-23T11:50:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-22T12:27:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swifta.com\/blog\/wp-content\/uploads\/2022\/09\/google-cloud-security-best-practices.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1800\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Adebola\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@SwiftaSystems\" \/>\n<meta name=\"twitter:site\" content=\"@SwiftaSystems\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Adebola\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/swifta.com\/blog\/google-cloud-security-best-practices\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/swifta.com\/blog\/google-cloud-security-best-practices\/\"},\"author\":{\"name\":\"Adebola\",\"@id\":\"https:\/\/swifta.com\/blog\/#\/schema\/person\/a182d9a63ae5b91ec09c7a33a4bb6720\"},\"headline\":\"Google Cloud Security Best Practices\",\"datePublished\":\"2022-09-23T11:50:47+00:00\",\"dateModified\":\"2023-05-22T12:27:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/swifta.com\/blog\/google-cloud-security-best-practices\/\"},\"wordCount\":1299,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/swifta.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/swifta.com\/blog\/google-cloud-security-best-practices\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/swifta.com\/blog\/wp-content\/uploads\/2022\/09\/google-cloud-security-best-practices.jpg\",\"articleSection\":[\"Our Products\",\"Swifta Cloud\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/swifta.com\/blog\/google-cloud-security-best-practices\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/swifta.com\/blog\/google-cloud-security-best-practices\/\",\"url\":\"https:\/\/swifta.com\/blog\/google-cloud-security-best-practices\/\",\"name\":\"Google Cloud Security Best Practices - Swifta Blog\",\"isPartOf\":{\"@id\":\"https:\/\/swifta.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/swifta.com\/blog\/google-cloud-security-best-practices\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/swifta.com\/blog\/google-cloud-security-best-practices\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/swifta.com\/blog\/wp-content\/uploads\/2022\/09\/google-cloud-security-best-practices.jpg\",\"datePublished\":\"2022-09-23T11:50:47+00:00\",\"dateModified\":\"2023-05-22T12:27:02+00:00\",\"description\":\"You\u2019ve got a problem to solve and turned to GCP and followed google cloud security best practices to build and host your solution....\",\"breadcrumb\":{\"@id\":\"https:\/\/swifta.com\/blog\/google-cloud-security-best-practices\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/swifta.com\/blog\/google-cloud-security-best-practices\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/swifta.com\/blog\/google-cloud-security-best-practices\/#primaryimage\",\"url\":\"https:\/\/swifta.com\/blog\/wp-content\/uploads\/2022\/09\/google-cloud-security-best-practices.jpg\",\"contentUrl\":\"https:\/\/swifta.com\/blog\/wp-content\/uploads\/2022\/09\/google-cloud-security-best-practices.jpg\",\"width\":1800,\"height\":600,\"caption\":\"google cloud security best practices\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/swifta.com\/blog\/google-cloud-security-best-practices\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/swifta.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Google Cloud Security Best Practices\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/swifta.com\/blog\/#website\",\"url\":\"https:\/\/swifta.com\/blog\/\",\"name\":\"Swifta Blog\",\"description\":\"Posts from Swifta\",\"publisher\":{\"@id\":\"https:\/\/swifta.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/swifta.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/swifta.com\/blog\/#organization\",\"name\":\"Swifta Systems and Services\",\"url\":\"https:\/\/swifta.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/swifta.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.swifta.com\/wp-content\/uploads\/2021\/09\/swifta-logo.jpg\",\"contentUrl\":\"https:\/\/blog.swifta.com\/wp-content\/uploads\/2021\/09\/swifta-logo.jpg\",\"width\":225,\"height\":225,\"caption\":\"Swifta Systems and Services\"},\"image\":{\"@id\":\"https:\/\/swifta.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/web.facebook.com\/swiftasystemsandservices\/\",\"https:\/\/x.com\/SwiftaSystems\",\"https:\/\/www.instagram.com\/swiftasystems\/\",\"http:\/\/www.linkedin.com\/company\/swifta-systems-and-services\/\",\"https:\/\/www.youtube.com\/channel\/UCg98KVmPGOHZtHYizESQNuw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/swifta.com\/blog\/#\/schema\/person\/a182d9a63ae5b91ec09c7a33a4bb6720\",\"name\":\"Adebola\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/swifta.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/2249b326aa7930c8624739673bcbbd2069ad78e3627e3fdaec509c063bfde393?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/2249b326aa7930c8624739673bcbbd2069ad78e3627e3fdaec509c063bfde393?s=96&d=mm&r=g\",\"caption\":\"Adebola\"},\"url\":\"https:\/\/swifta.com\/blog\/author\/adebola\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Google Cloud Security Best Practices - Swifta Blog","description":"You\u2019ve got a problem to solve and turned to GCP and followed google cloud security best practices to build and host your solution....","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swifta.com\/blog\/google-cloud-security-best-practices\/","og_locale":"en_US","og_type":"article","og_title":"Google Cloud Security Best Practices","og_description":"You\u2019ve got a problem to solve and turned to GCP and followed google cloud security best practices to build and host your solution....","og_url":"https:\/\/swifta.com\/blog\/google-cloud-security-best-practices\/","og_site_name":"Swifta Blog","article_publisher":"https:\/\/web.facebook.com\/swiftasystemsandservices\/","article_published_time":"2022-09-23T11:50:47+00:00","article_modified_time":"2023-05-22T12:27:02+00:00","og_image":[{"width":1800,"height":600,"url":"https:\/\/swifta.com\/blog\/wp-content\/uploads\/2022\/09\/google-cloud-security-best-practices.jpg","type":"image\/jpeg"}],"author":"Adebola","twitter_card":"summary_large_image","twitter_creator":"@SwiftaSystems","twitter_site":"@SwiftaSystems","twitter_misc":{"Written by":"Adebola","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/swifta.com\/blog\/google-cloud-security-best-practices\/#article","isPartOf":{"@id":"https:\/\/swifta.com\/blog\/google-cloud-security-best-practices\/"},"author":{"name":"Adebola","@id":"https:\/\/swifta.com\/blog\/#\/schema\/person\/a182d9a63ae5b91ec09c7a33a4bb6720"},"headline":"Google Cloud Security Best Practices","datePublished":"2022-09-23T11:50:47+00:00","dateModified":"2023-05-22T12:27:02+00:00","mainEntityOfPage":{"@id":"https:\/\/swifta.com\/blog\/google-cloud-security-best-practices\/"},"wordCount":1299,"commentCount":0,"publisher":{"@id":"https:\/\/swifta.com\/blog\/#organization"},"image":{"@id":"https:\/\/swifta.com\/blog\/google-cloud-security-best-practices\/#primaryimage"},"thumbnailUrl":"https:\/\/swifta.com\/blog\/wp-content\/uploads\/2022\/09\/google-cloud-security-best-practices.jpg","articleSection":["Our Products","Swifta Cloud"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/swifta.com\/blog\/google-cloud-security-best-practices\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/swifta.com\/blog\/google-cloud-security-best-practices\/","url":"https:\/\/swifta.com\/blog\/google-cloud-security-best-practices\/","name":"Google Cloud Security Best Practices - Swifta Blog","isPartOf":{"@id":"https:\/\/swifta.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swifta.com\/blog\/google-cloud-security-best-practices\/#primaryimage"},"image":{"@id":"https:\/\/swifta.com\/blog\/google-cloud-security-best-practices\/#primaryimage"},"thumbnailUrl":"https:\/\/swifta.com\/blog\/wp-content\/uploads\/2022\/09\/google-cloud-security-best-practices.jpg","datePublished":"2022-09-23T11:50:47+00:00","dateModified":"2023-05-22T12:27:02+00:00","description":"You\u2019ve got a problem to solve and turned to GCP and followed google cloud security best practices to build and host your solution....","breadcrumb":{"@id":"https:\/\/swifta.com\/blog\/google-cloud-security-best-practices\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swifta.com\/blog\/google-cloud-security-best-practices\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/swifta.com\/blog\/google-cloud-security-best-practices\/#primaryimage","url":"https:\/\/swifta.com\/blog\/wp-content\/uploads\/2022\/09\/google-cloud-security-best-practices.jpg","contentUrl":"https:\/\/swifta.com\/blog\/wp-content\/uploads\/2022\/09\/google-cloud-security-best-practices.jpg","width":1800,"height":600,"caption":"google cloud security best practices"},{"@type":"BreadcrumbList","@id":"https:\/\/swifta.com\/blog\/google-cloud-security-best-practices\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swifta.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Google Cloud Security Best Practices"}]},{"@type":"WebSite","@id":"https:\/\/swifta.com\/blog\/#website","url":"https:\/\/swifta.com\/blog\/","name":"Swifta Blog","description":"Posts from Swifta","publisher":{"@id":"https:\/\/swifta.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swifta.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/swifta.com\/blog\/#organization","name":"Swifta Systems and Services","url":"https:\/\/swifta.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/swifta.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/blog.swifta.com\/wp-content\/uploads\/2021\/09\/swifta-logo.jpg","contentUrl":"https:\/\/blog.swifta.com\/wp-content\/uploads\/2021\/09\/swifta-logo.jpg","width":225,"height":225,"caption":"Swifta Systems and Services"},"image":{"@id":"https:\/\/swifta.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/web.facebook.com\/swiftasystemsandservices\/","https:\/\/x.com\/SwiftaSystems","https:\/\/www.instagram.com\/swiftasystems\/","http:\/\/www.linkedin.com\/company\/swifta-systems-and-services\/","https:\/\/www.youtube.com\/channel\/UCg98KVmPGOHZtHYizESQNuw"]},{"@type":"Person","@id":"https:\/\/swifta.com\/blog\/#\/schema\/person\/a182d9a63ae5b91ec09c7a33a4bb6720","name":"Adebola","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/swifta.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/2249b326aa7930c8624739673bcbbd2069ad78e3627e3fdaec509c063bfde393?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2249b326aa7930c8624739673bcbbd2069ad78e3627e3fdaec509c063bfde393?s=96&d=mm&r=g","caption":"Adebola"},"url":"https:\/\/swifta.com\/blog\/author\/adebola\/"}]}},"_links":{"self":[{"href":"https:\/\/swifta.com\/blog\/wp-json\/wp\/v2\/posts\/1283","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swifta.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/swifta.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/swifta.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/swifta.com\/blog\/wp-json\/wp\/v2\/comments?post=1283"}],"version-history":[{"count":7,"href":"https:\/\/swifta.com\/blog\/wp-json\/wp\/v2\/posts\/1283\/revisions"}],"predecessor-version":[{"id":1674,"href":"https:\/\/swifta.com\/blog\/wp-json\/wp\/v2\/posts\/1283\/revisions\/1674"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swifta.com\/blog\/wp-json\/wp\/v2\/media\/1295"}],"wp:attachment":[{"href":"https:\/\/swifta.com\/blog\/wp-json\/wp\/v2\/media?parent=1283"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/swifta.com\/blog\/wp-json\/wp\/v2\/categories?post=1283"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swifta.com\/blog\/wp-json\/wp\/v2\/tags?post=1283"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}