{"id":6219,"date":"2020-01-03T17:25:25","date_gmt":"2020-01-03T10:25:25","guid":{"rendered":"http:\/\/gcloudvn.wam.vn\/gcp-bao-mat-nhu-the-nao\/"},"modified":"2023-04-27T14:09:09","modified_gmt":"2023-04-27T07:09:09","slug":"gcp-bao-mat-nhu-the-nao","status":"publish","type":"post","link":"https:\/\/gcloudvn.com\/en\/kienthuc\/gcp-bao-mat-nhu-the-nao\/","title":{"rendered":"How secure is Google Cloud Platform (GCP)?"},"content":{"rendered":"<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_83 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewbox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewbox=\"0 0 24 24\" version=\"1.2\" baseprofile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/gcloudvn.com\/en\/kienthuc\/gcp-bao-mat-nhu-the-nao\/#Co_so_ha_tang_dang_tin_cay\" >Trusted infrastructure<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/gcloudvn.com\/en\/kienthuc\/gcp-bao-mat-nhu-the-nao\/#Da_lop_bao_mat\" >Multi-layer security<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/gcloudvn.com\/en\/kienthuc\/gcp-bao-mat-nhu-the-nao\/#Hoat_dong_bao_mat_thiet_bi\" >Device operation &amp; security<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/gcloudvn.com\/en\/kienthuc\/gcp-bao-mat-nhu-the-nao\/#Truyen_tin_tren_Internet\" >Communication on the Internet\u00a0<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/gcloudvn.com\/en\/kienthuc\/gcp-bao-mat-nhu-the-nao\/#Nhan_Dang\" >Identification\u00a0<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/gcloudvn.com\/en\/kienthuc\/gcp-bao-mat-nhu-the-nao\/#Dich_vu_luu_tru\" >Hosting Service<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/gcloudvn.com\/en\/kienthuc\/gcp-bao-mat-nhu-the-nao\/#Trien_khai_he_thong\" >System deployment\u00a0<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/gcloudvn.com\/en\/kienthuc\/gcp-bao-mat-nhu-the-nao\/#Co_so_he_thong_phan_cung\" >Hardware system base<\/a><\/li><\/ul><\/li><\/ul><\/nav><\/div>\n<h2 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"Co_so_ha_tang_dang_tin_cay\"><\/span><strong>Trusted infrastructure<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400; font-size: 12pt;\">Google&#039;s cloud infrastructure doesn&#039;t rely on just one technology to make it secure. The Google team builds security on advanced layers of protection to deliver full depth protection. This is also one of the reasons <a href=\"https:\/\/gcloudvn.com\/en\/google-cloud-platform\/\">Google Cloud Platform<\/a> \u2013 GCP is the first choice of businesses.\u00a0<\/span><\/p>\n<h2 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"Da_lop_bao_mat\"><\/span><strong>Multi-layer security<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h3 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"Hoat_dong_bao_mat_thiet_bi\"><\/span><strong>Device operation &amp; security<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Google develops and deploys software systems using strict security procedures. Google operations teams detect and respond to threats to the system base from insiders and outsiders 24\/7\/365\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-15283 size-full\" src=\"https:\/\/gcloudvn.com\/wp-content\/uploads\/2020\/01\/pasted-image-1.png\" alt=\"How secure is Google Cloud Platform (GCP)? first\" width=\"337\" height=\"199\" \/><\/p>\n<h3 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"Truyen_tin_tren_Internet\"><\/span><strong>Communication on the Internet\u00a0<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Communication over the internet in Google&#039;s public cloud service is encrypted in transit. Google&#039;s network and systems have many layers of security to protect customers from DoS attacks.\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-15284 size-full\" src=\"https:\/\/gcloudvn.com\/wp-content\/uploads\/2020\/01\/pasted-image-2.png\" alt=\"How secure is Google Cloud Platform (GCP)? 2\" width=\"334\" height=\"218\" \/><\/p>\n<h3 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"Nhan_Dang\"><\/span><strong>Identification\u00a0<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Identity, user, and service will pass through stronger authentication than multiple layers of security. Access to important data will be secured by advanced technology like an anti-phishing security key.\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-15285 size-full\" src=\"https:\/\/gcloudvn.com\/wp-content\/uploads\/2020\/01\/pasted-image-3.png\" alt=\"How secure is Google Cloud Platform (GCP)? 3\" width=\"332\" height=\"203\" \/><\/p>\n<h3 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"Dich_vu_luu_tru\"><\/span><strong>Hosting Service<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Data stored in Google&#039;s IT systems is automatically encrypted and distributed for availability and trust. This will help guard against unauthorized access and service interruptions<\/span><\/p>\n<p style=\"text-align: justify;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-15286 size-full\" src=\"https:\/\/gcloudvn.com\/wp-content\/uploads\/2020\/01\/pasted-image-4.png\" alt=\"How secure is Google Cloud Platform (GCP)? 4\" width=\"334\" height=\"233\" \/><\/p>\n<h3 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"Trien_khai_he_thong\"><\/span><strong>System deployment\u00a0<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">All applications that run on Google&#039;s system base are implemented with an element of security in them. Google makes no assumptions about trust between services, and Google uses a variety of mechanisms to establish and maintain trust. Google&#039;s system base is designed to be multi-user from the ground up.<\/span><\/p>\n<p style=\"text-align: justify;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-15287 size-full\" src=\"https:\/\/gcloudvn.com\/wp-content\/uploads\/2020\/01\/pasted-image-5.png\" alt=\"How secure is Google Cloud Platform (GCP)? 5\" width=\"332\" height=\"217\" \/><\/p>\n<h3 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"Co_so_he_thong_phan_cung\"><\/span><strong>Hardware system base<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">From the physical system base to purpose-built servers, networking gear, and on-demand security chips to low-level software packages to run on multiple machines. The entire hardware system base is Google controlled, secured, built, and upgraded.\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-15288 size-full\" src=\"https:\/\/gcloudvn.com\/wp-content\/uploads\/2020\/01\/pasted-image-6.png\" alt=\"How secure is Google Cloud Platform (GCP)? 6\" width=\"335\" height=\"219\" \/><\/p>\n<p style=\"text-align: right;\"><strong>Source: Gimasys<\/strong><\/p>","protected":false},"excerpt":{"rendered":"<p>C\u01a1 s\u1edf h\u1ea1 t\u1ea7ng \u0111\u00e1ng tin c\u1eady C\u01a1 s\u1edf h\u1ea1 t\u1ea7ng cloud c\u1ee7a Google kh\u00f4ng d\u1ef1a v\u00e0o ch\u1ec9 m\u1ed9t c\u00f4ng ngh\u1ec7 \u0111\u1ec3 bi\u1ebfn n\u00f3 tr\u1edf n\u00ean an to\u00e0n. \u0110\u1ed9i ng\u0169 Google x\u00e2y d\u1ef1ng b\u1ea3o m\u1eadt d\u1ef1a tr\u00ean nh\u1eefng l\u1edbp b\u1ea3o&hellip;<\/p>","protected":false},"author":1,"featured_media":6220,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-6219","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kienthuc","entry","has-media"],"_links":{"self":[{"href":"https:\/\/gcloudvn.com\/en\/wp-json\/wp\/v2\/posts\/6219","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gcloudvn.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gcloudvn.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gcloudvn.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/gcloudvn.com\/en\/wp-json\/wp\/v2\/comments?post=6219"}],"version-history":[{"count":0,"href":"https:\/\/gcloudvn.com\/en\/wp-json\/wp\/v2\/posts\/6219\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gcloudvn.com\/en\/wp-json\/wp\/v2\/media\/6220"}],"wp:attachment":[{"href":"https:\/\/gcloudvn.com\/en\/wp-json\/wp\/v2\/media?parent=6219"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gcloudvn.com\/en\/wp-json\/wp\/v2\/categories?post=6219"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gcloudvn.com\/en\/wp-json\/wp\/v2\/tags?post=6219"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}