<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:media="http://search.yahoo.com/mrss/"><channel><title>Compliance</title><link>https://cloud.google.com/blog/products/compliance/</link><description>Compliance</description><atom:link href="https://cloudblog.withgoogle.com/blog/products/compliance/rss/" rel="self"></atom:link><language>en</language><lastBuildDate>Wed, 27 Sep 2023 16:42:19 +0000</lastBuildDate><image><url>https://cloud.google.com/blog/products/compliance/static/blog/images/google.a51985becaa6.png</url><title>Compliance</title><link>https://cloud.google.com/blog/products/compliance/</link></image><item><title>Expanding GKE posture: Policy Controller violations now in Security Command Center</title><link>https://cloud.google.com/blog/products/identity-security/expanding-gke-posture-policy-controller-violations-now-in-security-command-center/</link><description>&lt;div class="block-paragraph"&gt;&lt;p data-block-key="eau6r"&gt;Customers using Kubernetes at scale need consistent guardrails for how resources are used across their environments to improve security, resource management, and flexibility. Customers have told us that they need an easy way to apply and view those policy guardrails, so we &lt;a href="https://cloud.google.com/blog/products/containers-kubernetes/apply-policy-bundles-and-monitor-policy-compliance-at-scale-for-kubernetes-clusters"&gt;launched&lt;/a&gt; the Policy Controller dashboard and &lt;a href="https://cloud.google.com/blog/products/containers-kubernetes/new-features-and-integrations-for-policy-controller-dashboard"&gt;added&lt;/a&gt; support for all GKE environments.&lt;/p&gt;&lt;p data-block-key="ba6n3"&gt;We received further feedback from Security Administrators that policy and compliance violation reports for GKE should be available alongside security insights from across their Google Cloud estate. To address this, we are excited to announce a fully managed integration to surface &lt;a href="https://cloud.google.com/anthos-config-management/docs/concepts/policy-controller"&gt;Policy Controller&lt;/a&gt; (CIS Kubernetes Benchmark v1.5.1 and PCI-DSS v3.2.1) violations in &lt;a href="https://cloud.google.com/security-command-center"&gt;Security Command Center&lt;/a&gt; (SCC) .&lt;/p&gt;&lt;p data-block-key="4vrk0"&gt;SCC is our built-in security and risk management solution for Google Cloud. It helps discover misconfigurations, vulnerabilities, and compliance errors that can leave cloud assets exposed to attack.&lt;/p&gt;&lt;p data-block-key="esfla"&gt;Policy Controller can help you audit or enforce fully programmable policies for your GKE cluster resources that act as "guardrails," and prevent changes from violating security, operational, or compliance controls. Policy Controller can help accelerate your application modernization efforts by helping developers release code quickly and safely. Here are some examples of policies that you can audit or enforce with Policy Controller:&lt;/p&gt;&lt;ul&gt;&lt;li data-block-key="47oph"&gt;All container images must be from approved repositories&lt;/li&gt;&lt;li data-block-key="buk8g"&gt;All pods must have resource limits&lt;/li&gt;&lt;li data-block-key="dndge"&gt;Resources running on my fleet of clusters should be CIS-K8s benchmark-compliant&lt;/li&gt;&lt;li data-block-key="2rnra"&gt;Resources running on my fleet of clusters should be NIST-800 framework-compliant&lt;/li&gt;&lt;li data-block-key="6ohct"&gt;Resources running on my fleet of clusters should be PCI-DSS benchmark-compliant&lt;/li&gt;&lt;/ul&gt;&lt;h3 data-block-key="1avds"&gt;&lt;b&gt;Integrating Policy Controller with SCC&lt;/b&gt;&lt;/h3&gt;&lt;p data-block-key="2s8i2"&gt;Policy Controller violations are available in SCC for all Policy Controller users. Benefits of this integration include:&lt;/p&gt;&lt;ul&gt;&lt;li data-block-key="8jbtn"&gt;Increased visibility and transparency: With SCC integration, you can get organization-wide visibility into your platform and workload violations from a single dashboard. This can lead to improved security and compliance posture and reduced risk for your organization.&lt;/li&gt;&lt;li data-block-key="9rc6g"&gt;Ease of use: Fully managed integration means no additional build or operational overhead. It is available out-of-the-box.&lt;/li&gt;&lt;li data-block-key="einur"&gt;On-by-default: The integration will be on-by-default for all Policy Controller and Security Command Center users.&lt;/li&gt;&lt;li data-block-key="93q"&gt;Improved efficiency and decision-making: Integrated violations and compliance reporting provides data to inform decision making for taking the right steps to meet desired security, governance, and compliance standards.&lt;/li&gt;&lt;/ul&gt;&lt;h3 data-block-key="blboc"&gt;&lt;b&gt;Get started with Policy Controller and SCC integration&lt;/b&gt;&lt;/h3&gt;&lt;p data-block-key="5782h"&gt;For existing Policy Controller and Security Command Center users, you do not need to do anything. Policy Controller violations will automatically show up in &lt;a href="https://screenshot.googleplex.com/78DomzcLFfw5nmB" target="_blank"&gt;your SCC findings tab&lt;/a&gt;.&lt;/p&gt;&lt;/div&gt;
&lt;div class="block-image_full_width"&gt;






  
    &lt;div class="article-module h-c-page"&gt;
      &lt;div class="h-c-grid"&gt;
  

    &lt;figure class="article-image--large
      
      
        h-c-grid__col
        h-c-grid__col--6 h-c-grid__col--offset-3
        
        
      "
      &gt;

      
      
        
        &lt;img
            src="https://storage.googleapis.com/gweb-cloudblog-publish/images/SCC_integration_1.max-1000x1000.png"
        
          alt="SCC integration 1"&gt;
        
        &lt;/a&gt;
      
        &lt;figcaption class="article-image__caption "&gt;&lt;p data-block-key="f7fpy"&gt;View Policy Controller violations from SCC Findings tab&lt;/p&gt;&lt;/figcaption&gt;
      
    &lt;/figure&gt;

  
      &lt;/div&gt;
    &lt;/div&gt;
  




&lt;/div&gt;
&lt;div class="block-image_full_width"&gt;






  
    &lt;div class="article-module h-c-page"&gt;
      &lt;div class="h-c-grid"&gt;
  

    &lt;figure class="article-image--large
      
      
        h-c-grid__col
        h-c-grid__col--6 h-c-grid__col--offset-3
        
        
      "
      &gt;

      
      
        
        &lt;img
            src="https://storage.googleapis.com/gweb-cloudblog-publish/images/SCC_integration_3.max-1000x1000.png"
        
          alt="SCC integration 3"&gt;
        
        &lt;/a&gt;
      
        &lt;figcaption class="article-image__caption "&gt;&lt;p data-block-key="f7fpy"&gt;View Finding Details for Policy Controller violations&lt;/p&gt;&lt;/figcaption&gt;
      
    &lt;/figure&gt;

  
      &lt;/div&gt;
    &lt;/div&gt;
  




&lt;/div&gt;
&lt;div class="block-paragraph"&gt;&lt;p data-block-key="eau6r"&gt;Each Policy Controller assessment is visible alongside the &lt;a href="https://cloud.google.com/security-command-center/docs/concepts-vulnerabilities-findings"&gt;other assessments SCC offers&lt;/a&gt; and mapped to the relevant compliance control on the SCC &lt;a href="https://cloud.google.com/security-command-center/docs/how-to-use-security-command-center#vulnerabilities_page"&gt;vulnerabilities page&lt;/a&gt;.&lt;/p&gt;&lt;/div&gt;
&lt;div class="block-image_full_width"&gt;






  
    &lt;div class="article-module h-c-page"&gt;
      &lt;div class="h-c-grid"&gt;
  

    &lt;figure class="article-image--large
      
      
        h-c-grid__col
        h-c-grid__col--6 h-c-grid__col--offset-3
        
        
      "
      &gt;

      
      
        
        &lt;img
            src="https://storage.googleapis.com/gweb-cloudblog-publish/images/SCC_integration_2.max-1000x1000.png"
        
          alt="SCC integration 2"&gt;
        
        &lt;/a&gt;
      
        &lt;figcaption class="article-image__caption "&gt;&lt;p data-block-key="f7fpy"&gt;View Policy Controller findings from SCC Vulnerabilities tab&lt;/p&gt;&lt;/figcaption&gt;
      
    &lt;/figure&gt;

  
      &lt;/div&gt;
    &lt;/div&gt;
  




&lt;/div&gt;
&lt;div class="block-paragraph"&gt;&lt;p data-block-key="eau6r"&gt;We continue to invest in building out fully managed Policy features for GKE and GKE Enterprise, focusing on ease-of-use, out-of-the-box content, and a more integrated Google Cloud experience. To get started with Policy Controller, simply &lt;a href="https://cloud.google.com/anthos-config-management/docs/how-to/installing-policy-controller"&gt;install Policy Controller&lt;/a&gt; and try applying a policy bundle to audit your fleet of clusters against a standard such as the &lt;a href="https://cloud.google.com/anthos-config-management/docs/how-to/using-cis-k8s-benchmark"&gt;CIS Kubernetes benchmark&lt;/a&gt;. To get started with SCC today, visit the &lt;a href="https://console.cloud.google.com/security/command-center/?_ga=2.194811693.-1052444346.1690499148"&gt;Google Cloud console&lt;/a&gt; and our &lt;a href="https://cloud.google.com/security-command-center/docs/quickstart"&gt;quickstart guide&lt;/a&gt;.&lt;/p&gt;&lt;/div&gt;</description><pubDate>Wed, 27 Sep 2023 16:00:00 +0000</pubDate><guid>https://cloud.google.com/blog/products/identity-security/expanding-gke-posture-policy-controller-violations-now-in-security-command-center/</guid><category>Application Modernization</category><category>Compliance</category><category>Containers &amp; Kubernetes</category><category>Security &amp; Identity</category><og xmlns:og="http://ogp.me/ns#"><type>article</type><title>Expanding GKE posture: Policy Controller violations now in Security Command Center</title><description></description><site_name>Google</site_name><url>https://cloud.google.com/blog/products/identity-security/expanding-gke-posture-policy-controller-violations-now-in-security-command-center/</url></og><author xmlns:author="http://www.w3.org/2005/Atom"><name>Poonam Lamba</name><title>Senior Product Manager</title><department></department><company></company></author><author xmlns:author="http://www.w3.org/2005/Atom"><name>Tim Wingerter</name><title>Product Manager</title><department></department><company></company></author></item><item><title>Policy Controller dashboard: Now available for all Anthos and GKE environments</title><link>https://cloud.google.com/blog/products/containers-kubernetes/new-features-and-integrations-for-policy-controller-dashboard/</link><description>&lt;div class="block-paragraph"&gt;&lt;p&gt;Customers using Kubernetes at scale need consistent guardrails for how resources are used across all their environments to improve their security, resource management and flexibility, and to achieve faster time-to-market and better operational efficiency. &lt;/p&gt;&lt;p&gt;At the same time, customers tell us they need an easy way to apply and view those policy guardrails, including enforcement status, violations and remediation recommendations for their fleet of clusters. In January 2023, we &lt;a href="https://cloud.google.com/blog/products/containers-kubernetes/apply-policy-bundles-and-monitor-policy-compliance-at-scale-for-kubernetes-clusters"&gt;launched&lt;/a&gt; the Policy Controller dashboard along with out-of-the-box policy bundles. And now, the Policy Controller dashboard is available for all Google Kubernetes Engine (GKE) and Anthos environments (i.e., on-premises, multi-cloud and attached clusters) and includes a powerful flow to help remediate violations.&lt;/p&gt;&lt;p&gt;&lt;a href="https://cloud.google.com/anthos-config-management/docs/concepts/policy-controller"&gt;Policy Controller&lt;/a&gt; lets you enforce fully programmable policies for your cluster resources that act as &amp;quot;guardrails&amp;quot; and prevent any changes from violating security, operational, or compliance controls. Policy Controller can help accelerate your application modernization efforts by helping developers release code quickly and safely. Here are some examples of policies that you can audit or enforce with Policy Controller: &lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;All container images must be from approved repositories&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;All ingress hostnames must be globally unique&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;All pods must have resource limits&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;All namespaces must have a label that lists a point-of-contact&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;Resources running on my fleet of clusters should be CIS-K8s benchmark-compliant&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;Resources running on my fleet of clusters should be PCI-DSS benchmark-compliant&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;&lt;h3&gt;The Policy Controller dashboard&lt;/h3&gt;&lt;p&gt;With the Policy Controller dashboard, meanwhile, platform and security admins can:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;Get an at-a-glance view for the state of all the policies applied to the cluster fleet, including enforcement status (dryrun, warn, or enforced)&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;Easily troubleshoot and resolve policy violations by referring to opinionated recommendations for each violation&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;Get visibility into the compliance status of cluster resources&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;The Policy Controller dashboard is designed to be user-friendly and intuitive, making it easy for users of all skill levels to manage and monitor violations for their fleet of clusters, with a centralized view of policy violations that they can act on if necessary.&lt;/p&gt;&lt;/div&gt;
&lt;div class="block-image_full_width"&gt;






  
    &lt;div class="article-module h-c-page"&gt;
      &lt;div class="h-c-grid"&gt;
  

    &lt;figure class="article-image--large
      
      
        h-c-grid__col
        h-c-grid__col--6 h-c-grid__col--offset-3
        
        
      "
      &gt;

      
      
        
        &lt;img
            src="https://storage.googleapis.com/gweb-cloudblog-publish/images/blog-image-1_S9Uu51u.max-1000x1000.png"
        
          alt="blog-image-1.png"&gt;
        
        &lt;/a&gt;
      
    &lt;/figure&gt;

  
      &lt;/div&gt;
    &lt;/div&gt;
  




&lt;/div&gt;
&lt;div class="block-paragraph"&gt;&lt;p&gt;The circular “donuts” on the dashboard above show you the state of policies across all environments, including Policy Controller’s overall install status, any clusters that are in violation, and the total policies applied across the fleet of clusters. Enforcement action shows if you are just auditing your resources against policies or enforcing the policies at admission time on your clusters. &lt;/p&gt;&lt;p&gt;The bottom part of the Policy Controller dashboard page shows the coverage for each policy bundle for your fleet, breaking it down into percentage of resources that are compliant or in violation with this bundle:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;A fully grayed-out bar implies that the bundle is not applied to this fleet of clusters. If the bar is partially grayed-out, it means that the bundle has not been applied to one or more clusters in the fleet.&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;If one or more bundles are applied, overall compliance for your resources is calculated against the bundle. The blue portion of the bar shows the resources that are in compliance with the policy, while orange represents the violations. &lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;For each bundle, you can click on the violations link, which will take you to the detailed Violations tab depicted in the image below.&lt;/p&gt;&lt;/div&gt;
&lt;div class="block-image_full_width"&gt;






  
    &lt;div class="article-module h-c-page"&gt;
      &lt;div class="h-c-grid"&gt;
  

    &lt;figure class="article-image--large
      
      
        h-c-grid__col
        h-c-grid__col--6 h-c-grid__col--offset-3
        
        
      "
      &gt;

      
      
        
        &lt;img
            src="https://storage.googleapis.com/gweb-cloudblog-publish/images/blog-image-2.max-1000x1000.png"
        
          alt="blog-image-2.png"&gt;
        
        &lt;/a&gt;
      
        &lt;figcaption class="article-image__caption "&gt;&lt;i&gt;The new Violations tab makes it easy to view and understand policy violations in your environment. &lt;/i&gt;&lt;/figcaption&gt;
      
    &lt;/figure&gt;

  
      &lt;/div&gt;
    &lt;/div&gt;
  




&lt;/div&gt;
&lt;div class="block-paragraph"&gt;&lt;p&gt;The Violations tab lets you filter violations based on things like cluster, bundle, or resource type. Furthermore, you can now group violations by constraint and namespace to help different user personas do their jobs more efficiently. From either one of the groupings, users can click on the constraint link which will show the Constraint view as shown below. &lt;/p&gt;&lt;/div&gt;
&lt;div class="block-image_full_width"&gt;






  
    &lt;div class="article-module h-c-page"&gt;
      &lt;div class="h-c-grid"&gt;
  

    &lt;figure class="article-image--large
      
      
        h-c-grid__col
        h-c-grid__col--6 h-c-grid__col--offset-3
        
        
      "
      &gt;

      
      
        
        &lt;img
            src="https://storage.googleapis.com/gweb-cloudblog-publish/images/blog-image-3.max-1000x1000.png"
        
          alt="blog-image-3.png"&gt;
        
        &lt;/a&gt;
      
        &lt;figcaption class="article-image__caption "&gt;&lt;i&gt;The Constraint details tab shows the remediation action and constraint yaml.&lt;/i&gt;&lt;/figcaption&gt;
      
    &lt;/figure&gt;

  
      &lt;/div&gt;
    &lt;/div&gt;
  




&lt;/div&gt;
&lt;div class="block-paragraph"&gt;&lt;p&gt;The Constraint details tab describes the constraint, and shows the recommended action to fix the violations against the constraint and affected resources. You can also view the constraint’s YAML as it exists on your clusters. The affected resources tab lists all the resources that are in violation of the constraint with a detailed error message as shown in the image below.&lt;/p&gt;&lt;/div&gt;
&lt;div class="block-image_full_width"&gt;






  
    &lt;div class="article-module h-c-page"&gt;
      &lt;div class="h-c-grid"&gt;
  

    &lt;figure class="article-image--large
      
      
        h-c-grid__col
        h-c-grid__col--6 h-c-grid__col--offset-3
        
        
      "
      &gt;

      
      
        
        &lt;img
            src="https://storage.googleapis.com/gweb-cloudblog-publish/images/blog-image-4.max-1000x1000.png"
        
          alt="blog-image-4.png"&gt;
        
        &lt;/a&gt;
      
        &lt;figcaption class="article-image__caption "&gt;&lt;i&gt;The Affected Resources tab showing the resources in violation.&lt;/i&gt;&lt;/figcaption&gt;
      
    &lt;/figure&gt;

  
      &lt;/div&gt;
    &lt;/div&gt;
  




&lt;/div&gt;
&lt;div class="block-paragraph"&gt;&lt;h3&gt;Get started today&lt;/h3&gt;&lt;p&gt;We continue to invest in building out fully managed Policy features for GKE and Anthos, focusing on ease-of-use, out-of-the-box content, and a more integrated Google Cloud experience. To get started with Policy Controller, simply &lt;a href="https://cloud.google.com/anthos-config-management/docs/how-to/installing-policy-controller"&gt;install Policy Controller&lt;/a&gt; and try applying a policy bundle to audit your fleet of clusters against a standard such as the &lt;a href="https://cloud.google.com/anthos-config-management/docs/how-to/using-cis-k8s-benchmark"&gt;CIS Kubernetes benchmark&lt;/a&gt;. You can also &lt;a href="https://cloud.google.com/anthos-config-management/docs/how-to/try-policy-controller?hl=en"&gt;try Policy Controller&lt;/a&gt; to audit your cluster against the &lt;a href="https://cloud.google.com/anthos-config-management/docs/how-to/using-policy-essentials-v2022"&gt;Policy Essentials bundle&lt;/a&gt;. Stay tuned to learn more about the latest features in Policy Controller in our next blog post, and we hope you join us at &lt;a href="https://cloud.withgoogle.com/next?utm_source=google&amp;amp;utm_medium=cpc&amp;amp;utm_campaign=FY23-Q3-global-ENDM33-physicalevent-er-next-2023-mc&amp;amp;utm_content=early-bird&amp;amp;utm_term=-&amp;amp;gclid=Cj0KCQjwpPKiBhDvARIsACn-gzCJG2-nB9gWBQQT1MRYI6BDUETiikAyFmFISaABk2wbUaAZu9WmLlAaAoXPEALw_wcB&amp;amp;gclsrc=aw.ds" target="_blank"&gt;Next ’23&lt;/a&gt; to learn more.&lt;/p&gt;&lt;/div&gt;</description><pubDate>Tue, 16 May 2023 16:00:00 +0000</pubDate><guid>https://cloud.google.com/blog/products/containers-kubernetes/new-features-and-integrations-for-policy-controller-dashboard/</guid><category>Anthos</category><category>Application Modernization</category><category>Compliance</category><category>Containers &amp; Kubernetes</category><og xmlns:og="http://ogp.me/ns#"><type>article</type><title>Policy Controller dashboard: Now available for all Anthos and GKE environments</title><description></description><site_name>Google</site_name><url>https://cloud.google.com/blog/products/containers-kubernetes/new-features-and-integrations-for-policy-controller-dashboard/</url></og><author xmlns:author="http://www.w3.org/2005/Atom"><name>Poonam Lamba</name><title>Senior Product Manager</title><department></department><company></company></author></item><item><title>Harden your Kubernetes clusters and monitor workload compliance at scale with new PCI DSS policy bundle</title><link>https://cloud.google.com/blog/products/containers-kubernetes/new-pci-dss-policy-bundle/</link><description>&lt;div class="block-paragraph"&gt;&lt;p&gt;&lt;a href="https://cloud.google.com/security/compliance/pci-dss"&gt;PCI DSS&lt;/a&gt; is a set of network security and business &lt;a href="https://www.pcisecuritystandards.org/document_library?category=pcidss&amp;amp;document=pci_dss" target="_blank"&gt;best practices guidelines&lt;/a&gt; adopted by the PCI Security Standards Council to establish a “minimum security standard” to protect customers’ payment card information. Google Cloud undergoes a third-party audit to certify individual products against the PCI DSS at least annually, and customers can build off of these attestations to measure their applications’ compliance. This blog can help you evaluate your new and existing applications for PCI DSS compliance. &lt;/p&gt;&lt;p&gt;&lt;a href="https://cloud.google.com/anthos-config-management/docs/concepts/policy-controller"&gt;Policy Controller&lt;/a&gt; enables the enforcement of fully programmable policies for your clusters. A Policy bundle is an out-of-the-box set of constraints that are created and maintained by Google Cloud. Policy bundles help audit your cluster resources against Kubernetes standards, industry standards, or Google Cloud-recommended best practices. Many &lt;a href="https://cloud.google.com/blog/products/containers-kubernetes/apply-policy-bundles-and-monitor-policy-compliance-at-scale-for-kubernetes-clusters"&gt;policy bundles are available now&lt;/a&gt;, and they can be easily used by a new or existing user as-is without writing a single line of code. You can also view the status of Policy bundle coverage and compliance for your fleet of clusters using &lt;a href="https://cloud.google.com/anthos-config-management/docs/how-to/policy-controller-status"&gt;Policy Controller dashboard&lt;/a&gt;. &lt;/p&gt;&lt;h3&gt;The PCI DSS v3.2.1 Policy bundle&lt;/h3&gt;&lt;p&gt;Security administrators from your organization can view the alignment for your applications with the PCI DSS requirements by viewing the violations for the PCI DSS Policy bundle. Each constraint in the PCI DSS bundle also has the &lt;a href="https://cloud.google.com/anthos-config-management/docs/how-to/using-pci-dss-v3"&gt;PCI DSS control number&lt;/a&gt; listed which can be mapped back to &lt;a href="https://www.pcisecuritystandards.org/document_library/?category=pcidss&amp;amp;document=pci_dss" target="_blank"&gt;PCI requirements&lt;/a&gt;, these mappings may be used during the compliance reporting, as needed. More information on how to view the list of violations is covered in the next section in this blog.&lt;/p&gt;&lt;p&gt;The PCI DSS v3.2.1 Policy bundle includes policies focusing on the following areas: &lt;/p&gt;&lt;p&gt;Secure networks and systems &lt;/p&gt;&lt;ol&gt;&lt;li&gt;&lt;p&gt;Ensures requirements for a firewall by requiring all apps to contain a specified audit label.&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;Ensures requirements for network-controls by requiring all apps to contain a specified annotation.&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;Requires that every namespace defined in the cluster has a NetworkPolicy.&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;Requires a valid app.kubernetes.io/managed-by= label on RoleBinding resources.&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;Restricts the creation of resources using a default service account.&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;Restricts pods from using the default namespace.&lt;/p&gt;&lt;/li&gt;&lt;/ol&gt;&lt;p&gt;Secure systems and applications&lt;/p&gt;&lt;ol&gt;&lt;li&gt;&lt;p&gt;Enforce all PeerAuthentications cannot overwrite strict mTLS.&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;Requires the presence of an anti-virus daemonset.&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;Enforce the presence and enablement of Anthos Config Management.&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;Enforce Cloud Armor configuration on BackendConfig resources.&lt;/p&gt;&lt;/li&gt;&lt;/ol&gt;&lt;p&gt;Strong access control and monitoring&lt;/p&gt;&lt;ol&gt;&lt;li&gt;&lt;p&gt;Restricts the use of basic-auth type secrets.&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;Ensures consistent and correct time on Nodes by ensuring the usage of &lt;a href="https://cloud.google.com/container-optimized-os/docs"&gt;Container-Optimized OS&lt;/a&gt; as the OS image.&lt;/p&gt;&lt;/li&gt;&lt;/ol&gt;&lt;h3&gt;Using the PCI DSS v3.2.1 Policy bundle&lt;/h3&gt;&lt;p&gt;The PCI DSS v.3.2.1 Policy bundle can be installed on &lt;a href="https://cloud.google.com/anthos/clusters/docs"&gt;Anthos Cluster(s)&lt;/a&gt; with &lt;a href="https://cloud.devsite.corp.google.com/anthos-config-management/docs/how-to/installing-policy-controller" target="_blank"&gt;Policy Controller&lt;/a&gt; v1.14.0 or higher. The policies included are configured in "audit" mode by default, so they do not impact any of your existing or new workloads. You can apply Policy bundles using kubectl (demonstrated just below), &lt;a href="https://cloud.google.com/anthos-config-management/docs/how-to/using-pci-dss-v3#kpt"&gt;kpt&lt;/a&gt;, or &lt;a href="https://cloud.google.com/anthos-config-management/docs/how-to/using-pci-dss-v3#config-sync"&gt;Config Sync&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;1. Install and initialize the &lt;a href="https://cloud.google.com/sdk/docs/install"&gt;Google Cloud CLI&lt;/a&gt;, which provides the gcloud and kubectl commands used in these instructions. If you use Cloud Shell, Google Cloud CLI comes pre-installed.&lt;/p&gt;&lt;p&gt;2. &lt;a href="https://cloud.google.com/anthos-config-management/docs/how-to/installing-policy-controller"&gt;Install Policy Controller&lt;/a&gt; on your Anthos cluster with the &lt;a href="https://cloud.google.com/anthos-config-management/docs/how-to/creating-policy-controller-constraints#referential"&gt;referential constraints&lt;/a&gt; and the &lt;a href="https://cloud.google.com/anthos-config-management/docs/latest/reference/constraint-template-library"&gt;Policy Controller Constraint Template Library&lt;/a&gt; enabled. &lt;/p&gt;&lt;p&gt;3. Save the following YAML manifest to a file as policycontroller-config.yaml. The manifest configures Policy Controller to watch specific kinds of objects.&lt;/p&gt;&lt;p&gt;Note: If you already have an existing Config in the gatekeeper-system namespace, you must include all previous customization settings to preserve your changes.&lt;/p&gt;&lt;/div&gt;
&lt;div class="block-code"&gt;&lt;dl&gt;
    &lt;dt&gt;code_block&lt;/dt&gt;
    &lt;dd&gt;&amp;lt;ListValue: [StructValue([(&amp;#x27;code&amp;#x27;, &amp;#x27;apiVersion: config.gatekeeper.sh/v1alpha1\r\nkind: Config\r\nmetadata:\r\n  name: config\r\n  namespace: &amp;quot;gatekeeper-system&amp;quot;\r\nspec:\r\n  sync:\r\n    syncOnly:\r\n      - group: &amp;quot;apps&amp;quot;\r\n        version: &amp;quot;v1&amp;quot;\r\n        kind: &amp;quot;DaemonSet&amp;quot;\r\n      - group: &amp;quot;networking.k8s.io&amp;quot;\r\n        version: &amp;quot;v1&amp;quot;\r\n        kind: &amp;quot;NetworkPolicy&amp;quot;&amp;#x27;), (&amp;#x27;language&amp;#x27;, &amp;#x27;&amp;#x27;), (&amp;#x27;caption&amp;#x27;, &amp;lt;wagtail.rich_text.RichText object at 0x7f3aa99ff4c0&amp;gt;)])]&amp;gt;&lt;/dd&gt;
&lt;/dl&gt;&lt;/div&gt;
&lt;div class="block-paragraph"&gt;&lt;p&gt;4. Apply the policycontroller-config.yaml manifest:&lt;/p&gt;&lt;/div&gt;
&lt;div class="block-code"&gt;&lt;dl&gt;
    &lt;dt&gt;code_block&lt;/dt&gt;
    &lt;dd&gt;&amp;lt;ListValue: [StructValue([(&amp;#x27;code&amp;#x27;, &amp;#x27;kubectl apply -f policycontroller-config.yaml&amp;#x27;), (&amp;#x27;language&amp;#x27;, &amp;#x27;&amp;#x27;), (&amp;#x27;caption&amp;#x27;, &amp;lt;wagtail.rich_text.RichText object at 0x7f3aa99ffd00&amp;gt;)])]&amp;gt;&lt;/dd&gt;
&lt;/dl&gt;&lt;/div&gt;
&lt;div class="block-paragraph"&gt;&lt;p&gt;4. Preview the policy constraints with kubectl&lt;/p&gt;&lt;/div&gt;
&lt;div class="block-code"&gt;&lt;dl&gt;
    &lt;dt&gt;code_block&lt;/dt&gt;
    &lt;dd&gt;&amp;lt;ListValue: [StructValue([(&amp;#x27;code&amp;#x27;, &amp;#x27;kubectl kustomize https://github.com/GoogleCloudPlatform/acm-policy-controller-library.git/anthos-bundles/pci-dss-v3.2.1&amp;#x27;), (&amp;#x27;language&amp;#x27;, &amp;#x27;&amp;#x27;), (&amp;#x27;caption&amp;#x27;, &amp;lt;wagtail.rich_text.RichText object at 0x7f3aa99ff850&amp;gt;)])]&amp;gt;&lt;/dd&gt;
&lt;/dl&gt;&lt;/div&gt;
&lt;div class="block-paragraph"&gt;&lt;p&gt;5. Apply the policy constraints with kubectl:&lt;/p&gt;&lt;/div&gt;
&lt;div class="block-code"&gt;&lt;dl&gt;
    &lt;dt&gt;code_block&lt;/dt&gt;
    &lt;dd&gt;&amp;lt;ListValue: [StructValue([(&amp;#x27;code&amp;#x27;, &amp;#x27;kubectl apply -k https://github.com/GoogleCloudPlatform/acm-policy-controller-library.git/anthos-bundles/pci-dss-v3.2.1&amp;#x27;), (&amp;#x27;language&amp;#x27;, &amp;#x27;&amp;#x27;), (&amp;#x27;caption&amp;#x27;, &amp;lt;wagtail.rich_text.RichText object at 0x7f3aa99fffa0&amp;gt;)])]&amp;gt;&lt;/dd&gt;
&lt;/dl&gt;&lt;/div&gt;
&lt;div class="block-paragraph"&gt;&lt;p&gt;The output will be similar to the following:&lt;/p&gt;&lt;/div&gt;
&lt;div class="block-code"&gt;&lt;dl&gt;
    &lt;dt&gt;code_block&lt;/dt&gt;
    &lt;dd&gt;&amp;lt;ListValue: [StructValue([(&amp;#x27;code&amp;#x27;, &amp;#x27;asmpeerauthnstrictmtls.constraints.gatekeeper.sh/pci-dss-v3.2.1-asm-peer-authn-strict-mtls created\r\nk8sblockcreationwithdefaultserviceaccount.constraints.gatekeeper.sh/pci-dss-v3.2.1-block-creation-with-default-serviceaccount created\r\nk8sblockobjectsoftype.constraints.gatekeeper.sh/pci-dss-v3.2.1-block-secrets-of-type-basic-auth created\r\nk8senforcecloudarmorbackendconfig.constraints.gatekeeper.sh/pci-dss-v3.2.1-enforce-cloudarmor-backendconfig created\r\n...&amp;#x27;), (&amp;#x27;language&amp;#x27;, &amp;#x27;&amp;#x27;), (&amp;#x27;caption&amp;#x27;, &amp;lt;wagtail.rich_text.RichText object at 0x7f3aa99ff220&amp;gt;)])]&amp;gt;&lt;/dd&gt;
&lt;/dl&gt;&lt;/div&gt;
&lt;div class="block-paragraph"&gt;&lt;p&gt;6. Verify that policy constraints have been installed and check if violations exist across the cluster:&lt;/p&gt;&lt;/div&gt;
&lt;div class="block-code"&gt;&lt;dl&gt;
    &lt;dt&gt;code_block&lt;/dt&gt;
    &lt;dd&gt;&amp;lt;ListValue: [StructValue([(&amp;#x27;code&amp;#x27;, &amp;#x27;kubectl get constraint -l policycontroller.gke.io/bundleName=pci-dss-v3.2.1&amp;#x27;), (&amp;#x27;language&amp;#x27;, &amp;#x27;&amp;#x27;), (&amp;#x27;caption&amp;#x27;, &amp;lt;wagtail.rich_text.RichText object at 0x7f3aa99ff5e0&amp;gt;)])]&amp;gt;&lt;/dd&gt;
&lt;/dl&gt;&lt;/div&gt;
&lt;div class="block-paragraph"&gt;&lt;p&gt;The output is similar to the following:&lt;/p&gt;&lt;/div&gt;
&lt;div class="block-code"&gt;&lt;dl&gt;
    &lt;dt&gt;code_block&lt;/dt&gt;
    &lt;dd&gt;&amp;lt;ListValue: [StructValue([(&amp;#x27;code&amp;#x27;, &amp;#x27;NAME                                                                                         ENFORCEMENT-ACTION   TOTAL-VIOLATIONS\r\nasmpeerauthnstrictmtls.constraints.gatekeeper.sh/pci-dss-v3.2.1-asm-peer-authn-strict-mtls   dryrun               0\r\n\r\nNAME                                                                                                                            ENFORCEMENT-ACTION   TOTAL-VIOLATIONS\r\nk8sblockcreationwithdefaultserviceaccount.constraints.gatekeeper.sh/pci-dss-v3.2.1-block-creation-with-default-serviceaccount   dryrun               0\r\n\r\nNAME                                                                                              ENFORCEMENT-ACTION   TOTAL-VIOLATIONS\r\nk8sblockobjectsoftype.constraints.gatekeeper.sh/pci-dss-v3.2.1-block-secrets-of-type-basic-auth   dryrun               0\r\n…&amp;#x27;), (&amp;#x27;language&amp;#x27;, &amp;#x27;&amp;#x27;), (&amp;#x27;caption&amp;#x27;, &amp;lt;wagtail.rich_text.RichText object at 0x7f3aa99fff10&amp;gt;)])]&amp;gt;&lt;/dd&gt;
&lt;/dl&gt;&lt;/div&gt;
&lt;div class="block-paragraph"&gt;&lt;p&gt;In order to remediate the violations, we recommend that you update your resource(s) yaml — some &lt;a href="https://cloud.google.com/anthos-config-management/docs/how-to/using-pci-dss-v3#configure_your_clusters_workload_for_pci-dss_v321"&gt;guidelines&lt;/a&gt; are included here. Each violation will also include steps to fix the violation, which can be viewed both from CLI and the Policy Controller dashboard. &lt;/p&gt;&lt;h3&gt;Viewing the PCI DSS Policy bundle violations on Policy Dashboard&lt;/h3&gt;&lt;p&gt;Violations on the cluster can also be viewed in the UI using the &lt;a href="https://cloud.devsite.corp.google.com/anthos-config-management/docs/how-to/policy-controller-status" target="_blank"&gt;Policy Controller Dashboard&lt;/a&gt;.&lt;/p&gt;&lt;/div&gt;
&lt;div class="block-image_full_width"&gt;






  
    &lt;div class="article-module h-c-page"&gt;
      &lt;div class="h-c-grid"&gt;
  

    &lt;figure class="article-image--large
      
      
        h-c-grid__col
        h-c-grid__col--6 h-c-grid__col--offset-3
        
        
      "
      &gt;

      
      
        
        &lt;img
            src="https://storage.googleapis.com/gweb-cloudblog-publish/images/1_Kubernetes_clusters.max-1000x1000.jpg"
        
          alt="1 Kubernetes clusters.jpg"&gt;
        
        &lt;/a&gt;
      
        &lt;figcaption class="article-image__caption "&gt;&lt;i&gt;The Policy Controller dashboard&lt;/i&gt;&lt;/figcaption&gt;
      
    &lt;/figure&gt;

  
      &lt;/div&gt;
    &lt;/div&gt;
  




&lt;/div&gt;
&lt;div class="block-paragraph"&gt;&lt;h3&gt;Monitoring the cluster(s) for PCI DSS Policy Bundle violations &lt;/h3&gt;&lt;p&gt;The PCI DSS policy bundle by default has its enforcement action set to dryrun, which is the configuration for Policy Controller to show you violations without blocking or aborting any resources. This gives you the ability to audit your clusters, share any violations with workload owners and collaborate on fixing critical security issues.&lt;/p&gt;&lt;p&gt;All policy violations are automatically recorded in &lt;a href="https://cloud.google.com/logging/docs"&gt;Cloud Logging&lt;/a&gt; and can be found by applying these filters in the &lt;a href="https://console.cloud.google.com/logs/viewer"&gt;Logs Explorer&lt;/a&gt;:&lt;/p&gt;&lt;/div&gt;
&lt;div class="block-code"&gt;&lt;dl&gt;
    &lt;dt&gt;code_block&lt;/dt&gt;
    &lt;dd&gt;&amp;lt;ListValue: [StructValue([(&amp;#x27;code&amp;#x27;, &amp;#x27;resource.type=&amp;quot;k8s_container&amp;quot;\r\nresource.labels.namespace_name=&amp;quot;gatekeeper-system&amp;quot;\r\nresource.labels.pod_name:&amp;quot;gatekeeper-audit-&amp;quot;\r\njsonPayload.process: &amp;quot;audit&amp;quot;\r\njsonPayload.event_type: &amp;quot;violation_audited&amp;quot;\r\njsonPayload.constraint_name:*\r\njsonPayload.constraint_namespace:*&amp;#x27;), (&amp;#x27;language&amp;#x27;, &amp;#x27;&amp;#x27;), (&amp;#x27;caption&amp;#x27;, &amp;lt;wagtail.rich_text.RichText object at 0x7f3aa99ff610&amp;gt;)])]&amp;gt;&lt;/dd&gt;
&lt;/dl&gt;&lt;/div&gt;
&lt;div class="block-paragraph"&gt;&lt;p&gt;You can also set up log based &lt;a href="https://cloud.google.com/logging/docs/alerting/log-based-alerts"&gt;alerts&lt;/a&gt; using Cloud Monitoring for whenever policy violations occur to get notified. &lt;/p&gt;&lt;p&gt;Policy Controller includes the metrics related to policy usage such as number of constraints, constraint templates, audit violations detected just to name a few (see &lt;a href="https://cloud.google.com/anthos-config-management/docs/how-to/monitoring-policy-controller#available_metrics"&gt;list of metrics exposed&lt;/a&gt;). These metrics can be exported to cloud monitoring and/or prometheus at install time (&lt;a href="https://cloud.google.com/blog/topics/anthos/view-policy-enforcement-metrics-for-acm-policy-controller"&gt;blog&lt;/a&gt;, &lt;a href="https://cloud.google.com/anthos-config-management/docs/how-to/policy-controller-metrics"&gt;docs&lt;/a&gt;). You can also set up alerts based on metrics.&lt;/p&gt;&lt;h3&gt;Conclusion&lt;/h3&gt;&lt;p&gt;Policy Controller enables the enforcement of both &lt;a href="https://cloud.google.com/anthos-config-management/docs/concepts/policy-controller-bundles"&gt;Google created and maintained Policy bundles&lt;/a&gt; and &lt;a href="https://cloud.google.com/anthos-config-management/docs/how-to/creating-policy-controller-constraints"&gt;custom policies&lt;/a&gt; for your cluster which prevent changes to the Kubernetes API from violating security, operational, or compliance controls. Optionally, Policy Controller can also be used to &lt;a href="https://cloud.google.com/anthos-config-management/docs/tutorials/app-policy-validation-ci-pipeline"&gt;analyze configuration for compliance before deployment&lt;/a&gt; to your Kubernetes cluster.&lt;/p&gt;&lt;h3&gt;Get started today&lt;/h3&gt;&lt;p&gt;The easiest way to get started with Anthos Policy Controller is to &lt;a href="https://cloud.google.com/anthos-config-management/docs/how-to/installing-policy-controller"&gt;install Policy Controller&lt;/a&gt; and try out some of the other Google created and maintained Policy bundles:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;&lt;a href="https://cloud.devsite.corp.google.com/anthos-config-management/docs/how-to/using-asm-security-policy" target="_blank"&gt;Anthos Service Mesh security&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;a href="https://cloud.devsite.corp.google.com/anthos-config-management/docs/how-to/using-cis-k8s-benchmark" target="_blank"&gt;CIS Kubernetes Benchmark v1.5.1&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;a href="https://cloud.devsite.corp.google.com/anthos-config-management/docs/how-to/using-constraints-to-enforce-pod-security" target="_blank"&gt;Pod Security Policy&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;a href="https://cloud.devsite.corp.google.com/anthos-config-management/docs/concepts/policy-controller-bundles#:~:text=Pod%20Security%20Standards%20Baseline" target="_blank"&gt;Pod Security Standards Baseline&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;a href="https://cloud.google.com/anthos-config-management/docs/how-to/using-pss-restricted"&gt;Pod Security Standards Restricted&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;a href="https://cloud.devsite.corp.google.com/anthos-config-management/docs/how-to/using-policy-essentials-v2022" target="_blank"&gt;Policy Essentials&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;</description><pubDate>Wed, 08 Feb 2023 17:00:00 +0000</pubDate><guid>https://cloud.google.com/blog/products/containers-kubernetes/new-pci-dss-policy-bundle/</guid><category>Anthos</category><category>Application Modernization</category><category>Compliance</category><category>Containers &amp; Kubernetes</category><og xmlns:og="http://ogp.me/ns#"><type>article</type><title>Harden your Kubernetes clusters and monitor workload compliance at scale with new PCI DSS policy bundle</title><description></description><site_name>Google</site_name><url>https://cloud.google.com/blog/products/containers-kubernetes/new-pci-dss-policy-bundle/</url></og><author xmlns:author="http://www.w3.org/2005/Atom"><name>Poonam Lamba</name><title>Senior Product Manager</title><department></department><company></company></author><author xmlns:author="http://www.w3.org/2005/Atom"><name>Andrew Peabody</name><title>Technical Solutions Consultant, Google Cloud</title><department></department><company></company></author></item><item><title>Apply policy bundles and monitor policy compliance at scale for Kubernetes clusters</title><link>https://cloud.google.com/blog/products/containers-kubernetes/apply-policy-bundles-and-monitor-policy-compliance-at-scale-for-kubernetes-clusters/</link><description>&lt;div class="block-paragraph"&gt;&lt;p&gt;As more enterprise customers are adopting a hybrid and multi cloud strategy, centralized security and governance become increasingly important as workloads are distributed across the environments. Anthos is our cloud-centric container platform to run modern applications anywhere consistently and at scale. Anthos Config Management (ACM) automates policy and security for Kubernetes clusters and is comprised of &lt;a href="https://cloud.google.com/anthos-config-management/docs/how-to/installing-config-sync"&gt;Config Sync&lt;/a&gt;, &lt;a href="https://cloud.google.com/anthos-config-management/docs/concepts/config-controller-overview"&gt;Config Controller&lt;/a&gt;, and &lt;a href="https://cloud.google.com/anthos-config-management/docs/concepts/policy-controller"&gt;Policy Controller&lt;/a&gt;. Config Sync reconciles the state of clusters with one or more Git repositories. Config Controller is a hosted service that allows administrators to manage Google Cloud Platform (GCP) resources in a declarative fashion. This blog covers the enhancements we have brought to the Policy Controller component. &lt;/p&gt;&lt;p&gt;As a key component of ACM, &lt;a href="https://cloud.google.com/anthos-config-management/docs/concepts/policy-controller"&gt;Policy Controller&lt;/a&gt; enables the enforcement of fully programmable policies for your clusters. These policies act as &amp;quot;guardrails&amp;quot; and prevent any changes from violating security, operational, or compliance controls. Policy Controller can help accelerate your application modernization efforts by helping developers release code quickly and safely. &lt;/p&gt;&lt;p&gt;We are thrilled to announce the launch of our new built-in &lt;b&gt;Policy Controller Dashboard&lt;/b&gt;, a powerful tool that makes it easy to manage and monitor the policy guardrails applied to your Fleet of clusters. &lt;/p&gt;&lt;p&gt;With Policy Controller Dashboard, Platform and Security Admins can:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;Get an at-a-glance view for the state of all the policies applied to Fleet of clusters including enforcement status (dryrun or enforced)&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;Easily troubleshoot and resolve policy violations by referring to opinionated recommendations for each violation&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;Get visibility into compliance status of the cluster resources&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Policy Controller Dashboard is designed to be user friendly and intuitive, making it easy for users of all skill levels to manage and monitor violations for their fleet of clusters. It allows you to have a centralized view of Policy violations and take action if necessary.&lt;/p&gt;&lt;/div&gt;
&lt;div class="block-image_full_width"&gt;






  
    &lt;div class="article-module h-c-page"&gt;
      &lt;div class="h-c-grid"&gt;
  

    &lt;figure class="article-image--large
      
      
        h-c-grid__col
        h-c-grid__col--6 h-c-grid__col--offset-3
        
        
      "
      &gt;

      
      
        
        &lt;img
            src="https://storage.googleapis.com/gweb-cloudblog-publish/images/1_The_Anthos_Policy_Controller_dashboard.max-1000x1000.jpg"
        
          alt="1 The Anthos Policy Controller dashboard.jpg"&gt;
        
        &lt;/a&gt;
      
        &lt;figcaption class="article-image__caption "&gt;&lt;i&gt;The Anthos Policy Controller dashboard&lt;/i&gt;&lt;/figcaption&gt;
      
    &lt;/figure&gt;

  
      &lt;/div&gt;
    &lt;/div&gt;
  




&lt;/div&gt;
&lt;div class="block-paragraph"&gt;&lt;p&gt;The dashboard can also show you which of your resources are affected by a specific policy, and can make opinionated suggestions on how to fix the problem.&lt;/p&gt;&lt;/div&gt;
&lt;div class="block-image_full_width"&gt;






  
    &lt;div class="article-module h-c-page"&gt;
      &lt;div class="h-c-grid"&gt;
  

    &lt;figure class="article-image--large
      
      
        h-c-grid__col
        h-c-grid__col--6 h-c-grid__col--offset-3
        
        
      "
      &gt;

      
      
        
        &lt;img
            src="https://storage.googleapis.com/gweb-cloudblog-publish/images/2_Identifying_resources_affected_by_vulner.max-1000x1000.jpg"
        
          alt="2 Identifying resources affected by vulnerabilities .jpg"&gt;
        
        &lt;/a&gt;
      
        &lt;figcaption class="article-image__caption "&gt;Identifying resources affected by vulnerabilities&lt;/figcaption&gt;
      
    &lt;/figure&gt;

  
      &lt;/div&gt;
    &lt;/div&gt;
  




&lt;/div&gt;
&lt;div class="block-paragraph"&gt;&lt;h3&gt;Introducing Policy Bundles&lt;/h3&gt;&lt;p&gt;&lt;a href="https://cloud.google.com/anthos-config-management/docs/concepts/policy-controller-bundles"&gt;&lt;b&gt;Policy bundle&lt;/b&gt;&lt;/a&gt; is an out-of-the-box set of constraints that are created and maintained by Google. The bundles help audit your cluster resources against kubernetes standards, industry standards, or Google recommended best practices. &lt;/p&gt;&lt;p&gt;Policy bundles are available now, and can be easily used by a new or existing user as-is &lt;b&gt;i.e. without writing a single line of code&lt;/b&gt;. Users will view the status of Policy bundle coverage for the fleet from the Policy Controller dashboard i.e. if you have 4 clusters in your fleet and you have applied the PCI DSS 3.2.1 bundle on all 4 clusters then the dashboard will show a 100% coverage for your fleet. In addition to coverage, the dashboard will also show the overall state of compliance for each bundle for the entire fleet of clusters.&lt;/p&gt;&lt;p&gt;Following policy bundles are available &lt;b&gt;now&lt;/b&gt; with Anthos:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;&lt;a href="https://cloud.google.com/anthos-config-management/docs/how-to/using-pci-dss-v3"&gt;PCI DSS 3.2.1&lt;/a&gt;: Helps audit your cluster resources against the PCI-DSS 3.2.1 industry standard&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;a href="https://cloud.google.com/anthos-config-management/docs/how-to/using-cis-k8s-benchmark"&gt;CIS Kubernetes Benchmark 1.5.1&lt;/a&gt; : Helps audit your cluster resources against the CIS Kubernetes Benchmark, a set of recommendations for configuring Kubernetes to support a robust security posture.&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;a href="https://cloud.google.com/anthos-config-management/docs/how-to/using-pss-baseline"&gt;PSS Baseline&lt;/a&gt;: Helps audit your cluster resources against the &lt;a href="https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline" target="_blank"&gt;PSS - Baseline&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;a href="https://cloud.google.com/anthos-config-management/docs/how-to/using-pss-restricted"&gt;PSS Restricted&lt;/a&gt;: Helps audit your cluster resources against the &lt;a href="https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted" target="_blank"&gt;PSS - Restricted&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;a href="https://cloud.google.com/anthos-config-management/docs/how-to/using-constraints-to-enforce-pod-security"&gt;PSP&lt;/a&gt;: Helps audit your cluster resources against &lt;a href="https://v1-24.docs.kubernetes.io/docs/concepts/security/pod-security-policy/" target="_blank"&gt;Pod Security Policies&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;a href="https://cloud.google.com/anthos-config-management/docs/how-to/using-policy-essentials-v2022"&gt;Policy Essentials&lt;/a&gt;: Helps audit your cluster resources against Google recommended best practices for containerized workloads&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;a href="https://cloud.google.com/anthos-config-management/docs/how-to/using-asm-security-policy"&gt;Anthos Service Mesh Security&lt;/a&gt; : Helps audit your cluster for recommended Anthos Service Mesh best practices&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;&lt;h3&gt;Get started today&lt;/h3&gt;&lt;p&gt;The easiest way to get started with Anthos Policy Controller is to just &lt;a href="https://cloud.google.com/anthos-config-management/docs/how-to/installing-policy-controller"&gt;install Policy controller&lt;/a&gt; and try applying a policy bundle to audit your fleet of clusters against a standard such as &lt;a href="https://cloud.google.com/anthos-config-management/docs/how-to/using-cis-k8s-benchmark"&gt;CIS benchmark&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;You can also &lt;a href="https://cloud.google.com/anthos-config-management/docs/how-to/try-policy-controller?hl=en"&gt;Try Policy controller&lt;/a&gt; to audit your cluster against Policy Essentials bundle.&lt;/p&gt;&lt;/div&gt;</description><pubDate>Mon, 23 Jan 2023 17:00:00 +0000</pubDate><guid>https://cloud.google.com/blog/products/containers-kubernetes/apply-policy-bundles-and-monitor-policy-compliance-at-scale-for-kubernetes-clusters/</guid><category>Anthos</category><category>Application Modernization</category><category>Compliance</category><category>Containers &amp; Kubernetes</category><og xmlns:og="http://ogp.me/ns#"><type>article</type><title>Apply policy bundles and monitor policy compliance at scale for Kubernetes clusters</title><description></description><site_name>Google</site_name><url>https://cloud.google.com/blog/products/containers-kubernetes/apply-policy-bundles-and-monitor-policy-compliance-at-scale-for-kubernetes-clusters/</url></og><author xmlns:author="http://www.w3.org/2005/Atom"><name>Poonam Lamba</name><title>Senior Product Manager</title><department></department><company></company></author></item><item><title>CISO Survival Guide: Vital questions to help guide transformation success</title><link>https://cloud.google.com/blog/products/identity-security/vital-questions-to-help-guide-transformation-success/</link><description>&lt;div class="block-paragraph"&gt;&lt;p data-block-key="35z5s"&gt;Part of being a security leader whose organization is taking on a digital transformation is preparing for hard questions – and complex answers – on how to implement a transformation strategy. &lt;/p&gt;&lt;p data-block-key="bzkaw"&gt;In our previous &lt;a href="https://cloud.google.com/blog/products/identity-security/move-financial-services-organization-to-cloud-more-securely/"&gt;CISO Survival Guide&lt;/a&gt; blog, we discussed how financial services organizations can &lt;a href="https://cloud.google.com/blog/products/identity-security/move-financial-services-organization-to-cloud-more-securely/"&gt;more securely move to the cloud&lt;/a&gt;. We examined how to organize and think about the digital transformation challenges facing the highly-regulated financial services industry, including the benefits of the Organization, Operation, and Technology (OOT) approach, as well as embracing new processes like &lt;a href="https://cloud.google.com/blog/topics/developers-practitioners/devops-and-cicd-google-cloud-explained"&gt;continuous delivery&lt;/a&gt; and required &lt;a href="https://cloud.google.com/blog/products/identity-security/culture-comes-first-in-cloud-transformations"&gt;cultural shifts&lt;/a&gt;.&lt;/p&gt;&lt;p data-block-key="06x9l"&gt;As part of Google Cloud’s commitment to &lt;a href="https://www.forbes.com/sites/googlecloud/2022/04/19/demystifying-shared-fate-a-new-approach-to-understand-cybersecurity/" target="_blank"&gt;shared fate&lt;/a&gt;, today we offer tips on how to ask the right questions that can help create the conversations that lead to better transformation outcomes for your organization. While there often is more than one right answer, a thoughtful, methodical approach to asking targeted questions and maintaining an open mind about the answers you hear back can help achieve your desired result. These questions are designed to help you figure out where to start and where to end your organization’s security transformation. By asking the following questions, CISOs and business leaders can develop a constructive, focused dialogue which can help determine the proper balance between implementing security controls and fine-tuning the risk tolerance set by the executive management and the board of directors.&lt;/p&gt;&lt;/div&gt;
&lt;div class="block-aside"&gt;&lt;dl&gt;
    &lt;dt&gt;aside_block&lt;/dt&gt;
    &lt;dd&gt;&amp;lt;ListValue: [StructValue([(&amp;#x27;title&amp;#x27;, &amp;#x27;Hear monthly from our Cloud CISO in your inbox&amp;#x27;), (&amp;#x27;body&amp;#x27;, &amp;lt;wagtail.rich_text.RichText object at 0x7f3aaa173eb0&amp;gt;), (&amp;#x27;btn_text&amp;#x27;, &amp;#x27;Subscribe today&amp;#x27;), (&amp;#x27;href&amp;#x27;, &amp;#x27;https://inthecloud.withgoogle.com/google-cloud-ciso-newsletter/signup.html&amp;#x27;), (&amp;#x27;image&amp;#x27;, None)])]&amp;gt;&lt;/dd&gt;
&lt;/dl&gt;&lt;/div&gt;
&lt;div class="block-paragraph"&gt;&lt;h3 data-block-key="jqf0v"&gt;To start the conversation, begin by asking: &lt;/h3&gt;&lt;ul&gt;&lt;li data-block-key="lzl12"&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p data-block-key="ty2f0"&gt;What defines our organization’s culture?&lt;/p&gt;&lt;ul&gt;&lt;li data-block-key="td9wb"&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p data-block-key="v7v2w"&gt;How can we best integrate the culture with our security goals?&lt;/p&gt;&lt;h3 data-block-key="q2k7k"&gt;CISOs should ask business leaders:&lt;/h3&gt;&lt;ul&gt;&lt;li data-block-key="g1eae"&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p data-block-key="c23b8"&gt;What makes a successful transformation? &lt;/p&gt;&lt;ul&gt;&lt;li data-block-key="lnlxt"&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p data-block-key="9bjkp"&gt;What are the key goals of the transformation?&lt;/p&gt;&lt;ul&gt;&lt;li data-block-key="f3t9x"&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p data-block-key="fb7wf"&gt;What data is (most) valuable?  &lt;/p&gt;&lt;ul&gt;&lt;li data-block-key="79mai"&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p data-block-key="3kc39"&gt;What data can be retired, reclassified, or migrated?  &lt;/p&gt;&lt;ul&gt;&lt;li data-block-key="u7nzp"&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p data-block-key="d6z8h"&gt;What losses can we afford to take and still function?  &lt;/p&gt;&lt;ul&gt;&lt;li data-block-key="fsicj"&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p data-block-key="v3hh2"&gt;What is the real risk that the organization is willing to accept?&lt;/p&gt;&lt;h3 data-block-key="th53d"&gt;Business leaders should ask CISOs and the security team:&lt;/h3&gt;&lt;ul&gt;&lt;li data-block-key="w2huw"&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p data-block-key="4amf0"&gt;What are the best practices for protecting our valuable data?&lt;/p&gt;&lt;ul&gt;&lt;li data-block-key="d23fo"&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p data-block-key="tv8f6"&gt;What is the business impact of implementing those controls?  &lt;/p&gt;&lt;ul&gt;&lt;li data-block-key="lwq8h"&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p data-block-key="49aol"&gt;What are the top threats that we need to address?&lt;/p&gt;&lt;h3 data-block-key="gx3jo"&gt;CISOs and business leaders should ask: &lt;/h3&gt;&lt;ul&gt;&lt;li data-block-key="r5u80"&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p data-block-key="lbqxq"&gt;Which threats are no longer as important? &lt;/p&gt;&lt;ul&gt;&lt;li data-block-key="graq8"&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p data-block-key="8gwsv"&gt;Where could we potentially use spending for more cost-effective controls such as firewalls and antivirus software?&lt;/p&gt;&lt;ul&gt;&lt;li data-block-key="3q7lk"&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p data-block-key="p18tc"&gt;What benefits do we get from refactoring our applications?&lt;/p&gt;&lt;ul&gt;&lt;li data-block-key="kvv3x"&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p data-block-key="mi17r"&gt;Are we really transforming, or lifting and shifting?&lt;/p&gt;&lt;ul&gt;&lt;li data-block-key="9m7sv"&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p data-block-key="optlj"&gt;How should we perform identity and access management to meet our business objectives?&lt;/p&gt;&lt;ul&gt;&lt;li data-block-key="1sntm"&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p data-block-key="5i268"&gt;What are the core controls needed to ensure enterprise-level performance for the first workloads?&lt;/p&gt;&lt;/div&gt;
&lt;div class="block-paragraph_with_image"&gt;&lt;div class="article-module h-c-page"&gt;
  &lt;div class="h-c-grid uni-paragraph-wrap"&gt;
    &lt;div class="uni-paragraph
      h-c-grid__col h-c-grid__col--8 h-c-grid__col-m--6 h-c-grid__col-l--6
      h-c-grid__col--offset-2 h-c-grid__col-m--offset-3 h-c-grid__col-l--offset-3"&gt;

      






  

    &lt;figure class="article-image--wrap-small
      
      "
      &gt;

      
      
        
        &lt;img
            src="https://storage.googleapis.com/gweb-cloudblog-publish/images/gcat_inline_wrap.max-1000x1000.jpg"
        
          alt="gcat wrap.jpg"&gt;
        
        &lt;/a&gt;
      
    &lt;/figure&gt;

  





      &lt;h3 data-block-key="t1pso"&gt;CISOs and risk teams should ask:&lt;/h3&gt;&lt;ul&gt;&lt;li data-block-key="x4z74"&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p data-block-key="3m8d3"&gt;How can we use the restructuring of an existing body of code to streamline security functions?&lt;/p&gt;&lt;ul&gt;&lt;li data-block-key="cnyb6"&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p data-block-key="zuy2k"&gt;How should we monitor our security posture to ensure we are aligned with our risk appetite?&lt;/p&gt;&lt;h3 data-block-key="fkhrq"&gt;Business and technical teams should ask:&lt;/h3&gt;&lt;ul&gt;&lt;li data-block-key="583gs"&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p data-block-key="cnw9z"&gt;What’s our backup plan? &lt;/p&gt;&lt;ul&gt;&lt;li data-block-key="804r8"&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p data-block-key="hlefw"&gt;What do we do if that fails?&lt;/p&gt;
    &lt;/div&gt;
  &lt;/div&gt;
&lt;/div&gt;

&lt;/div&gt;
&lt;div class="block-paragraph"&gt;&lt;h3 data-block-key="wnvms"&gt;Practical advice and the realities of operational transformation&lt;/h3&gt;&lt;p data-block-key="bvua5"&gt;Some organizations have been working in the cloud for more than a decade and have already addressed many operational procedures, sometimes with painful lessons learned along the way. If you’ve been operating in the cloud securely for that long, we recognize that there’s a lot to be gained from understanding your approaches to culture, operational expertise, and technology. &lt;/p&gt;&lt;p data-block-key="rdp25"&gt;However, there are still many organizations that have not thought through how they will operate in a cloud environment until it’s almost ready – and at that point, it might be too late. If you can’t detail how a cloud environment will operate before its launch, how will you know who should be responsible for maintaining it? &lt;/p&gt;&lt;p data-block-key="xix23"&gt;Who are the critical stakeholders, along with those responsible for engineering and maintaining specific systems, who should be identified at the start of the transformation?  There are likely several groups of stakeholders, such as those aligned with operations for transformation, and those focused on control design for cloud aligned with operations. &lt;/p&gt;&lt;p data-block-key="ljvzp"&gt;If you don’t have the operators involved in the design phase, you’re destined to create clever security controls with very little practical value because those tasked with day-to-day maintenance most likely won’t have the expertise or training to effectively operate these controls. &lt;/p&gt;&lt;p data-block-key="hx5ww"&gt;This is complicated by the fact that many organizations are struggling to recruit and retain resources with the right skills to operate in the cloud. We believe that training current employees to learn new cloud skills, and giving them the time away from other responsibilities, can help build skilled, diverse cloud security teams.&lt;/p&gt;&lt;p data-block-key="i54ya"&gt;If your organization continually experiences high turnover in security leadership and skilled staff, it’s up to you to navigate your culture to ensure greater consistency. You can, of course, choose to supplement internal knowledge with trusted partners – however, that’s an expensive strategy for ongoing operational cost.&lt;/p&gt;&lt;p data-block-key="2f499"&gt;We met recently with a security organization that turns over skilled staff and leadership every two to three years. This rate of churn results in a continual resetting of security goals. This particular team joked that it’s like “Groundhog Day” as they constantly re-evaluate their best security approaches yet make no meaningful progress. This is not a model to emulate.&lt;/p&gt;&lt;p data-block-key="g28gj"&gt;Many security controls fail not because they are improperly engineered, but because the people who use them – your security team – are improperly trained and insufficiently  motivated. This is especially true for teams with high turnover rates and other organizational misalignments. A security control that blocks 100% of attacks might be engineered correctly, but if you can’t efficiently operate it, the effectiveness of the control will plummet to zero over time. Worse, it then becomes a liability because you incorrectly assume you have a functioning control.&lt;/p&gt;&lt;p data-block-key="wmzt0"&gt;In our next blog, we will highlight several proven approaches that we believe can help guide your security team through your organization’s digital transformation. &lt;/p&gt;&lt;p data-block-key="yqmkp"&gt;To learn more now, check out:&lt;/p&gt;&lt;p data-block-key="4rusj"&gt;&lt;/p&gt;&lt;ul&gt;&lt;li data-block-key="5w2wn"&gt;&lt;a href="https://cloud.google.com/blog/products/identity-security/move-financial-services-organization-to-cloud-more-securely/"&gt;Previous blog&lt;/a&gt;&lt;/li&gt;&lt;li data-block-key="njy8s"&gt;Podcast: &lt;a href="https://cloud.withgoogle.com/cloudsecurity/podcast/ep80-ciso-walks-into-the-cloud-frustrations-successes-lessons-and-does-the-risk-change/" target="_blank"&gt;CISO walks into the cloud: Frustrations, successes, lessons… and does the risk change?&lt;/a&gt;&lt;/li&gt;&lt;li data-block-key="8wzzo"&gt;Report: &lt;a href="https://services.google.com/fh/files/misc/ciso-guide-to-security-transformation.pdf" target="_blank"&gt;CISO’s Guide to Cloud Security Transformation&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p data-block-key="qbmvr"&gt;&lt;/p&gt;&lt;/div&gt;
&lt;div class="block-related_article_tout"&gt;





&lt;div class="uni-related-article-tout h-c-page"&gt;
  &lt;section class="h-c-grid"&gt;
    &lt;a href="https://cloud.google.com/blog/products/identity-security/move-financial-services-organization-to-cloud-more-securely/"
       data-analytics='{
                       "event": "page interaction",
                       "category": "article lead",
                       "action": "related article - inline",
                       "label": "article: {slug}"
                     }'
       class="uni-related-article-tout__wrapper h-c-grid__col h-c-grid__col--8 h-c-grid__col-m--6 h-c-grid__col-l--6
        h-c-grid__col--offset-2 h-c-grid__col-m--offset-3 h-c-grid__col-l--offset-3 uni-click-tracker"&gt;
      &lt;div class="uni-related-article-tout__inner-wrapper"&gt;
        &lt;p class="uni-related-article-tout__eyebrow h-c-eyebrow"&gt;Related Article&lt;/p&gt;

        &lt;div class="uni-related-article-tout__content-wrapper"&gt;
          &lt;div class="uni-related-article-tout__image-wrapper"&gt;
            &lt;div class="uni-related-article-tout__image" style="background-image: url('https://storage.googleapis.com/gweb-cloudblog-publish/images/cybersecurity_action_team_jl2RU0c.max-500x500.jpg')"&gt;&lt;/div&gt;
          &lt;/div&gt;
          &lt;div class="uni-related-article-tout__content"&gt;
            &lt;h4 class="uni-related-article-tout__header h-has-bottom-margin"&gt;CISO Survival Guide: How financial services organizations can more securely move to the cloud&lt;/h4&gt;
            &lt;p class="uni-related-article-tout__body"&gt;The first in a series of CISO survival guide blog posts offers cloud security advice for CISOs in financial services organizations tackli...&lt;/p&gt;
            &lt;div class="cta module-cta h-c-copy  uni-related-article-tout__cta muted"&gt;
              &lt;span class="nowrap"&gt;Read Article
                &lt;svg class="icon h-c-icon" role="presentation"&gt;
                  &lt;use xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#mi-arrow-forward"&gt;&lt;/use&gt;
                &lt;/svg&gt;
              &lt;/span&gt;
            &lt;/div&gt;
          &lt;/div&gt;
        &lt;/div&gt;
      &lt;/div&gt;
    &lt;/a&gt;
  &lt;/section&gt;
&lt;/div&gt;

&lt;/div&gt;</description><pubDate>Mon, 09 Jan 2023 17:00:00 +0000</pubDate><guid>https://cloud.google.com/blog/products/identity-security/vital-questions-to-help-guide-transformation-success/</guid><category>Compliance</category><category>Financial Services</category><category>Google Cloud</category><category>Security &amp; Identity</category><media:content height="540" url="https://storage.googleapis.com/gweb-cloudblog-publish/images/cybersecurity_action_team_jl2RU0c.max-600x600.jpg" width="540"></media:content><og xmlns:og="http://ogp.me/ns#"><type>article</type><title>CISO Survival Guide: Vital questions to help guide transformation success</title><description></description><image>https://storage.googleapis.com/gweb-cloudblog-publish/images/cybersecurity_action_team_jl2RU0c.max-600x600.jpg</image><site_name>Google</site_name><url>https://cloud.google.com/blog/products/identity-security/vital-questions-to-help-guide-transformation-success/</url></og><author xmlns:author="http://www.w3.org/2005/Atom"><name>Anton Chuvakin</name><title>Security Advisor, Office of the CISO</title><department></department><company></company></author><author xmlns:author="http://www.w3.org/2005/Atom"><name>David Stone</name><title>Director, Financial Services, Office of the CISO</title><department></department><company></company></author></item><item><title>Detect spoofing exceptions in financial markets with Google Cloud and GTS</title><link>https://cloud.google.com/blog/topics/financial-services/detect-spoofing-exceptions-with-google-cloud-and-gts/</link><description>&lt;div class="block-paragraph"&gt;&lt;h3&gt;Regulatory Surveillance of Trading Activity with Google Cloud&lt;/h3&gt;&lt;p&gt;The purpose of regulatory surveillance is to verify market fairness and protect against unethical trading behavior. Since regulatory reporting requirements have local differences, global financial institutions often need to operate in a large number of jurisdictions, meet specific variations of the local regulations of each, conduct internal surveillance, and justify their firm's compliance approaches. Additionally, with the rapid increase in low-latency co-location trading networks, the speed at which orders are entered to the market and transactions are executed has gone from seconds to microseconds, while the &lt;a href="https://www.globenewswire.com/news-release/2022/06/02/2455046/0/en/Global-Trade-Surveillance-Systems-Market-Size-Share-Industry-Trends-Analysis-Report-By-Deployment-Mode-By-Organization-Size-By-Vertical-By-Component-By-Solutions-Type-By-Regional-O.html" target="_blank"&gt;volume has simultaneously exploded&lt;/a&gt;. Thus, these firms require robust recording and surveillance solutions to monitor and audit trading activity for potential market manipulation and make this available to internal stakeholders and regulators. This blog focuses on one such &lt;a href="https://github.com/GoogleCloudPlatform/reg-reporting-blueprint/tree/main/use_cases/examples/flashing_detection" target="_blank"&gt;solution&lt;/a&gt; that is built on Google Cloud, using SQL analytics on BigQuery.&lt;br/&gt;&lt;/p&gt;&lt;p&gt;Market surveillance is getting more complex as deceptive trading practices &lt;a href="https://www.globenewswire.com/news-release/2022/06/02/2455046/0/en/Global-Trade-Surveillance-Systems-Market-Size-Share-Industry-Trends-Analysis-Report-By-Deployment-Mode-By-Organization-Size-By-Vertical-By-Component-By-Solutions-Type-By-Regional-O.html" target="_blank"&gt;increase with higher trading volume&lt;/a&gt; and the emergence of new asset classes. One such deceptive practice is “&lt;b&gt;spoofing&lt;/b&gt;,” which largely revolves around the intent (or lack thereof) of traders to place bonafide orders, devoid of any premeditation to cancel a particular order before or at the time of its placement. “&lt;b&gt;Flashing&lt;/b&gt;” is a form of market spoofing — where market participants exhibit a pattern of submitting orders that are not intended to be fulfilled, but rather only to move ("improve") the market to benefit a subsequent order on the other side of the market. The “flashed” orders are short-lived orders, which are canceled quickly after being entered and before getting executed. In the world of electronic trading, order entry is fully automated and typically happens within milliseconds or microseconds.&lt;/p&gt;&lt;p&gt;Large financial institutions have solved this by implementing in-house surveillance systems that operate in their local data centers. Although on-premises solutions achieve the desired result of detecting and reporting such activities, one challenge is their long implementation and testing cycles. Another is the costly and rigid infrastructure, often overprovisioned to serve the peak times of the reporting cycles and sitting largely unused the remainder of the time. Hence, these institutions need mechanisms for efficiently operating the surveillance processes, and use the data for value-add activities.&lt;/p&gt;&lt;p&gt;This blog post’s focus — a cloud-native pipeline that fits to help meet cost-saving targets, operational efficiencies and demanding evolving regulatory requirements — collaboratively developed by &lt;a href="https://gtsx.com" target="_blank"&gt;GTS Securities LLC&lt;/a&gt;, Strike Technologies LLC (its technology provider) and Google Cloud, is one such mechanism.&lt;/p&gt;&lt;/div&gt;
&lt;div class="block-paragraph_with_image"&gt;&lt;div class="article-module h-c-page"&gt;
  &lt;div class="h-c-grid uni-paragraph-wrap"&gt;
    &lt;div class="uni-paragraph
      h-c-grid__col h-c-grid__col--8 h-c-grid__col-m--6 h-c-grid__col-l--6
      h-c-grid__col--offset-2 h-c-grid__col-m--offset-3 h-c-grid__col-l--offset-3"&gt;

      






  

    &lt;figure class="article-image--wrap-small
      
      "
      &gt;

      
      
        
        &lt;img
            src="https://storage.googleapis.com/gweb-cloudblog-publish/images/gts.max-1000x1000.jpg"
        
          alt="gts.jpg"&gt;
        
        &lt;/a&gt;
      
    &lt;/figure&gt;

  





      &lt;p&gt;GTS is a leading global, electronic market maker that combines market expertise with innovative, proprietary technology. As a quantitative trading firm continually building for the future, GTS leverages the latest in artificial intelligence systems and sophisticated pricing models to bring consistency, efficiency, and transparency to today’s financial markets. GTS accounts for 3-5% of daily cash equities volume in the U.S. and trades over 30,000 different instruments globally, including listed and OTC equities, ETFs, futures, commodities, options, fixed income, foreign exchange, and interest rate products. GTS is the largest Designated Market Maker (DMM) at the New York Stock Exchange, responsible for nearly $12 trillion of market capitalization.&lt;/p&gt;
    &lt;/div&gt;
  &lt;/div&gt;
&lt;/div&gt;

&lt;/div&gt;
&lt;div class="block-paragraph"&gt;&lt;h2&gt;Detecting flashing exceptions&lt;/h2&gt;&lt;p&gt;GTS  modeled its flashing detection analytics solution on Google Cloud after its post-trade surveillance system, a large-scale simulation framework that marries the firm’s bidirectional trading order data with the high resolution market-data feeds disseminated by the exchanges into a uniform stream. The stream is analyzed by numerous surveillance reports to perform a fully automated regulatory compliance review.&lt;br/&gt;&lt;/p&gt;&lt;h3&gt;Datasets&lt;/h3&gt;&lt;ol&gt;&lt;li&gt;&lt;p&gt;Market Data&lt;/p&gt;&lt;/li&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;Public high resolution tick data disseminated by the exchanges&lt;/p&gt;&lt;/li&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;A unidirectional data stream of quotes, trades, symbol trading status, etc.&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;&lt;li&gt;&lt;p&gt;These per-exchange feeds are collected, normalized and merged to a per-symbol uniform stream&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;For the purposes of this surveillance, the market-wide best bid and ask price (NBBO - National Best Bid / Offer) at any given time are used&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;&lt;li&gt;&lt;p&gt;Order Data&lt;/p&gt;&lt;/li&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;Proprietary order activity of the market participant under review&lt;/p&gt;&lt;/li&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;A bidirectional data stream initiated by the market participant&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;&lt;li&gt;&lt;p&gt;A simplified life cycle of a single order is illustrated below:&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/ol&gt;&lt;/div&gt;
&lt;div class="block-image_full_width"&gt;






  
    &lt;div class="article-module h-c-page"&gt;
      &lt;div class="h-c-grid"&gt;
  

    &lt;figure class="article-image--large
      
      
        h-c-grid__col
        h-c-grid__col--6 h-c-grid__col--offset-3
        
        
      "
      &gt;

      
      
        
        &lt;img
            src="https://storage.googleapis.com/gweb-cloudblog-publish/images/1_Detect_spoofing_exceptions.max-1000x1000.jpg"
        
          alt="1 Detect spoofing exceptions.jpg"&gt;
        
        &lt;/a&gt;
      
    &lt;/figure&gt;

  
      &lt;/div&gt;
    &lt;/div&gt;
  




&lt;/div&gt;
&lt;div class="block-paragraph"&gt;&lt;h3&gt;Flashing detection&lt;/h3&gt;&lt;p&gt;This surveillance is designed to capture the manipulative practice of placing orders with no trading intention. Rather, these orders are placed on the market to induce a favorable movement.&lt;/p&gt;&lt;p&gt;A flashing activity is composed of a “flash” and “take” events:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ol&gt;&lt;li&gt;&lt;p&gt;Flash&lt;/p&gt;&lt;/li&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;Entry of short-lived orders on one side of the market&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;These orders are not meant to be executed (filled) just to show an artificial interest on the market, as such they are canceled a short period after being entered&lt;/p&gt;&lt;/li&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;Note that the flashed order lifespan is a parameter of the surveillance that should be configured to fit the trading profile of the firm under review&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;For demonstration purposes we used 500ms (though in practice this can happen over a much smaller timespan)&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/ul&gt;&lt;li&gt;&lt;p&gt;Market-movement&lt;/p&gt;&lt;/li&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;Other market participants react to the flashed order/s, moving the price towards the indicated direction, i.e., causing the NBBO to “improve”&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;&lt;li&gt;&lt;p&gt;Take&lt;/p&gt;&lt;/li&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;Placement of an order/s on the other side of the market that gets executed against other market participants that joined the market at the improved price&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;Note that the take order can be “staged” on the market prior to the initiation of the flashing order or entered after it&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;Furthermore, the take event should be in proximity to the Flash event&lt;/p&gt;&lt;/li&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;For demonstration purposes we configured this parameter to 10 seconds&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/ul&gt;&lt;/ol&gt;&lt;p&gt;As indicated above, flashing detection requires marrying the order activity of the market participant under review with the public market data, essentially synchronizing two large and discrete nanosecond resolution datasets. In addition to the technical challenge of joining these datasets, we recognize that a trading platform might introduce a small latency when processing large market-data volumes. Further, there might be slight clock differences between the trading-platform and surveillance system’s view of the market-data. To compensate for this difference, the surveillance system employs a windowing mechanism when reviewing the NBBO (National Best Bid and offer) near the take event. The NBBO window length is a configurable parameter of the surveillance and should be set based on the specifics of the trading firm under review. For demonstration purposes we used a 1000ms window. Note that as is the case for discrete data, there might not be any NBBO update within the window. In such cases we carry forward the last NBBO update prior to the window.&lt;/p&gt;&lt;p&gt;Finally, any sequence of events that fit the scenario outlined above are flagged as potential exceptions to be reviewed by the compliance officer of the trading firm.&lt;/p&gt;&lt;h2&gt;Modernizing this solution using SQL Analytics on Google Cloud&lt;/h2&gt;&lt;p&gt;To implement the above points, the collaboration applies data analytics best practices to a financial services problem. This solution can enable efficient, flexible data processing — but also supports the organizational processes that enable reliable reporting and minimize fire drills.&lt;/p&gt;&lt;p&gt;At the highest level, the steps are executed in containers, which models the macros steps — e.g., load data / execute transform / run data quality. &lt;a href="https://cloud.google.com/composer"&gt;Cloud Composer&lt;/a&gt; (Apache Airflow) is the tool that helps orchestrate containers to run BigQuery SQL jobs. As discussed in the next section in detail, these queries are defined using &lt;a href="https://www.getdbt.com/blog/what-exactly-is-dbt/" target="_blank"&gt;DBT&lt;/a&gt; models instead of raw SQL.&lt;/p&gt;&lt;p&gt;DBT is the conversion tool that codifies the regulatory reporting transformations. It runs the SQL logic which implements the surveillance rules required by the regulator as per the rulebook. With DBT, models are parameterised into reusable components and coupled with BigQuery to execute the SQL models. It fits nicely into the stack and helps in creating a CI/CD pipeline that feeds normalized data to BigQuery.&lt;/p&gt;&lt;p&gt;&lt;a href="https://cloud.google.com/bigquery"&gt;BigQuery&lt;/a&gt; is a critical solution component because it can be cost-efficient, offer minimal operational overhead, and solve this high-granularity problem. By cheaply storing, rapidly querying and joining huge, granular datasets, BigQuery helps provide firms with a consistent source of high-quality data. This single source serves multiple report types. &lt;/p&gt;&lt;p&gt;The entire infrastructure in Google Cloud is deployed using &lt;a href="https://www.terraform.io/" target="_blank"&gt;Terraform&lt;/a&gt;, which is an open-source ‘&lt;b&gt;Infrastructure as a code&lt;/b&gt;’ tool. It helps in storing configuration in declarative forms, Kubernetes yaml, etc; which helps promote portability, repeatability, and enable the platform to scale.&lt;/p&gt;&lt;h3&gt;Solution overview&lt;/h3&gt;&lt;/div&gt;
&lt;div class="block-image_full_width"&gt;






  
    &lt;div class="article-module h-c-page"&gt;
      &lt;div class="h-c-grid"&gt;
  

    &lt;figure class="article-image--large
      
      
        h-c-grid__col
        h-c-grid__col--6 h-c-grid__col--offset-3
        
        
      "
      &gt;

      
      
        
        &lt;img
            src="https://storage.googleapis.com/gweb-cloudblog-publish/images/2_Detect_spoofing_exceptions.max-1000x1000.jpg"
        
          alt="2 Detect spoofing exceptions.jpg"&gt;
        
        &lt;/a&gt;
      
    &lt;/figure&gt;

  
      &lt;/div&gt;
    &lt;/div&gt;
  




&lt;/div&gt;
&lt;div class="block-paragraph"&gt;&lt;p&gt;First, the pipeline must process sparse data from the two feeds, that is the public &lt;b&gt;NBBO market data&lt;/b&gt; feed disseminated by the exchanges and &lt;b&gt;proprietary order activity&lt;/b&gt; of the market participant under review. The source data is ingested to &lt;b&gt;BigQuery&lt;/b&gt;, which supports running regulatory reporting workloads that exhibit &lt;b&gt;frequent spikes in demand&lt;/b&gt;. This serverless infrastructure helps in processing complex queries within seconds and to address the scaling problem of legacy implementations.&lt;/p&gt;&lt;p&gt;Second, the pipeline must evaluate the order lifecycle, whether an order was entered and canceled within a short timeframe and whether this induced a market movement, which was later capitalized on. These conditions are compiled as reporting rules and expressed using &lt;b&gt;ANSI SQL&lt;/b&gt;. As discussed above, we have leveraged an open source framework (DBT) to create reporting rules as code (i.e., modules) that can be released to regulated institutions. These reporting rules are in the form of &lt;b&gt;DBT models&lt;/b&gt; that bundle together documentation (e.g., fields definitions) and technical schema. This framework also can remove the need for explicit maintenance by automatically building SQL DAGs of the models.&lt;/p&gt;&lt;p&gt;Third, the pipeline must execute these reporting rules for the order events and check for fluctuations in the market. A huge number of simple SQL queries may need to be spawned for generating the final reports. Hence, an orchestration capability can coordinate this processing, which takes place in a number of services. This is supported by running Cloud Composer workflows on Kubernetes. The output of the processing is saved back to BigQuery. &lt;/p&gt;&lt;p&gt;The end result is the report generation, which is supported by the analytics and reporting layer, that allows users to explore the data and work with it. This data can be accessed by Business Intelligence tools such as Looker or Google Sheets. If required, data can also be &lt;b&gt;egressed&lt;/b&gt; on prem for analysis.&lt;/p&gt;&lt;h2&gt;Give it a try&lt;/h2&gt;&lt;p&gt;This approach is available to help you meet your organization’s reporting needs. Please review our &lt;a href="https://github.com/GoogleCloudPlatform/reg-reporting-blueprint/tree/main/use_cases/examples/flashing_detection" target="_blank"&gt;user-guide&lt;/a&gt;, whose Tutorials section provides a step-by-step guide to constructing a simple data processing pipeline that can maintain quality of data, auditability, and ease of change and deployment, and also supports the requirements of regulatory reporting.&lt;/p&gt;&lt;/div&gt;
&lt;div class="block-related_article_tout"&gt;





&lt;div class="uni-related-article-tout h-c-page"&gt;
  &lt;section class="h-c-grid"&gt;
    &lt;a href="https://cloud.google.com/blog/topics/financial-services/building-real-time-streaming-pipelines-for-market-data/"
       data-analytics='{
                       "event": "page interaction",
                       "category": "article lead",
                       "action": "related article - inline",
                       "label": "article: {slug}"
                     }'
       class="uni-related-article-tout__wrapper h-c-grid__col h-c-grid__col--8 h-c-grid__col-m--6 h-c-grid__col-l--6
        h-c-grid__col--offset-2 h-c-grid__col-m--offset-3 h-c-grid__col-l--offset-3 uni-click-tracker"&gt;
      &lt;div class="uni-related-article-tout__inner-wrapper"&gt;
        &lt;p class="uni-related-article-tout__eyebrow h-c-eyebrow"&gt;Related Article&lt;/p&gt;

        &lt;div class="uni-related-article-tout__content-wrapper"&gt;
          &lt;div class="uni-related-article-tout__image-wrapper"&gt;
            &lt;div class="uni-related-article-tout__image" style="background-image: url('')"&gt;&lt;/div&gt;
          &lt;/div&gt;
          &lt;div class="uni-related-article-tout__content"&gt;
            &lt;h4 class="uni-related-article-tout__header h-has-bottom-margin"&gt;Building real-time market data front-ends with websockets and Google Cloud&lt;/h4&gt;
            &lt;p class="uni-related-article-tout__body"&gt;Check out this cloud-first architectural pattern for building real-time streaming data pipelines for financial services and market data.&lt;/p&gt;
            &lt;div class="cta module-cta h-c-copy  uni-related-article-tout__cta muted"&gt;
              &lt;span class="nowrap"&gt;Read Article
                &lt;svg class="icon h-c-icon" role="presentation"&gt;
                  &lt;use xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#mi-arrow-forward"&gt;&lt;/use&gt;
                &lt;/svg&gt;
              &lt;/span&gt;
            &lt;/div&gt;
          &lt;/div&gt;
        &lt;/div&gt;
      &lt;/div&gt;
    &lt;/a&gt;
  &lt;/section&gt;
&lt;/div&gt;

&lt;/div&gt;</description><pubDate>Tue, 29 Nov 2022 17:00:00 +0000</pubDate><guid>https://cloud.google.com/blog/topics/financial-services/detect-spoofing-exceptions-with-google-cloud-and-gts/</guid><category>Business Application Platform</category><category>Compliance</category><category>BigQuery</category><category>Financial Services</category><og xmlns:og="http://ogp.me/ns#"><type>article</type><title>Detect spoofing exceptions in financial markets with Google Cloud and GTS</title><description></description><site_name>Google</site_name><url>https://cloud.google.com/blog/topics/financial-services/detect-spoofing-exceptions-with-google-cloud-and-gts/</url></og><author xmlns:author="http://www.w3.org/2005/Atom"><name>Vishakha Sadhwani</name><title>Customer Engineer, Google Cloud</title><department></department><company></company></author><author xmlns:author="http://www.w3.org/2005/Atom"><name>Victor Zigdon</name><title>Director of Trading Analytics, GTS Securities, LLC</title><department></department><company></company></author></item><item><title>CISO Survival Guide: How financial services organizations can more securely move to the cloud</title><link>https://cloud.google.com/blog/products/identity-security/move-financial-services-organization-to-cloud-more-securely/</link><description>&lt;div class="block-paragraph"&gt;&lt;p&gt;It’s not just children and adults who face excitement and nervousness on the first day of school. The first day in the cloud can be daunting for financial services organizations, too. &lt;/p&gt;&lt;p&gt;Chief Information Security Officers must lead the cloud security component of their organization’s digital transformation, a complicated task beset by many questions that the members of our &lt;a href="http://gcat.google.com/" target="_blank"&gt;Google Cybersecurity Action Team&lt;/a&gt; can help answer. We want to help you move into the brave new world of digital transformation and build engaged, robust cybersecurity teams as you go because there is no “one size fits all” approach to cloud security. &lt;/p&gt;&lt;p&gt;We’ve worked with many financial services organizations in the middle of their transformations. Some want to revolutionize how their organizations achieve their cybersecurity goals. Others want to have minimal viable security controls for Day 1 launches. Each organization has its own operational and technological needs, its own funding sources, and its own risk appetites, all of which can fundamentally influence security strategy.&lt;/p&gt;&lt;p&gt;We’re here to offer our real-world knowledge and experiences from Google’s Office of the Cloud CISO to help you move boldly – and more securely – to the cloud. We do this as part of our commitment to operate in a &lt;a href="https://www.forbes.com/sites/googlecloud/2022/04/19/demystifying-shared-fate-a-new-approach-to-understand-cybersecurity/" target="_blank"&gt;shared fate model&lt;/a&gt; that helps our customers achieve the best possible security outcomes. We strongly believe that secure organizations make for a more secure world.&lt;/p&gt;&lt;h3&gt;First come the questions, so many questions&lt;/h3&gt;&lt;p&gt;Many times, we go into customer organizations as they are on the cusp of moving to the cloud and hear questions such as:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;I’ve never done this before, what do I need to worry about first?&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;How do we make sure we don’t move our technical and cyber debt to the cloud? &lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;What are the key threats that I need to pay attention to?&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;What on-premises baggage am I going to be left with?&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;How do I organize my team to best address the things that we need to focus on?&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;What becomes apparent from these conversations is that technology and security leaders use moving to the cloud as an opportunity to transform their businesses. This is an excellent plan. However, just because technical and cyber debt were not created intentionally does not mean that they can be wished away. It takes a concerted effort to reduce risk by building on solid fundamentals and leveraging the advantages of the cloud to pay down that debt.  &lt;/p&gt;&lt;p&gt;These areas of concern and the strategies for addressing them can be categorized around your organization and its operations, technology, and people – and your CISO leadership.&lt;/p&gt;&lt;h3&gt;Teach your organization to think cloud&lt;/h3&gt;&lt;p&gt;Recently, security teams have been organizing around security compliance models such as the &lt;a href="https://www.nist.gov/cyberframework" target="_blank"&gt;NIST cybersecurity framework&lt;/a&gt;. While this provides a foundation to discuss security disciplines and general security posture, it doesn’t necessarily provide the best way to organize your security team for optimal impact. &lt;/p&gt;&lt;p&gt;In addition, most of these frameworks were developed before cloud was widely adopted in regulated industries. We now have more specialized knowledge and tools to more effectively serve specialized cases and verticals.  &lt;/p&gt;&lt;p&gt;As use of the cloud becomes more prevalent, frameworks need to evolve and adapt to new threats and a new operating environment with rapid business changes and agile IT . Fundamentally, digital transformation is about organizational change management. A key component of preparing for digital transformation is guiding the people in your organization to evolve beyond on-premises mindsets to adopt new ones. &lt;/p&gt;&lt;p&gt;In our discussion on how &lt;a href="https://cloud.google.com/blog/products/identity-security/why-cisos-need-to-adapt-their-mental-models-of-security-for-cloud"&gt;CISOs need to adapt their mental models for cloud security&lt;/a&gt;, we noted that security during and after a digital transformation should focus on how network and endpoint security, detection and response, data security, and identity and access management (IAM) function in the cloud — and how taking advantage of those differences can help you build a more resilient security posture.  &lt;/p&gt;&lt;h3&gt;The right questions can drive security changes&lt;/h3&gt;&lt;p&gt;One key question to ask yourself when making strategic and tactical decisions is: Why am I implementing this security control?  &lt;/p&gt;&lt;p&gt;Digital transformation provides an excellent opportunity to re-examine your team (because&lt;a href="https://cloud.google.com/blog/products/identity-security/culture-comes-first-in-cloud-transformations"&gt; culture comes first in cloud transformation&lt;/a&gt;) and lead the way to changes that address your organization’s go-forward strategies when it comes to firewalls, antivirus software, applications, data protection, your overall security and risk postures, and your backup plans.  Changing technical controls first rarely leads to success.&lt;/p&gt;&lt;p&gt;Your organization needs to have a clear vision and set objectives to determine how to most effectively achieve its security goals. Most of the time this means that CISOs and their teams have to reach outside their comfort zone and work with technology, business, and other partners to achieve success. If your organization goes down the path of “it’s always been done this way on-premises,” your cloud transformation is more apt to be inefficient and ultimately block the business from achieving agility and security.  &lt;/p&gt;&lt;p&gt;At the September conference &lt;a href="https://internetpolicy.mit.edu/cyberevent2022/" target="_blank"&gt;Measuring Cyber Risk in the Financial Services Sector&lt;/a&gt; hosted by MIT and the Federal Reserve Board, an audience member posed an important question to the panel: Why do cyber insurers ask if I have file integrity monitoring installed?&lt;/p&gt;&lt;p&gt;This kind of question from cyber insurers is indicative of the mindset that should evolve with the digital transformation process. We want to be open to new opportunities to rethink practices and architecture. File integrity in a vacuum means very little to the overall risk reduction of your organization. Depending on their objective, cyber insurers could have asked a different set of questions, such as: How do you ensure that critical payment data is not altered in the transaction flow? And how do you ensure that software running in production is authorized and not altered?  &lt;/p&gt;&lt;p&gt;Both questions could be answered with file integrity monitoring. However, answering a question on a cyber insurer’s questionnaire provides little to no value. It’s a check-the-box exercise that doesn’t provide a measurable security benefit. Cloud provides the same opportunities to rethink standard controls and generate better security and business outcomes.  &lt;/p&gt;&lt;p&gt;As you begin implementing security in the cloud, keep in mind what your organization’s ideal security posture should be and come to an agreement with stakeholders (including business and IT leaders) about how you can set and achieve your goals. The first steps offer an invaluable “pressure test” for your organization – and take comfort in the fact that very few CISOs get it right on the first try. That’s why you should be adaptable, be open to change, and work to minimize organizational strife as much as possible.  &lt;/p&gt;&lt;p&gt;We will continue this discussion in the next blog focused on the realities of starting the operational transformation.&lt;/p&gt;&lt;p&gt;To learn more now, check out our podcast on &lt;a href="https://cloud.withgoogle.com/cloudsecurity/podcast/ep80-ciso-walks-into-the-cloud-frustrations-successes-lessons-and-does-the-risk-change/" target="_blank"&gt;CISO frustrations, successes, and lessons learned&lt;/a&gt;, and our guidance report on &lt;a href="https://services.google.com/fh/files/misc/ciso-guide-to-security-transformation.pdf" target="_blank"&gt;cloud security transformations&lt;/a&gt; as well as our white paper on &lt;a href="https://services.google.com/fh/files/misc/google_cloud_operational_resilience_fin_serv.pdf" target="_blank"&gt;building operational resilience in financial services&lt;/a&gt;. Review&lt;a href="http://gcat.google.com" target="_blank"&gt; Google Cybersecurity Action Team&lt;/a&gt; site for additional papers and other guidance. &lt;br/&gt;&lt;/p&gt;&lt;/div&gt;
&lt;div class="block-related_article_tout"&gt;





&lt;div class="uni-related-article-tout h-c-page"&gt;
  &lt;section class="h-c-grid"&gt;
    &lt;a href="https://cloud.google.com/blog/products/identity-security/why-cisos-need-to-adapt-their-mental-models-of-security-for-cloud/"
       data-analytics='{
                       "event": "page interaction",
                       "category": "article lead",
                       "action": "related article - inline",
                       "label": "article: {slug}"
                     }'
       class="uni-related-article-tout__wrapper h-c-grid__col h-c-grid__col--8 h-c-grid__col-m--6 h-c-grid__col-l--6
        h-c-grid__col--offset-2 h-c-grid__col-m--offset-3 h-c-grid__col-l--offset-3 uni-click-tracker"&gt;
      &lt;div class="uni-related-article-tout__inner-wrapper"&gt;
        &lt;p class="uni-related-article-tout__eyebrow h-c-eyebrow"&gt;Related Article&lt;/p&gt;

        &lt;div class="uni-related-article-tout__content-wrapper"&gt;
          &lt;div class="uni-related-article-tout__image-wrapper"&gt;
            &lt;div class="uni-related-article-tout__image" style="background-image: url('')"&gt;&lt;/div&gt;
          &lt;/div&gt;
          &lt;div class="uni-related-article-tout__content"&gt;
            &lt;h4 class="uni-related-article-tout__header h-has-bottom-margin"&gt;How CISOs need to adapt their mental models for cloud security&lt;/h4&gt;
            &lt;p class="uni-related-article-tout__body"&gt;CISOs: How well do you speak cloud? Here are 6 tips for adapting your mental models of security.&lt;/p&gt;
            &lt;div class="cta module-cta h-c-copy  uni-related-article-tout__cta muted"&gt;
              &lt;span class="nowrap"&gt;Read Article
                &lt;svg class="icon h-c-icon" role="presentation"&gt;
                  &lt;use xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#mi-arrow-forward"&gt;&lt;/use&gt;
                &lt;/svg&gt;
              &lt;/span&gt;
            &lt;/div&gt;
          &lt;/div&gt;
        &lt;/div&gt;
      &lt;/div&gt;
    &lt;/a&gt;
  &lt;/section&gt;
&lt;/div&gt;

&lt;/div&gt;</description><pubDate>Mon, 14 Nov 2022 17:00:00 +0000</pubDate><guid>https://cloud.google.com/blog/products/identity-security/move-financial-services-organization-to-cloud-more-securely/</guid><category>Financial Services</category><category>Compliance</category><category>Google Cloud</category><category>Security &amp; Identity</category><media:content height="540" url="https://storage.googleapis.com/gweb-cloudblog-publish/images/cybersecurity_action_team_jl2RU0c.max-600x600.jpg" width="540"></media:content><og xmlns:og="http://ogp.me/ns#"><type>article</type><title>CISO Survival Guide: How financial services organizations can more securely move to the cloud</title><description></description><image>https://storage.googleapis.com/gweb-cloudblog-publish/images/cybersecurity_action_team_jl2RU0c.max-600x600.jpg</image><site_name>Google</site_name><url>https://cloud.google.com/blog/products/identity-security/move-financial-services-organization-to-cloud-more-securely/</url></og><author xmlns:author="http://www.w3.org/2005/Atom"><name>David Stone</name><title>Director, Financial Services, Office of the CISO</title><department></department><company></company></author><author xmlns:author="http://www.w3.org/2005/Atom"><name>Anton Chuvakin</name><title>Security Advisor, Office of the CISO</title><department></department><company></company></author></item><item><title>View policy enforcement metrics for ACM Policy Controller</title><link>https://cloud.google.com/blog/topics/anthos/view-policy-enforcement-metrics-for-acm-policy-controller/</link><description>&lt;div class="block-paragraph"&gt;&lt;p&gt;&lt;a href="https://cloud.google.com/anthos-config-management/docs/concepts/policy-controller"&gt;Policy Controller&lt;/a&gt; enables the enforcement of fully programmable policies for your clusters. These policies act as "guardrails" and prevent any changes from violating security, operational, or compliance controls at admission time, and post admission, using continuous audit.&lt;/p&gt;&lt;p&gt;Through ongoing conversations with platform and security administrators, we have received feedback about increasing visibility into how the policies are applied i.e. enforced or audited across Anthos or GKE clusters.&lt;/p&gt;&lt;p&gt;With the Anthos Config Management (ACM) 1.12.0 onwards, we have made it easier to export and visualize Policy Controller metrics.&lt;/p&gt;&lt;h3&gt;Policy Controller Metrics&lt;/h3&gt;&lt;p&gt;Policy controller includes the metrics related to policy usage such as number of constraints, constraint templates, audit violations detected just to name a few (see &lt;a href="https://cloud.google.com/anthos-config-management/docs/how-to/monitoring-policy-controller#available_metrics"&gt;list of metrics exposed&lt;/a&gt;).&lt;/p&gt;&lt;h3&gt;Exporting the metrics&lt;/h3&gt;&lt;p&gt;Policy Controller uses &lt;a href="https://opentelemetry.io/" target="_blank"&gt;OpenCensus&lt;/a&gt; to create and record metrics related to its processes and policy usage. Policy Controller can be easily configured to export these metrics to &lt;a href="https://prometheus.io/" target="_blank"&gt;Prometheus&lt;/a&gt; and/or &lt;a href="https://cloud.google.com/monitoring/docs"&gt;Cloud Monitoring&lt;/a&gt; at the install time. Default setting for exporting metrics for Policy controller will export the metrics to both Prometheus and Cloud monitoring. &lt;/p&gt;&lt;h3&gt;Viewing the metrics&lt;/h3&gt;&lt;p&gt;These metrics are exported to the customer's Cloud Monitoring project in Prometheus format. As a result, customers can view these metrics in the Cloud Monitoring UI or query them via the Cloud Monitoring API using either &lt;a href="https://cloud.google.com/stackdriver/docs/managed-prometheus/promql?hl=en"&gt;PromQL&lt;/a&gt; (the de-facto query language for Kubernetes metrics) or MQL (Google's proprietary metrics query language). &lt;/p&gt;&lt;p&gt;There is also a newly added cloud monitoring dashboard to view your metrics. This dashboard can be further edited to meet your business or operational needs.  &lt;/p&gt;&lt;p&gt;This dashboard can be imported from within Cloud Console.&lt;/p&gt;&lt;ol&gt;&lt;li&gt;&lt;p&gt;Login to &lt;a href="http://console.cloud.google.com"&gt;Cloud Console&lt;/a&gt; and click on the hamburger (collapsed) menu and click on More Products to expand the list of products in the menu.&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;Select Monitoring &amp;gt; Dashboards and then click the Sample Library tab on the page.This will show all the samples available by category.&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;Select Anthos Config Management from the list.&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;Check Policy Controller from the list and click Import.&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;Confirm that you want to import the dashboard.&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;This will create a new dashboard.&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;You can view by clicking on the Dashboards menu item and then selecting the newly created Policy Controller dashboard from the list.&lt;/p&gt;&lt;/li&gt;&lt;/ol&gt;&lt;/div&gt;
&lt;div class="block-image_full_width"&gt;






  
    &lt;div class="article-module h-c-page"&gt;
      &lt;div class="h-c-grid"&gt;
  

    &lt;figure class="article-image--large
      
      
        h-c-grid__col
        h-c-grid__col--6 h-c-grid__col--offset-3
        
        
      "
      &gt;

      
      
        
        &lt;img
            src="https://storage.googleapis.com/gweb-cloudblog-publish/original_images/01-_Dashboard_Install.gif"
        
          alt="01- Dashboard Install.gif"&gt;
        
        &lt;/a&gt;
      
    &lt;/figure&gt;

  
      &lt;/div&gt;
    &lt;/div&gt;
  




&lt;/div&gt;
&lt;div class="block-image_full_width"&gt;






  
    &lt;div class="article-module h-c-page"&gt;
      &lt;div class="h-c-grid"&gt;
  

    &lt;figure class="article-image--large
      
      
        h-c-grid__col
        h-c-grid__col--6 h-c-grid__col--offset-3
        
        
      "
      &gt;

      
      
        
        &lt;img
            src="https://storage.googleapis.com/gweb-cloudblog-publish/images/ACM_Policy_Controller.max-1000x1000.jpg"
        
          alt="ACM Policy Controller.jpg"&gt;
        
        &lt;/a&gt;
      
    &lt;/figure&gt;

  
      &lt;/div&gt;
    &lt;/div&gt;
  




&lt;/div&gt;
&lt;div class="block-paragraph"&gt;&lt;h3&gt;Pricing&lt;/h3&gt;&lt;p&gt;These metrics are available at &lt;b&gt;no additional cost&lt;/b&gt; to our customers. &lt;/p&gt;&lt;h3&gt;Alerting on the metrics&lt;/h3&gt;&lt;p&gt;You can &lt;a href="https://cloud.google.com/monitoring/alerts/using-alerting-ui"&gt;create alerting policies in Cloud Alerting &lt;/a&gt;so you are notified in case something needs your attention. &lt;/p&gt;&lt;h3&gt;Third Party integration &lt;/h3&gt;&lt;p&gt;Any third party observability tool can ingest these metrics using Cloud Monitoring API. If you are using Grafana dashboards all you have to do is point it to the Cloud Monitoring API for it to work. &lt;/p&gt;&lt;h3&gt;Next steps&lt;/h3&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;&lt;a href="https://cloud.google.com/anthos-config-management/docs/how-to/installing-policy-controller"&gt;Install Policy Controller&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;a href="https://cloud.google.com/anthos-config-management/docs/how-to/using-cis-k8s-benchmark"&gt;Implement CIS benchmark using Policy Controller&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;Explore &lt;a href="https://cloud.google.com/anthos-config-management/docs/latest/reference/constraint-template-library"&gt;Policy controller constraint template library&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;a href="https://cloud.google.com/anthos-config-management/docs/how-to/monitoring-config-sync"&gt;Config Sync metrics&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;</description><pubDate>Fri, 23 Sep 2022 16:00:00 +0000</pubDate><guid>https://cloud.google.com/blog/topics/anthos/view-policy-enforcement-metrics-for-acm-policy-controller/</guid><category>Containers &amp; Kubernetes</category><category>Application Modernization</category><category>Compliance</category><category>Google Cloud</category><category>Anthos</category><og xmlns:og="http://ogp.me/ns#"><type>article</type><title>View policy enforcement metrics for ACM Policy Controller</title><description></description><site_name>Google</site_name><url>https://cloud.google.com/blog/topics/anthos/view-policy-enforcement-metrics-for-acm-policy-controller/</url></og><author xmlns:author="http://www.w3.org/2005/Atom"><name>Poonam Lamba</name><title>Senior Product Manager</title><department></department><company></company></author><author xmlns:author="http://www.w3.org/2005/Atom"><name>Shahid Masud</name><title>Cloud Solution Architect, Google Cloud</title><department></department><company></company></author></item><item><title>Introducing fine-grained access control for Cloud Spanner: A new way to protect your data in Spanner</title><link>https://cloud.google.com/blog/products/spanner/cloud-spanner-role-based-access-control/</link><description>&lt;div class="block-paragraph"&gt;&lt;p&gt;As Google Cloud’s fully managed relational database that offers unlimited scale, strong consistency, and availability up to 99.999%, &lt;a href="https://cloud.google.com/spanner"&gt;Cloud Spanner&lt;/a&gt; powers applications of all sizes in industries such financial services, gaming, retail, and healthcare. Today, we’re excited to announce the preview of fine-grained access control for Spanner that lets you authorize access to Spanner data at the table and column level. With fine-grained access control, it’s now easier than ever to protect your transactional data in Spanner and ensure appropriate controls are in place when granting access to data. &lt;/p&gt;&lt;p&gt;In this post, we’ll take a look at Spanner’s current access control model, examine the use cases of fine-grained access control, and look at how to use this new capability in your Spanner applications.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Spanner’s access control model today&lt;/b&gt;&lt;b&gt;&lt;br/&gt;&lt;/b&gt;Spanner provides &lt;a href="https://cloud.google.com/spanner/docs/iam"&gt;access control with Identity and Access Management&lt;/a&gt; (IAM). &lt;a href="https://cloud.google.com/iam"&gt;IAM&lt;/a&gt; provides a simple and consistent access control interface for all Google Cloud services. With capabilities such as a built-in audit trail and context-aware access, IAM makes it easy to grant permissions at the instance and database level to Spanner users.&lt;/p&gt;&lt;p&gt;The model for IAM has three main parts:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;&lt;b&gt;Role&lt;/b&gt;. A role is a collection of permissions. In Spanner, these &lt;a href="https://cloud.google.com/spanner/docs/iam#permissions"&gt;permissions&lt;/a&gt; allow you to perform specific actions on Spanner projects, instances, or databases. For example, &lt;code&gt;spanner.instances.create&lt;/code&gt; lets you create a new instance, and &lt;code&gt;spanner.databases.select&lt;/code&gt; lets you execute a SQL select statement on a database. For convenience, Spanner comes with a set of &lt;a href="https://cloud.google.com/spanner/docs/iam#roles"&gt;predefined roles&lt;/a&gt; such as &lt;code&gt;roles/spanner.databaseUser,&lt;/code&gt; which contains the permissions &lt;code&gt;spanner.databases.read&lt;/code&gt; and &lt;code&gt;spanner.databases.write&lt;/code&gt;, but you can define your own &lt;a href="https://cloud.google.com/spanner/docs/iam#custom-roles"&gt;custom roles&lt;/a&gt;, too. &lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;b&gt;IAM principal&lt;/b&gt;. A principal can be a Google Account (for end users), a service account (for applications and compute workloads), a Google group, or a Google Workspace account that can access a resource. Each principal has its own identifier, which is typically an email address.&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;b&gt;Policy&lt;/b&gt;. The allow policy is the collection of role bindings that bind one or more principals to individual roles. For example, you can bind &lt;code&gt;roles/spanner.databaseReader&lt;/code&gt; to IAM principal &lt;code&gt;user@abc.xyz&lt;/code&gt;.&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;b&gt;The need for more robust access controls&lt;/b&gt;&lt;b&gt;&lt;br/&gt;&lt;/b&gt;There are a number of use cases where you may need to define roles at a level that is more granular than the database-level. Let’s look at a few of these use cases below.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Ledger applications&lt;/b&gt;&lt;b&gt;&lt;br/&gt;&lt;/b&gt;Ledgers, which are useful for inventory management, cryptocurrency, and banking applications, let you look at inventory levels and apply updates such as credits or debits to existing balances. In a ledger application, you can look at balances, add inventory, and remove inventory. You can’t go back and adjust last week’s inventory level to 500 widgets. This corresponds to having &lt;code&gt;SELECT&lt;/code&gt; privileges (to look at balances) and &lt;code&gt;INSERT&lt;/code&gt; privileges (to add or remove inventory), but not &lt;code&gt;UPDATE&lt;/code&gt; or &lt;code&gt;DELETE&lt;/code&gt; privileges. &lt;/p&gt;&lt;p&gt;&lt;b&gt;Analytics users&lt;/b&gt;&lt;b&gt;&lt;br/&gt;&lt;/b&gt;Analytics users often need &lt;code&gt;SELECT&lt;/code&gt; access to a few tables in Spanner database, but should not not have access to all tables in the database. Nor should they have &lt;code&gt;INSERT&lt;/code&gt;, &lt;code&gt;UPDATE&lt;/code&gt;, or &lt;code&gt;DELETE&lt;/code&gt; access to anything in the database. This corresponds to having &lt;code&gt;SELECT&lt;/code&gt; privileges on a set of tables – but not all tables – in the database.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Service accounts&lt;/b&gt;&lt;b&gt;&lt;br/&gt;&lt;/b&gt;A service account is a special type of Google account intended to represent a non-human user that needs to authenticate and be authorized to access data from Google Cloud. Each Spanner service account likely needs to have its own set of privileges on specific tables in the database. For example, consider a ride-sharing application that has service accounts for drivers and passengers. Likely the driver service account needs &lt;code&gt;SELECT&lt;/code&gt; privileges on specific columns of the passenger’s profile table (e.g., user’s first name, profile picture, etc.), but should not be allowed to update the passenger’s email address or other personal information.&lt;/p&gt;&lt;p&gt;&lt;b&gt;The basics of fine-grained access control in Spanner&lt;/b&gt;&lt;b&gt;&lt;br/&gt;&lt;/b&gt;If you’re familiar with role-based access control in other relational databases, you already are familiar with the important concepts of fine-grained access control in Spanner. Let’s review the model for fine-grained access control in Spanner:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;&lt;b&gt;Database Privilege&lt;/b&gt;. Spanner now supports four types of privileges: &lt;code&gt;SELECT&lt;/code&gt;, &lt;code&gt;INSERT&lt;/code&gt;, &lt;code&gt;UPDATE&lt;/code&gt;, and &lt;code&gt;DELETE&lt;/code&gt;. &lt;code&gt;SELECT&lt;/code&gt;, &lt;code&gt;INSERT&lt;/code&gt;, &lt;code&gt;UPDATE&lt;/code&gt; and &lt;code&gt;DELETE&lt;/code&gt; privileges can be assigned to tables, and &lt;code&gt;SELECT&lt;/code&gt;, &lt;code&gt;INSERT&lt;/code&gt;, and &lt;code&gt;UPDATE&lt;/code&gt; can be applied to tables or columns.&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;b&gt;Database Role&lt;/b&gt;. Database roles are collections of privileges. For example, you can have a role called &lt;code&gt;inventory_admin&lt;/code&gt; that has &lt;code&gt;SELECT&lt;/code&gt; and &lt;code&gt;INSERT&lt;/code&gt; privileges on the &lt;code&gt;Inventory_Transactions&lt;/code&gt; table and &lt;code&gt;SELECT&lt;/code&gt;, &lt;code&gt;INSERT&lt;/code&gt;, &lt;code&gt;UPDATE&lt;/code&gt;, and &lt;code&gt;DELETE&lt;/code&gt; privileges on the Products table.&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Because Spanner relies on IAM for identity and access management, you need to assign database roles to the appropriate IAM principals by &lt;a href="https://cloud.google.com/iam/docs/managing-conditional-role-bindings"&gt;managing conditional role bindings&lt;/a&gt;. &lt;/p&gt;&lt;p&gt;Let’s look at an example. Suppose we want to set up IAM principal &lt;code&gt;user@abc.xyz&lt;/code&gt; with fine-grained access to two tables: &lt;code&gt;Inventory_Transactions&lt;/code&gt; and &lt;code&gt;Products&lt;/code&gt;. To do this, we’ll create a database role called &lt;code&gt;inventory_admin&lt;/code&gt; and grant this role to &lt;code&gt;user@abc.xyz&lt;/code&gt;.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Step 1: Set up the IAM principal as a Cloud Spanner fine-grained access user&lt;/b&gt;&lt;b&gt;&lt;br/&gt;&lt;/b&gt;Until today, if you wanted to grant database-level access to an IAM principal, you’d grant them either the roles/spanner.databaseUser role, or some privileges that are bundled in that role. Now, with fine-grained access control, you can instead grant IAM principals the &lt;b&gt;Cloud Spanner Fine-grained Access User&lt;/b&gt; role (&lt;code&gt;roles/spanner.fineGrainedAccessUser&lt;/code&gt;).&lt;/p&gt;&lt;/div&gt;
&lt;div class="block-image_full_width"&gt;






  
    &lt;div class="article-module h-c-page"&gt;
      &lt;div class="h-c-grid"&gt;
  

    &lt;figure class="article-image--medium
      
      
        h-c-grid__col
        
        h-c-grid__col--4 h-c-grid__col--offset-4
        
      "
      &gt;

      
      
        &lt;a href="https://storage.googleapis.com/gweb-cloudblog-publish/images/filter_spanner_db.max-2800x2800.jpg" rel="external" target="_blank"&gt;
      
        
        &lt;img
            src="https://storage.googleapis.com/gweb-cloudblog-publish/images/filter_spanner_db.max-1000x1000.jpg"
        
          alt="filter spanner db.jpg"&gt;
        
        &lt;/a&gt;
      
    &lt;/figure&gt;

  
      &lt;/div&gt;
    &lt;/div&gt;
  




&lt;/div&gt;
&lt;div class="block-paragraph"&gt;&lt;p&gt;Cloud Spanner Fine-grained Access User allows the user to make API calls to the database, but does not confer any data access privileges other than those conferred to the &lt;code&gt;public&lt;/code&gt; role. By default, the &lt;code&gt;public&lt;/code&gt; role does not have any privileges, and this role only grants access to make API calls to the database. To access data, a fine grained access user must specify the database role that they want to act as.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Step 2: Create the database role&lt;/b&gt;&lt;b&gt;&lt;br/&gt;&lt;/b&gt;To create a role, run the standard SQL CREATE ROLE command:&lt;br/&gt;&lt;code&gt;CREATE ROLE inventory_admin&lt;/code&gt;;&lt;/p&gt;&lt;p&gt;The newly created database role can be referenced in IAM policies via the resource URI: &lt;code&gt;projects/&amp;lt;project_name&amp;gt;/instances/&amp;lt;instance_name&amp;gt;/databases/&amp;lt;database_name&amp;gt;/databaseRoles/inventory_admin&lt;/code&gt;. Later on, we’ll show how to configure an IAM policy that allows a specific IAM principal permission to act as this database role.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Step 3: Assign privileges to the database role&lt;/b&gt;&lt;b&gt;&lt;br/&gt;&lt;/b&gt;Next, assign the appropriate privileges to this role:&lt;/p&gt;&lt;/div&gt;
&lt;div class="block-code"&gt;&lt;dl&gt;
    &lt;dt&gt;code_block&lt;/dt&gt;
    &lt;dd&gt;&amp;lt;ListValue: [StructValue([(&amp;#x27;code&amp;#x27;, &amp;#x27;GRANT SELECT, INSERT\r\nON TABLE Inventory_Transactions\r\nTO ROLE inventory_admin;\r\n\r\nGRANT SELECT, INSERT, UPDATE, DELETE\r\nON TABLE Products\r\nTO ROLE inventory_admin;&amp;#x27;), (&amp;#x27;language&amp;#x27;, &amp;#x27;&amp;#x27;), (&amp;#x27;caption&amp;#x27;, &amp;lt;wagtail.rich_text.RichText object at 0x7f3aa85a2e80&amp;gt;)])]&amp;gt;&lt;/dd&gt;
&lt;/dl&gt;&lt;/div&gt;
&lt;div class="block-paragraph"&gt;&lt;p&gt;While you can run these statement individually, we recommend that you issue Cloud Spanner DDL statements in a &lt;a href="https://cloud.google.com/spanner/docs/schema-updates#frequency"&gt;single batch&lt;/a&gt;: &lt;/p&gt;&lt;/div&gt;
&lt;div class="block-image_full_width"&gt;






  
    &lt;div class="article-module h-c-page"&gt;
      &lt;div class="h-c-grid"&gt;
  

    &lt;figure class="article-image--medium
      
      
        h-c-grid__col
        
        h-c-grid__col--4 h-c-grid__col--offset-4
        
      "
      &gt;

      
      
        &lt;a href="https://storage.googleapis.com/gweb-cloudblog-publish/images/Cloud_Spanner_DDL_statements.max-2800x2800.jpg" rel="external" target="_blank"&gt;
      
        
        &lt;img
            src="https://storage.googleapis.com/gweb-cloudblog-publish/images/Cloud_Spanner_DDL_statements.max-1000x1000.jpg"
        
          alt="Cloud Spanner DDL statements.jpg"&gt;
        
        &lt;/a&gt;
      
    &lt;/figure&gt;

  
      &lt;/div&gt;
    &lt;/div&gt;
  




&lt;/div&gt;
&lt;div class="block-paragraph"&gt;&lt;p&gt;&lt;b&gt;Step 4: Assign the role to an IAM principal&lt;/b&gt;&lt;b&gt;&lt;br/&gt;&lt;/b&gt;Finally, to allow &lt;code&gt;user@abc.xyz&lt;/code&gt; to act as the database role &lt;code&gt;inventory_admin&lt;/code&gt;, grant Cloud Spanner Database Role User to &lt;code&gt;user@abc.xyz&lt;/code&gt; with the database role as a condition. To do this, open the database’s IAM Info Panel and add the following conditions using the &lt;a href="https://cloud.google.com/iam/docs/conditions-overview"&gt;IAM condition editor&lt;/a&gt;:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;&lt;code&gt;resource.type == “spanner.googleapis.com/DatabaseRole” &amp;amp;&amp;amp;&lt;/code&gt;&lt;br/&gt;&lt;code&gt;resource.name.endsWith(“/inventory_admin”)&lt;/code&gt;&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;You can also add any other &lt;a href="https://cloud.google.com/iam/docs/conditions-overview"&gt;conditions&lt;/a&gt; to further restrict access to this database role, such as scheduling access by time of day, day of week, or with an expiration date.&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;
&lt;div class="block-image_full_width"&gt;






  
    &lt;div class="article-module h-c-page"&gt;
      &lt;div class="h-c-grid"&gt;
  

    &lt;figure class="article-image--large
      
      
        h-c-grid__col
        h-c-grid__col--6 h-c-grid__col--offset-3
        
        
      "
      &gt;

      
      
        &lt;a href="https://storage.googleapis.com/gweb-cloudblog-publish/images/condition_editor.1000065520000369.max-2800x2800.jpg" rel="external" target="_blank"&gt;
      
        
        &lt;img
            src="https://storage.googleapis.com/gweb-cloudblog-publish/images/condition_editor.max-1000x1000.jpg"
        
          alt="condition editor.jpg"&gt;
        
        &lt;/a&gt;
      
    &lt;/figure&gt;

  
      &lt;/div&gt;
    &lt;/div&gt;
  




&lt;/div&gt;
&lt;div class="block-paragraph"&gt;&lt;p&gt;&lt;b&gt;Transitioning to fine-grained access control&lt;/b&gt;&lt;b&gt;&lt;br/&gt;&lt;/b&gt;When you’re transitioning to fine-grained access control, you might want to assign both  &lt;code&gt;roles/spanner.databaseUser and roles/spanner.fineGrainedAccessUser&lt;/code&gt; to an IAM principal. When you’re ready to switch that IAM principal over to fine-grained permissions, simply revoke the databaseUser role from that IAM principal.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Using the role as an end user&lt;/b&gt;&lt;b&gt;&lt;br/&gt;&lt;/b&gt;When an end user logs into Spanner, they can access the database using the role they’ve been granted, through the Google Cloud console or gcloud commands. Go, Java, Node.js and Python &lt;a href="https://cloud.google.com/spanner/docs/reference/libraries"&gt;client libraries&lt;/a&gt; are also supported, with support for more client libraries coming soon.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Learn more&lt;/b&gt;&lt;b&gt;&lt;br/&gt;&lt;/b&gt;With fine-grained access control, you can set up varying degrees of access to your Spanner databases based on the user, their role, or the organization to which they belong. In preview today, fine-grained access control is available to all Spanner customers at no additional charge. &lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;To get started with Spanner, create an &lt;a href="https://cloud.google.com/spanner/"&gt;instance&lt;/a&gt;, try it out with a &lt;a href="https://www.qwiklabs.com/focuses/1774?parent=catalog" target="_blank"&gt;Spanner Qwiklab&lt;/a&gt;, or create a free trial instance&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;To get started with fine-grained access control in Spanner, check out &lt;a href="https://cloud.google.com/spanner/docs/fgac-about"&gt;About fine-grained access control&lt;/a&gt; or access it directly from the &lt;b&gt;Write DDL statements&lt;/b&gt; in the Google Cloud console&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;To get started with Spanner, create an &lt;a href="https://cloud.google.com/spanner/"&gt;instance or try it out for free&lt;/a&gt;, or take a &lt;a href="https://www.qwiklabs.com/focuses/1774?parent=catalog" target="_blank"&gt;Spanner Qwiklab&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;</description><pubDate>Thu, 15 Sep 2022 15:00:00 +0000</pubDate><guid>https://cloud.google.com/blog/products/spanner/cloud-spanner-role-based-access-control/</guid><category>Databases</category><category>Google Cloud</category><category>Compliance</category><category>Spanner</category><og xmlns:og="http://ogp.me/ns#"><type>article</type><title>Introducing fine-grained access control for Cloud Spanner: A new way to protect your data in Spanner</title><description></description><site_name>Google</site_name><url>https://cloud.google.com/blog/products/spanner/cloud-spanner-role-based-access-control/</url></og><author xmlns:author="http://www.w3.org/2005/Atom"><name>Mark Donsky</name><title>Cloud Spanner product manager</title><department></department><company></company></author></item><item><title>Announcing policy guardrails for Terraform on Google Cloud CLI preview</title><link>https://cloud.google.com/blog/products/compliance/google-cloud-cli-terraform-validation-preview/</link><description>&lt;div class="block-paragraph"&gt;&lt;p&gt;&lt;a href="https://cloud.google.com/docs/terraform"&gt;Terraform &lt;/a&gt;is a popular open source Infrastructure as Code (IaC) tool today and is used by organizations of all sizes across the world. Whether you use Terraform locally as a developer or as a platform admin managing complex CI/CD pipelines, Terraform makes it easy to deploy infrastructure on Google Cloud. &lt;/p&gt;&lt;p&gt;Today, we are pleased to announce &lt;a href="https://cloud.google.com/docs/terraform/policy-validation"&gt;gcloud beta terraform vet&lt;/a&gt;, which is a client-side tool, available at no charge which enables &lt;a href="https://cloud.google.com/docs/terraform/policy_validation"&gt;policy validation&lt;/a&gt; for your infrastructure deployments and existing infrastructure pipelines. With this release, you can now write policies on any resource from Terraform’s &lt;a href="https://registry.terraform.io/providers/hashicorp/google/latest/docs" target="_blank"&gt;google&lt;/a&gt; and &lt;a href="https://registry.terraform.io/providers/hashicorp/google-beta/latest/docs" target="_blank"&gt;google-beta&lt;/a&gt; providers. If you're already using Terraform Validator on GitHub today, follow the &lt;a href="https://cloud.google.com/docs/terraform/policy-validation/migrate-from-terraform-validator"&gt;migration instructions&lt;/a&gt; to leverage this new capability. &lt;/p&gt;&lt;h3&gt;The challenge&lt;/h3&gt;&lt;p&gt;Infrastructure automation with Terraform increases agility and reduces errors by automating the deployment of infrastructure and services that are used together to deliver applications.&lt;/p&gt;&lt;p&gt;Businesses implement continuous delivery to develop applications faster and to respond to changes quickly. Changes to infrastructure are common and in many cases occur often. It can become difficult to monitor every change to your infrastructure, especially across multiple business units to help process requests quickly and efficiently in an automated fashion. As you scale Terraform within your organization, there is an increased risk for misconfigurations and human error. Human authored configuration changes can extend infrastructure vulnerability periods which expose organizations to compliance or budgetary risks. Policy guardrails are necessary to allow organizations to move fast at scale, securely, and in a cost effective manner - and the earlier in the development process, the better to avoid problems with audits down the road. &lt;/p&gt;&lt;h3&gt;The solution&lt;/h3&gt;&lt;p&gt;&lt;a href="https://cloud.google.com/docs/terraform/policy_validation"&gt;gcloud beta terraform vet&lt;/a&gt; provides guardrails and governance for your Terraform configurations to help reduce misconfigurations of Google Cloud resources that violate any of your organization's policies.&lt;/p&gt;&lt;/div&gt;
&lt;div class="block-image_full_width"&gt;






  
    &lt;div class="article-module h-c-page"&gt;
      &lt;div class="h-c-grid"&gt;
  

    &lt;figure class="article-image--large
      
      
        h-c-grid__col
        h-c-grid__col--6 h-c-grid__col--offset-3
        
        
      "
      &gt;

      
      
        &lt;a href="https://storage.googleapis.com/gweb-cloudblog-publish/images/CLI_Terraform_Validation_preview.max-2800x2800.jpg" rel="external" target="_blank"&gt;
      
        
        &lt;img
            src="https://storage.googleapis.com/gweb-cloudblog-publish/images/CLI_Terraform_Validation_preview.max-1000x1000.jpg"
        
          alt="CLI Terraform Validation preview.jpg"&gt;
        
        &lt;/a&gt;
      
    &lt;/figure&gt;

  
      &lt;/div&gt;
    &lt;/div&gt;
  




&lt;/div&gt;
&lt;div class="block-paragraph"&gt;&lt;p&gt;These are some of the benefits of using &lt;b&gt;gcloud beta terraform vet&lt;/b&gt;:  &lt;/p&gt;&lt;ul&gt;&lt;li&gt;Enforce your organization's policy at any stage of application development&lt;/li&gt;&lt;li&gt;Prevent manual errors by automating policy validation&lt;/li&gt;&lt;li&gt;Fail fast with pre-deployment checks&lt;/li&gt;&lt;/ul&gt;&lt;h3&gt;New functionality&lt;/h3&gt;&lt;p&gt;In addition to creating &lt;a href="https://cloud.google.com/docs/terraform/policy-validation/create-cai-constraints"&gt;CAI based constraints&lt;/a&gt;, you can now write policies on any resource from Terraform’s &lt;a href="https://registry.terraform.io/providers/hashicorp/google/latest/docs" target="_blank"&gt;google&lt;/a&gt; and &lt;a href="https://registry.terraform.io/providers/hashicorp/google-beta/latest/docs" target="_blank"&gt;google-beta&lt;/a&gt; providers. This functionality was added after receiving feedback from our existing users of &lt;a href="https://github.com/GoogleCloudPlatform/terraform-validator" target="_blank"&gt;terraform validator&lt;/a&gt; on github. &lt;a href="https://cloud.google.com/docs/terraform/policy-validation/migrate-from-terraform-validator"&gt;Migrate&lt;/a&gt; to &lt;b&gt;gcloud beta terraform vet&lt;/b&gt; today to take advantage of this new functionality. &lt;/p&gt;&lt;h3&gt;Primary use cases for policy validation&lt;/h3&gt;&lt;p&gt;&lt;b&gt;Platform teams&lt;/b&gt; can easily add guardrails to infrastructure CI/CD pipelines (between the plan &amp;amp; apply stages) to ensure all requests for infrastructure are validated before deployment to the cloud. This limits platform team involvement by providing failure messages to end users during their pre-deployment checks which tell them which policies they have violated. &lt;/p&gt;&lt;p&gt;&lt;b&gt;Application teams&lt;/b&gt; and developers can validate their Terraform configurations against the organization’s central policy library to identify misconfigurations early in the development process. Before submitting to a CI/CD pipeline, you can easily ensure your Terraform configurations are in compliance with your organization’s policies, thus saving time and effort.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Security teams&lt;/b&gt; can &lt;a href="https://cloud.google.com/docs/terraform/policy-validation/create-policy-library"&gt;create a centralized policy library&lt;/a&gt; that is used by all teams across the organization to identify and prevent policy violations. Depending on how your organization is structured, the security team (or other trusted teams) can add the necessary policies according to the company’s needs or compliance requirements. &lt;/p&gt;&lt;h3&gt;Getting started&lt;/h3&gt;&lt;p&gt;The &lt;a href="https://cloud.google.com/docs/terraform/policy_validation/quickstart"&gt;quickstart&lt;/a&gt; provides detailed instructions on how to get started. Let’s review the simple high-level process:&lt;/p&gt;&lt;p&gt;1. First, &lt;a href="https://cloud.google.com/docs/terraform/policy_validation/create_policy_library#duplicate_the_sample_library"&gt;clone the policy library&lt;/a&gt;. This contains sample constraint &lt;a href="https://github.com/GoogleCloudPlatform/policy-library/blob/main/docs/index.md#available-templates" target="_blank"&gt;templates&lt;/a&gt; and &lt;a href="https://github.com/GoogleCloudPlatform/policy-library/blob/main/docs/index.md#policy-bundles" target="_blank"&gt;bundles&lt;/a&gt; to get started. These constraint templates specify the logic to be used by constraints.&lt;/p&gt;&lt;p&gt;2. Add your constraints to the &lt;a href="https://cloud.google.com/docs/terraform/policy_validation/library_structure"&gt;policies/constraints&lt;/a&gt; folder. This represents the policies you want to enforce. For example, the IAM domain restriction constraint ensures all IAM policy members are in the “gserviceaccount.com” domain. See &lt;a href="https://github.com/GoogleCloudPlatform/policy-library/blob/main/docs/index.md#sample-constraints" target="_blank"&gt;sample constraints&lt;/a&gt; for more samples.&lt;/p&gt;&lt;/div&gt;
&lt;div class="block-code"&gt;&lt;dl&gt;
    &lt;dt&gt;code_block&lt;/dt&gt;
    &lt;dd&gt;&amp;lt;ListValue: [StructValue([(&amp;#x27;code&amp;#x27;, &amp;#x27;apiVersion: constraints.gatekeeper.sh/v1alpha1\r\nkind: GCPIAMAllowedPolicyMemberDomainsConstraintV2\r\nmetadata:\r\n  name: service_accounts_only\r\n  annotations:\r\n    description: Checks that members that have been granted IAM roles belong to allowlisted\r\n      domains.\r\nspec:\r\n  severity: high\r\n  match:\r\n    target: # {&amp;quot;$ref&amp;quot;:&amp;quot;#/definitions/io.k8s.cli.setters.target&amp;quot;}\r\n    - &amp;quot;organizations/**&amp;quot;\r\n  parameters:\r\n    domains:\r\n    - gserviceaccount.com&amp;#x27;), (&amp;#x27;language&amp;#x27;, &amp;#x27;&amp;#x27;), (&amp;#x27;caption&amp;#x27;, &amp;lt;wagtail.rich_text.RichText object at 0x7f3aa7193670&amp;gt;)])]&amp;gt;&lt;/dd&gt;
&lt;/dl&gt;&lt;/div&gt;
&lt;div class="block-paragraph"&gt;&lt;p&gt;3. Generate a Terraform plan and convert it to JSON format&lt;br/&gt;&lt;code&gt;$ terraform show -json ./test.tfplan &amp;gt; ./tfplan.json&lt;/code&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;4. Install the gcloud component, &lt;a href="https://cloud.google.com/docs/terraform/policy_validation/installation_setup"&gt;terraform-tools&lt;/a&gt;&lt;br/&gt;&lt;code&gt;$ gcloud components update&lt;/code&gt;&lt;br/&gt;&lt;code&gt;$ gcloud components install terraform-tools&lt;/code&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;5. Run &lt;b&gt;gcloud beta terraform vet&lt;/b&gt;&lt;br/&gt;&lt;code&gt;$ gcloud beta terraform vet tfplan.json --policy-library=.&lt;/code&gt;&lt;/p&gt;&lt;p&gt;6. Finally, view the results. If you violated any policy checks, you will see the following outputs. &lt;/p&gt;&lt;p&gt;Pass:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;/div&gt;
&lt;div class="block-code"&gt;&lt;dl&gt;
    &lt;dt&gt;code_block&lt;/dt&gt;
    &lt;dd&gt;&amp;lt;ListValue: [StructValue([(&amp;#x27;code&amp;#x27;, &amp;#x27;[]&amp;#x27;), (&amp;#x27;language&amp;#x27;, &amp;#x27;&amp;#x27;), (&amp;#x27;caption&amp;#x27;, &amp;lt;wagtail.rich_text.RichText object at 0x7f3aa6dad910&amp;gt;)])]&amp;gt;&lt;/dd&gt;
&lt;/dl&gt;&lt;/div&gt;
&lt;div class="block-paragraph"&gt;&lt;p&gt;Fail: The output is much longer, here is a snippet:&lt;/p&gt;&lt;/div&gt;
&lt;div class="block-code"&gt;&lt;dl&gt;
    &lt;dt&gt;code_block&lt;/dt&gt;
    &lt;dd&gt;&amp;lt;ListValue: [StructValue([(&amp;#x27;code&amp;#x27;, &amp;#x27;[\r\n{\r\n  &amp;quot;constraint&amp;quot;: \r\n…  \r\n\r\n&amp;quot;message&amp;quot;: &amp;quot;IAM policy for //cloudresourcemanager.googleapis.com/projects/PROJECT_ID contains member from unexpected domain: user:user@example.com&amp;quot;,\r\n…\r\n]&amp;#x27;), (&amp;#x27;language&amp;#x27;, &amp;#x27;&amp;#x27;), (&amp;#x27;caption&amp;#x27;, &amp;lt;wagtail.rich_text.RichText object at 0x7f3aa6dada90&amp;gt;)])]&amp;gt;&lt;/dd&gt;
&lt;/dl&gt;&lt;/div&gt;
&lt;div class="block-paragraph"&gt;&lt;h3&gt;Feedback&lt;/h3&gt;&lt;p&gt;We’d love to hear how this feature is working for you and your &lt;a href="https://issuetracker.google.com/components/1185494" target="_blank"&gt;ideas on improvements we can make&lt;/a&gt;.&lt;/p&gt;&lt;/div&gt;
&lt;div class="block-related_article_tout"&gt;





&lt;div class="uni-related-article-tout h-c-page"&gt;
  &lt;section class="h-c-grid"&gt;
    &lt;a href="https://cloud.google.com/blog/products/devops-sre/terraform-gitops-with-google-cloud-build-and-storage/"
       data-analytics='{
                       "event": "page interaction",
                       "category": "article lead",
                       "action": "related article - inline",
                       "label": "article: {slug}"
                     }'
       class="uni-related-article-tout__wrapper h-c-grid__col h-c-grid__col--8 h-c-grid__col-m--6 h-c-grid__col-l--6
        h-c-grid__col--offset-2 h-c-grid__col-m--offset-3 h-c-grid__col-l--offset-3 uni-click-tracker"&gt;
      &lt;div class="uni-related-article-tout__inner-wrapper"&gt;
        &lt;p class="uni-related-article-tout__eyebrow h-c-eyebrow"&gt;Related Article&lt;/p&gt;

        &lt;div class="uni-related-article-tout__content-wrapper"&gt;
          &lt;div class="uni-related-article-tout__image-wrapper"&gt;
            &lt;div class="uni-related-article-tout__image" style="background-image: url('')"&gt;&lt;/div&gt;
          &lt;/div&gt;
          &lt;div class="uni-related-article-tout__content"&gt;
            &lt;h4 class="uni-related-article-tout__header h-has-bottom-margin"&gt;Ensuring scale and compliance of your Terraform deployment with Cloud Build&lt;/h4&gt;
            &lt;p class="uni-related-article-tout__body"&gt;The best way to run Terraform on Google Cloud is with Cloud Build and Cloud Storage. This article explains why, covering scale, security ...&lt;/p&gt;
            &lt;div class="cta module-cta h-c-copy  uni-related-article-tout__cta muted"&gt;
              &lt;span class="nowrap"&gt;Read Article
                &lt;svg class="icon h-c-icon" role="presentation"&gt;
                  &lt;use xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#mi-arrow-forward"&gt;&lt;/use&gt;
                &lt;/svg&gt;
              &lt;/span&gt;
            &lt;/div&gt;
          &lt;/div&gt;
        &lt;/div&gt;
      &lt;/div&gt;
    &lt;/a&gt;
  &lt;/section&gt;
&lt;/div&gt;

&lt;/div&gt;</description><pubDate>Wed, 18 May 2022 16:00:00 +0000</pubDate><guid>https://cloud.google.com/blog/products/compliance/google-cloud-cli-terraform-validation-preview/</guid><category>Developers &amp; Practitioners</category><category>Google Cloud</category><category>Compliance</category><og xmlns:og="http://ogp.me/ns#"><type>article</type><title>Announcing policy guardrails for Terraform on Google Cloud CLI preview</title><description></description><site_name>Google</site_name><url>https://cloud.google.com/blog/products/compliance/google-cloud-cli-terraform-validation-preview/</url></og><author xmlns:author="http://www.w3.org/2005/Atom"><name>Arslan Saeed</name><title>Product Manager for Terraform</title><department></department><company></company></author><author xmlns:author="http://www.w3.org/2005/Atom"><name>Stephen Lewis</name><title>Software Engineer/TL</title><department></department><company></company></author></item><item><title>Implementing HKMA’s Secure Tertiary Data Backup (STDB) on Google Cloud</title><link>https://cloud.google.com/blog/topics/financial-services/stdb-on-google-cloud/</link><description>&lt;div class="block-paragraph"&gt;&lt;p&gt;In this post, we will discuss how Google Cloud can be used as a backup storage solution to support the objectives of the &lt;a href="https://www.hkma.gov.hk/media/eng/doc/key-information/guidelines-and-circular/2021/20210518e1.pdf" target="_blank"&gt;Secure Tertiary Data Backup (STDB)&lt;/a&gt; guideline developed by the Hong Kong Monetary Authority (HKMA) and Hong Kong Association of Banks. We will focus on the storage location and its surrounding security controls. The solution should work with any backup tool that can configure Google Cloud Storage as the data storage destination.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;To help satisfy STDB requirements, the data backup destination or storage location should be able to fulfill the following requirements: &lt;/p&gt;&lt;p&gt;&lt;b&gt;Immutable and controlled&lt;/b&gt;&lt;/p&gt;&lt;p&gt;1. Data should be immutable by the data writer.  For instance, the backup software should not have the ability to update or delete the data once it is written to the storage&lt;/p&gt;&lt;p&gt;&lt;b&gt;Secure and verifiable&lt;/b&gt;&lt;/p&gt;&lt;p&gt;2. All data transfer should go through a private and encrypted connection&lt;/p&gt;&lt;p&gt;3. All data at rest must be encrypted and by keys that are managed by the data owner&lt;/p&gt;&lt;p&gt;4. All operations on the backup location, both by the owner and solution provider must be logged and auditable&lt;/p&gt;&lt;p&gt;&lt;b&gt;Air-gapped&lt;/b&gt;&lt;/p&gt;&lt;p&gt;5. The backup target is “air-gapped” or disconnected from the data source / on-prem network when backup is not taking place&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Limit the network connection by disconnecting the data source and backup storage as much as possible.&lt;/li&gt;&lt;li&gt;Grant read and write-only access rights based on the principle of least privilege and through role AND time-based access control.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;6. To minimize the surface of attack, the number of components in the solution should be minimized while multiple layers of access control should be enforced to restrict network connection and resource access control.&lt;/p&gt;&lt;p&gt;&lt;b&gt;High performance&lt;/b&gt;&lt;/p&gt;&lt;p&gt;7. Storage location should provide instantaneous (milliseconds) access to the backed up data when needed, enabling rapid recovery of data.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Survivable&lt;/b&gt;&lt;/p&gt;&lt;p&gt;8. The backup destination should be highly durable and available.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;9. The storage location should have capacity to support a long history of backups to ensure a clean copy is in place.  This is especially critical for recovery from ransomware attacks.&lt;/p&gt;10. The solution must be designed for resiliency against attacks. &lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;Optionally, the following requirements can also be considered:&lt;/b&gt;&lt;/p&gt;&lt;p&gt;11. All interactions against the backup target should be accessible via API only.  In other words, the inability to access the user interface should not interfere with the backup operation and the management of the solution.&lt;/p&gt;&lt;h3&gt;Design Details&lt;/h3&gt;&lt;/div&gt;
&lt;div class="block-image_full_width"&gt;






  
    &lt;div class="article-module h-c-page"&gt;
      &lt;div class="h-c-grid"&gt;
  

    &lt;figure class="article-image--large
      
      
        h-c-grid__col
        h-c-grid__col--6 h-c-grid__col--offset-3
        
        
      "
      &gt;

      
      
        
        &lt;img
            src="https://storage.googleapis.com/gweb-cloudblog-publish/images/image2_WtBGAXX.max-1000x1000.jpg"
        
          alt="image2.jpg"&gt;
        
        &lt;/a&gt;
      
    &lt;/figure&gt;

  
      &lt;/div&gt;
    &lt;/div&gt;
  




&lt;/div&gt;
&lt;div class="block-paragraph"&gt;&lt;p&gt;1. To help ensure all data transfer to and from Google Cloud Storage is &lt;b&gt;private and secured&lt;/b&gt;, an Interconnect (recommended for production) or VPN (sufficient for dev or small bandwidth requirements) should be established between on-premise and Google Cloud.  IPSec tunnel can optionally be used to encrypt the connectivity.&lt;/p&gt;&lt;ul&gt;&lt;li&gt;To support the &lt;b&gt;air-gapped&lt;/b&gt; requirement, either disconnect the Interconnect/VPN from the on-premise router or at the Cloud Router, or both.  This disconnection can be done programmatically through gcloud CLI or Terraform.  Combining it with Cloud Schedule, on-premise cron job, or any scheduler to disconnect the Interconnect at a specified time or on a scheduled and recurring basis.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;2. To protect against &lt;b&gt;data exfiltration risks&lt;/b&gt;, Google Cloud supports the concepts of VPC Service Control, which allows a security perimeter to be established around a project, network, and/or services so that network communication is constrained within such perimeter.  This perimeter provides &lt;b&gt;an additional layer of security protection&lt;/b&gt; that complement role based access control provided by &lt;a href="https://cloud.google.com/iam"&gt;Identity and Access Management&lt;/a&gt; (IAM), and more importantly, this protection can work with managed services that do not have a fixed IP/port range, which is something that a network firewall can protect with ease.&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Using an example in the diagram above, a client or VM may carry sufficient IAM role to access the Cloud Storage, but because the Cloud Storage is protected by VPC Service Control, such access will still be blocked as the is not configured within the security perimeter. &lt;/li&gt;&lt;/ul&gt;3. To achieve the &lt;b&gt;principle of least privilege&lt;/b&gt; and to further segregate access control, two or more IAM roles with fine grained permissions can be defined.  &lt;br/&gt;&lt;ul&gt;&lt;li&gt;In this case a “Writer” IAM role having storage.objects.create permission would be granted to the backup software, so that it does not have permission to manipulate the bucket and objects already written to Cloud Storage.  &lt;/li&gt;&lt;li&gt;To further support the &lt;b&gt;air-gapped&lt;/b&gt; requirement, implement time-based controls on the “Writer” IAM role. For example, defining a conditional role binding using date/time attribute results in the write permission being only enabled at a specified time or on a scheduled and recurring basis.&lt;/li&gt;&lt;li&gt;For the break glass scenario, create an “Admin” IAM, say containing  storage.objects.delete permission, and manage this IAM role in a PAM system (e.g. CyberArk).&lt;/li&gt;&lt;li&gt;IAM Recommendation - Google Cloud has a built-in &lt;a href="https://cloud.google.com/iam/docs/recommender-managing"&gt;IAM policy intelligence&lt;/a&gt; that uses machine learning to predict access needs, so administrators may grant the right levels of access to avoid over-granting.  The tool shows a list of recommendations, which includes recommending users to revoke unused roles (e.g. revoke a role if it hasn’t been accessed for over N days), or provision restricted roles to replace the overly broad ones.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;4. In order for the backup software to copy data into Cloud Storage, it must first have the “Writer” IAM role, and be added into the perimeter by whitelisting its private IP.  &lt;b&gt;The data transfer would stay private between on-premise data centers and Google Cloud&lt;/b&gt;.&lt;/p&gt;&lt;p&gt;5. Data written to the Cloud Storage is &lt;b&gt;encrypted by default&lt;/b&gt;.  Also customers can enable Customer Managed Encryption Keys to have more control over the keys used to encrypt data, e.g. Rotating the key, or backing the key with Cloud HSM key.  It is actually possible to disable or destroy a key such that Cloud Storage can no longer decrypt the objects, rendering the object unretrievable.&lt;br/&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Archive storage class is used to achieve &lt;b&gt;ultra low cost and highly durable&lt;/b&gt; storage for the backup objects.  Despite being an Archive class storage, it can still support &lt;b&gt;instantaneous retrieval&lt;/b&gt; and requires no thawing, allowing instant recovery of data when it is needed.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;6. Access and maintenance of the storage is &lt;b&gt;logged and auditable, &lt;/b&gt;including operations done by Google.  If User Interface access (i.e. Google Cloud Console) is not desired, customers can block access at the corporate proxy but still allow backup process and management of the service to take place programmatically using gcloud CLI or client libraries.&lt;/p&gt;&lt;h3&gt;Security Controls&lt;/h3&gt;&lt;p&gt;&lt;b&gt;Fundamental security controls:&lt;/b&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;Data Encryption by default for at rest using customer managed encryption key.&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;Fine grained access control using IAM supporting time-based control of permissions.&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;Define Security Perimeter to protect against data exfiltration risks (in addition to IAM).&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;Private connectivity through a secure/dedicated communication channel with end-to-end network encryption for data transport.&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;Centralized logging for administrator/user activity monitoring and auditing.  Access transparency ensures all operations done by Google are also logged and auditable.&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;Security Command Centre to help detect misconfigurations, abnormal activity, such as service account abuse and data exfiltration.&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;b&gt;Advanced security features:&lt;/b&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;Context Aware Access for contextual access control (e.g. who, where, device, etc.) and automatically prompt for re-authentication if required.&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;DLP protection integrated with Cloud Storage, which can automatically detect and flag the existence of PII using machine learning.&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;&lt;h3&gt;Mapping features into STDB goals&lt;/h3&gt;&lt;p&gt;&lt;b&gt;Immutable and controlled&lt;/b&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;Security Perimeter (&lt;a href="https://cloud.google.com/vpc-service-controls"&gt;VPC Service Controls&lt;/a&gt;)&lt;br/&gt;VPC Service Controls delivers an extra layer of control with a defense-in-depth approach for multi-tenant services that helps protect service access from both insider and outsider threats. It enforces a security perimeter with VPC Service Controls to isolate resources of multi-tenant Google Cloud services by reducing the risk of data exfiltration or data breach.&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;Enabling the &lt;a href="https://cloud.google.com/storage/docs/bucket-lock"&gt;bucket lock&lt;/a&gt; feature can provide immutable storage on Cloud Storage.  Once enabled, all objects in the bucket can only be deleted or replaced once their age is greater than the retention period. This feature is recommended to be used in conjunction with &lt;a href="https://cloud.google.com/storage/docs/org-policy-constraints#audit-logging"&gt;Detailed Audit Logging mode&lt;/a&gt; when seeking various compliance requirements.&lt;br/&gt;&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;b&gt;Secure and verifiable&lt;/b&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;IPsec over Interconnect&lt;br/&gt;It provides customers a managed solution to encrypt their traffic over Interconnect, so that all data transfer go through a private and encrypted connection.&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;a href="https://cloud.google.com/storage/docs/encryption"&gt;Default Encryption at rest&lt;br/&gt;&lt;/a&gt;Cloud Storage encrypts your data on the server side, before it is written to disk, at no additional charge. Customer managed encryption keys (CMEK) and Customer supplied encryption keys (CSEK) are also supported as a Server-side encryption which acts as an additional encryption layer on top of the standard Cloud Storage encryption.&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;a href="https://cloud.google.com/iam"&gt;Cloud IAM&lt;/a&gt; manages resource permissions by creating &lt;a href="https://cloud.google.com/storage/docs/access-control#choose_between_uniform_and_fine-grained_access"&gt;granular access control&lt;/a&gt; policies to resources based on attributes like device security status, IP address, resource type, and date/time.&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;a href="https://cloud.google.com/logging/docs/audit"&gt;Cloud Audit Logs&lt;/a&gt; with Cloud Storage help you answer the questions, "Who did what, where, and when?" by generating &lt;a href="https://cloud.google.com/logging/docs/audit#admin-activity"&gt;Admin Activity logs&lt;/a&gt; and &lt;a href="https://cloud.google.com/logging/docs/audit#data-access"&gt;Data Access logs&lt;/a&gt;.  With &lt;a href="https://cloud.google.com/storage/docs/org-policy-constraints#audit-logging"&gt;Detailed Audit Logging mode&lt;/a&gt; enabled, data access logs will contain detailed request and response information including query parameters, path parameters, and request body parameters.&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;a href="https://cloud.google.com/logging/docs/audit/access-transparency-overview"&gt;Access Transparency&lt;/a&gt;&lt;br/&gt;Provides near real-time logs when Google administrators access your content based on support tickets.  Access Approval allows users to approve/dismiss requests for access by GCP administrators working to support your service. &lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;Enable corporate proxy to block UI/console access to Cloud Storage.&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;a href="https://cloud.google.com/iam/docs/recommender-managing"&gt;IAM policy intelligence&lt;/a&gt; that uses machine learning to predict access needs, so administrators may grant the right levels of access to avoid over-granting.&lt;br/&gt;&lt;br/&gt;&lt;b&gt;Data Integrity&lt;/b&gt;&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;Google Cloud Storage uses MD5 hash (or ETag) or CRC32c to validate integrity of the data. In the case of composite objects, CRC32c is used.  When supplying an object's expected MD5 or CRC32C hash in an upload request, Cloud Storage will only create the object if the provided hash matches the value Cloud Storage calculates.  Likewise, a download integrity check can be performed by hashing downloaded data on the fly and comparing the results to the server-supplied hashes.  If &lt;a href="https://cloud.google.com/storage/docs/gsutil"&gt;gsutil&lt;/a&gt; is used for data transfer, the above data integrity checking is handled automatically.&lt;br/&gt;&lt;br/&gt;&lt;b&gt;Restoration Validation&lt;/b&gt;&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;A regular data restoration drill is recommended to ensure a successful recovery and a clean backup image is in place.  Both restoration drill and actual restore can be performed by running the gsutil command to get the data/files back.  Or if any backup software is used, performing a data restore operation using the backup software can also serve the same purpose.&lt;br/&gt;&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;b&gt;Air-gapped&lt;/b&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;Use of &lt;a href="https://cloud.google.com/iam/docs/configuring-temporary-access"&gt;date/time attributes&lt;/a&gt; in Cloud IAM to enforce time-based controls when accessing a given resource. You can grant temporary access to a project that starts and stops at a specified time.&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;Simple architecture that sits in a &lt;a href="https://cloud.google.com/about/locations#network"&gt;Google-privately owned and managed network&lt;/a&gt; (&lt;a href="https://cloud.google.com/network-tiers/docs/overview#premium_tier"&gt;without any traffic in the public network&lt;/a&gt;) with a full stack of unique security controls including VPC Service Controls, default encryption, Cloud IAM with time-based control, access transparency, etc.&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;b&gt;High performance&lt;/b&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;For the 4 Storage Classes of Google Cloud Storage, all 4 of them (including the lowest cost tier of Archive Storage) have the same SLA with &lt;a href="https://cloud.google.com/storage/docs/storage-classes#descriptions"&gt;extremely low retrieval latency - time to first byte is typically in tens of milliseconds&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;b&gt;Object Lifecycle Management&lt;/b&gt;&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;To optimize storage costs, it is possible to transition to a lower cost storage class when the backup artifact is no longer current.  For instance, using &lt;a href="https://cloud.google.com/storage/docs/managing-lifecycles#change_an_objects_storage_class"&gt;Object Lifecycle Management&lt;/a&gt;, users can configure a rule to downgrade the storage class of objects older than 365 days to Coldline Storage.&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;b&gt;Survivable&lt;/b&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;&lt;a href="https://cloud.google.com/storage/archival"&gt;Archive Storage&lt;/a&gt; offers ultra low-cost, highly-durable, highly available archival storage. For data accessed less than once a year, Archive is a cost-effective storage option for long-term preservation of data.&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;Archive Storage Class description&lt;/p&gt;&lt;/li&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;Unlimited storage with no minimum object size.&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;Worldwide accessibility and worldwide storage locations.&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;Low latency (time to first byte typically tens of milliseconds).&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;High durability (99.999999999% annual durability).&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;Geo-redundancy if the data is stored in a multi-region or dual-region.&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;Typical monthly availability.&lt;br/&gt;99.95% in multi-regions and dual-regions and 99.9% in regions.&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;A uniform experience with Cloud Storage features, security, tools, and APIs.&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/ul&gt;&lt;/div&gt;
&lt;div class="block-related_article_tout"&gt;





&lt;div class="uni-related-article-tout h-c-page"&gt;
  &lt;section class="h-c-grid"&gt;
    &lt;a href="https://cloud.google.com/blog/products/storage-data-transfer/archive-storage-class-for-coldest-data-now-available/"
       data-analytics='{
                       "event": "page interaction",
                       "category": "article lead",
                       "action": "related article - inline",
                       "label": "article: {slug}"
                     }'
       class="uni-related-article-tout__wrapper h-c-grid__col h-c-grid__col--8 h-c-grid__col-m--6 h-c-grid__col-l--6
        h-c-grid__col--offset-2 h-c-grid__col-m--offset-3 h-c-grid__col-l--offset-3 uni-click-tracker"&gt;
      &lt;div class="uni-related-article-tout__inner-wrapper"&gt;
        &lt;p class="uni-related-article-tout__eyebrow h-c-eyebrow"&gt;Related Article&lt;/p&gt;

        &lt;div class="uni-related-article-tout__content-wrapper"&gt;
          &lt;div class="uni-related-article-tout__image-wrapper"&gt;
            &lt;div class="uni-related-article-tout__image" style="background-image: url('')"&gt;&lt;/div&gt;
          &lt;/div&gt;
          &lt;div class="uni-related-article-tout__content"&gt;
            &lt;h4 class="uni-related-article-tout__header h-has-bottom-margin"&gt;Put your archive data on ice with new storage offering&lt;/h4&gt;
            &lt;p class="uni-related-article-tout__body"&gt;The new storage class called Archive, our coldest Cloud Storage offering yet, is now available for data backup and storage.&lt;/p&gt;
            &lt;div class="cta module-cta h-c-copy  uni-related-article-tout__cta muted"&gt;
              &lt;span class="nowrap"&gt;Read Article
                &lt;svg class="icon h-c-icon" role="presentation"&gt;
                  &lt;use xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#mi-arrow-forward"&gt;&lt;/use&gt;
                &lt;/svg&gt;
              &lt;/span&gt;
            &lt;/div&gt;
          &lt;/div&gt;
        &lt;/div&gt;
      &lt;/div&gt;
    &lt;/a&gt;
  &lt;/section&gt;
&lt;/div&gt;

&lt;/div&gt;</description><pubDate>Tue, 03 May 2022 00:00:00 +0000</pubDate><guid>https://cloud.google.com/blog/topics/financial-services/stdb-on-google-cloud/</guid><category>Storage &amp; Data Transfer</category><category>Compliance</category><category>Financial Services</category><og xmlns:og="http://ogp.me/ns#"><type>article</type><title>Implementing HKMA’s Secure Tertiary Data Backup (STDB) on Google Cloud</title><description></description><site_name>Google</site_name><url>https://cloud.google.com/blog/topics/financial-services/stdb-on-google-cloud/</url></og><author xmlns:author="http://www.w3.org/2005/Atom"><name>Henry Cheng</name><title>Principal Architect</title><department></department><company></company></author><author xmlns:author="http://www.w3.org/2005/Atom"><name>Benny Chan</name><title>Customer Engineer</title><department></department><company></company></author></item><item><title>Automatic data risk management for BigQuery using DLP</title><link>https://cloud.google.com/blog/products/identity-security/google-launches-automatic-dlp-for-bigquery/</link><description>&lt;div class="block-paragraph"&gt;&lt;p data-block-key="v28zc"&gt;Protecting sensitive data and preventing unintended data exposure is critical for businesses. However, many organizations lack the tools to stay on top of where sensitive data resides across their enterprise. It’s particularly concerning when sensitive data shows up in unexpected places – for example, in logs that  services generate, when customers inadvertently send it in a customer support chat, or when managing unstructured analytical workloads. This is where Automatic Data Loss Prevention (DLP) for BigQuery can help.&lt;/p&gt;&lt;p data-block-key="klau1"&gt;Data discovery and classification is often implemented as a manual, on-demand process, and as a result  happens less frequently than many organizations would like. With a large amount of data being created on the fly, a more modern, proactive approach is to build discovery and classification into existing data analytics tools. By making it automatic, you can ensure that a key way to surface risk happens continuously - an example of Google Cloud's invisible security strategy. Automatic DLP is a fully-managed service that continuously scans data across your entire organization to give you general awareness of what data you have, and specific visibility into where sensitive data is stored and processed. This awareness is a critical first step in protecting and governing your data and acts as a key control to help &lt;a href="https://cloud.google.com/blog/products/identity-security/how-cloud-dlp-can-help-with-compliance-security-and-privacy"&gt;improve your security, privacy, and compliance&lt;/a&gt; posture.&lt;/p&gt;&lt;p data-block-key="fkoff"&gt;In October of last year, &lt;a href="https://cloud.google.com/blog/products/identity-security/automatic-dlp-for-bigquery"&gt;we announced&lt;/a&gt; the public preview for Automatic DLP for BigQuery. Since the announcement, our customers have already scanned and processed both structured and &lt;a href="https://cloud.google.com/blog/products/identity-security/google-a-leader-in-unstructured-data-security-platforms"&gt;unstructured&lt;/a&gt; BigQuery data at multi-petabyte scale to identify where sensitive data resides and gain visibility into their data risk. That’s why we are happy to announce that Automatic DLP is now Generally Available. As part of the release we’ve also added several new features to make it even easier to understand your data and to make use of the insights in more Cloud workflows. These features include:&lt;/p&gt;&lt;ul&gt;&lt;li data-block-key="kvr4s"&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p data-block-key="w09xr"&gt;Premade Data Studio dashboards to give you more advanced summary, reporting, and investigation tools that you can customize to your business needs.&lt;/p&gt;&lt;/div&gt;
&lt;div class="block-image_full_width"&gt;






  
    &lt;div class="article-module h-c-page"&gt;
      &lt;div class="h-c-grid"&gt;
  

    &lt;figure class="article-image--large
      
      
        h-c-grid__col
        h-c-grid__col--6 h-c-grid__col--offset-3
        
        
      "
      &gt;

      
      
        &lt;a href="https://storage.googleapis.com/gweb-cloudblog-publish/images/Easy_to_understand_dashboards_give_a_quick.max-2800x2800.jpg" rel="external" target="_blank"&gt;
      
        
        &lt;img
            src="https://storage.googleapis.com/gweb-cloudblog-publish/images/Easy_to_understand_dashboards_give_a_quick.max-1000x1000.jpg"
        
          alt="Easy to understand dashboards give a quick overview of data in BQ.jpg"&gt;
        
        &lt;/a&gt;
      
        &lt;figcaption class="article-image__caption "&gt;&lt;p data-block-key="95c1h"&gt;Easy to understand dashboards give a quick overview of data in BQ&lt;/p&gt;&lt;/figcaption&gt;
      
    &lt;/figure&gt;

  
      &lt;/div&gt;
    &lt;/div&gt;
  




&lt;/div&gt;
&lt;div class="block-paragraph"&gt;&lt;p data-block-key="bh5rg"&gt;&lt;/p&gt;&lt;ul&gt;&lt;li data-block-key="ogl0t"&gt;Finer grained controls to adjust frequency and conditions for when data is profiled or reprofiled, including the ability to enable certain subsets of your data to be scanned more frequently, less frequently, or skipped from profiling.&lt;/li&gt;&lt;/ul&gt;&lt;p data-block-key="pt3dx"&gt;&lt;/p&gt;&lt;/div&gt;
&lt;div class="block-image_full_width"&gt;






  
    &lt;div class="article-module h-c-page"&gt;
      &lt;div class="h-c-grid"&gt;
  

    &lt;figure class="article-image--medium
      
      
        h-c-grid__col
        
        h-c-grid__col--4 h-c-grid__col--offset-4
        
      "
      &gt;

      
      
        &lt;a href="https://storage.googleapis.com/gweb-cloudblog-publish/images/Granular_settings_for_how_often_data_is_sc.max-2800x2800.jpg" rel="external" target="_blank"&gt;
      
        
        &lt;img
            src="https://storage.googleapis.com/gweb-cloudblog-publish/images/Granular_settings_for_how_often_data_is_sc.max-1000x1000.jpg"
        
          alt="Granular settings for how often data is scanned.jpg"&gt;
        
        &lt;/a&gt;
      
        &lt;figcaption class="article-image__caption "&gt;&lt;p data-block-key="cu327"&gt;Granular settings for how often data is scanned&lt;/p&gt;&lt;/figcaption&gt;
      
    &lt;/figure&gt;

  
      &lt;/div&gt;
    &lt;/div&gt;
  




&lt;/div&gt;
&lt;div class="block-paragraph"&gt;&lt;p data-block-key="21qvv"&gt;&lt;/p&gt;&lt;ul&gt;&lt;li data-block-key="ez3iw"&gt;&lt;a href="https://chroniclesec.medium.com/powering-security-operations-with-context-aware-detections-alert-prioritization-and-risk-scoring-a75389904917" target="_blank"&gt;Automatic sync&lt;/a&gt; of DLP profiler insights and risk scores for each table into &lt;a href="https://cloud.google.com/security/products/security-operations"&gt;Chronicle&lt;/a&gt;, our Security Analytics platform. We aim to build synergy across our security portfolio, and with this integration we allow analysts using Chronicle to gain immediate insight into if the BQ data involved in a potential incident is of high value or not. This can significantly help to &lt;a href="https://chroniclesec.medium.com/security-analyst-diaries-2-detect-alert-respond-context-is-key-everywhere-in-security-operations-1f7b9be0f7c3" target="_blank"&gt;enhance threat detections&lt;/a&gt;, prioritizations, and security investigations. For example, if Chronicle detects several attacks, knowing if one is targeting highly sensitive data will help you prioritize, investigate, and remediate the most urgent threats first.&lt;/li&gt;&lt;/ul&gt;&lt;p data-block-key="zlh3j"&gt;&lt;/p&gt;&lt;/div&gt;
&lt;div class="block-image_full_width"&gt;






  
    &lt;div class="article-module h-c-page"&gt;
      &lt;div class="h-c-grid"&gt;
  

    &lt;figure class="article-image--large
      
      
        h-c-grid__col
        h-c-grid__col--6 h-c-grid__col--offset-3
        
        
      "
      &gt;

      
      
        &lt;a href="https://storage.googleapis.com/gweb-cloudblog-publish/images/Deep_native_integration_into_Chronicle_hel.max-2800x2800.jpg" rel="external" target="_blank"&gt;
      
        
        &lt;img
            src="https://storage.googleapis.com/gweb-cloudblog-publish/images/Deep_native_integration_into_Chronicle_hel.max-1000x1000.jpg"
        
          alt="Deep native integration into Chronicle helps speed up detection and response.jpg"&gt;
        
        &lt;/a&gt;
      
        &lt;figcaption class="article-image__caption "&gt;&lt;p data-block-key="3j8xt"&gt;Deep native integration into Chronicle helps speed up detection and response&lt;/p&gt;&lt;/figcaption&gt;
      
    &lt;/figure&gt;

  
      &lt;/div&gt;
    &lt;/div&gt;
  




&lt;/div&gt;
&lt;div class="block-paragraph"&gt;&lt;h3 data-block-key="bz4ib"&gt;Managing data risk with data classification&lt;/h3&gt;&lt;p data-block-key="djwbu"&gt;Examples of sensitive data elements that typically need special attention are credit cards, medical information, Social Security numbers, government issued IDs, addresses, full names, and account credentials. Automatic DLP leverages machine learning and provides more than 150 predefined detectors to help discover, classify, and govern this sensitive data, allowing you to make sure the right protections are in place. &lt;/p&gt;&lt;p data-block-key="sddy5"&gt;Once you have visibility into your sensitive data, there are many options to help remediate issues or reduce your overall data risk. For example, you can use IAM to restrict access to datasets or tables or leverage &lt;a href="https://cloud.google.com/bigquery/docs/best-practices-policy-tags"&gt;BigQuery Policy Tags&lt;/a&gt; to set fine-grained access policies at the column level. Our Cloud DLP platform also provides a set of tools to run on-demand deep and exhaustive inspections of data or can help you &lt;a href="https://cloud.google.com/blog/products/identity-security/taking-charge-of-your-data-using-cloud-dlp-to-de-identify-and-obfuscate-sensitive-information"&gt;obfuscate, mask, or tokenize&lt;/a&gt; data to reduce overall data risk. This capability is particularly important if you’re using data for analytics and machine learning, since that sensitive data must be handled appropriately to ensure your users’ privacy and compliance with privacy regulations.&lt;/p&gt;&lt;h3 data-block-key="yi2f3"&gt;How to get started&lt;/h3&gt;&lt;p data-block-key="34kzl"&gt;Automatic DLP can be turned on for your entire organization, selected organization folders, or individual projects. &lt;b&gt;To learn more about these new capabilities or to get started today,&lt;/b&gt; open the &lt;a href="https://console.cloud.google.com/dlp/dataprofiles"&gt;Cloud DLP page in the Cloud Console&lt;/a&gt; and check out our &lt;a href="https://cloud.google.com/dlp/docs/data-profiles"&gt;documentation&lt;/a&gt;.&lt;/p&gt;&lt;/div&gt;
&lt;div class="block-related_article_tout"&gt;





&lt;div class="uni-related-article-tout h-c-page"&gt;
  &lt;section class="h-c-grid"&gt;
    &lt;a href="https://cloud.google.com/blog/products/identity-security/automatic-dlp-for-bigquery/"
       data-analytics='{
                       "event": "page interaction",
                       "category": "article lead",
                       "action": "related article - inline",
                       "label": "article: {slug}"
                     }'
       class="uni-related-article-tout__wrapper h-c-grid__col h-c-grid__col--8 h-c-grid__col-m--6 h-c-grid__col-l--6
        h-c-grid__col--offset-2 h-c-grid__col-m--offset-3 h-c-grid__col-l--offset-3 uni-click-tracker"&gt;
      &lt;div class="uni-related-article-tout__inner-wrapper"&gt;
        &lt;p class="uni-related-article-tout__eyebrow h-c-eyebrow"&gt;Related Article&lt;/p&gt;

        &lt;div class="uni-related-article-tout__content-wrapper"&gt;
          &lt;div class="uni-related-article-tout__image-wrapper"&gt;
            &lt;div class="uni-related-article-tout__image" style="background-image: url('https://storage.googleapis.com/gweb-cloudblog-publish/images/Google_Cloud_security.max-500x500.jpg')"&gt;&lt;/div&gt;
          &lt;/div&gt;
          &lt;div class="uni-related-article-tout__content"&gt;
            &lt;h4 class="uni-related-article-tout__header h-has-bottom-margin"&gt;Cloud Data Loss Prevention is now automatic!&lt;/h4&gt;
            &lt;p class="uni-related-article-tout__body"&gt;Google Cloud DLP is now automatic and can help you gain visibility into sensitive data across your entire BigQuery footprint.&lt;/p&gt;
            &lt;div class="cta module-cta h-c-copy  uni-related-article-tout__cta muted"&gt;
              &lt;span class="nowrap"&gt;Read Article
                &lt;svg class="icon h-c-icon" role="presentation"&gt;
                  &lt;use xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#mi-arrow-forward"&gt;&lt;/use&gt;
                &lt;/svg&gt;
              &lt;/span&gt;
            &lt;/div&gt;
          &lt;/div&gt;
        &lt;/div&gt;
      &lt;/div&gt;
    &lt;/a&gt;
  &lt;/section&gt;
&lt;/div&gt;

&lt;/div&gt;</description><pubDate>Thu, 14 Apr 2022 16:00:00 +0000</pubDate><guid>https://cloud.google.com/blog/products/identity-security/google-launches-automatic-dlp-for-bigquery/</guid><category>Databases</category><category>Data Analytics</category><category>Compliance</category><category>Cloud Migration</category><category>Security &amp; Identity</category><og xmlns:og="http://ogp.me/ns#"><type>article</type><title>Automatic data risk management for BigQuery using DLP</title><description></description><site_name>Google</site_name><url>https://cloud.google.com/blog/products/identity-security/google-launches-automatic-dlp-for-bigquery/</url></og><author xmlns:author="http://www.w3.org/2005/Atom"><name>Scott Ellis</name><title>Group Product Manager</title><department></department><company></company></author></item><item><title>Verifying the security and privacy controls of Google Cloud: 2021 CCAG customer pooled audit</title><link>https://cloud.google.com/blog/products/identity-security/google-cloud-completed-the-ccag-pooled-audit-for-2021/</link><description>&lt;div class="block-paragraph"&gt;&lt;p&gt;Earning the role as our customers’ most trusted cloud requires commitment to ongoing transparency, collaboration and assurance. Our products regularly undergo independent verification, achieving certifications or attestations of compliance against &lt;a href="http://cloud.google.com/security/compliance"&gt;global regulatory requirements, frameworks, and guidelines&lt;/a&gt;. At Google Cloud we work closely with our customers, their regulators, and appointed independent auditors who want to verify the security and privacy of our platform. One example of how the &lt;a href="https://cloud.google.com/security/gcat"&gt;Google Cybersecurity Action Team&lt;/a&gt; supports customers’ risk management efforts is our annual audit with the Collaborative Cloud Audit Group (CCAG). In 2020, faced with the global COVID-19 pandemic and the demands for teleworking, Google Cloud swiftly enabled &lt;a href="https://cloud.google.com/blog/products/compliance/google-completes-annual-pooled-audit-with-ccag-completely-remote"&gt;customer audits in completely remote settings&lt;/a&gt;. 2021 brought additional challenges for organizations globally with an &lt;a href="https://www.cisa.gov/uscert/sites/default/files/publications/AA22-040A_2021_Trends_Show_Increased_Globalized_Threat_of_Ransomware_508.pdf" target="_blank"&gt;increased number&lt;/a&gt; of cybersecurity threats, data breaches, software supply chain attacks, as well as rapidly evolving data transfer and privacy requirements. These heightened challenges emphasized the importance for customers to rigorously assess the controls that enable them to independently operate and confidently protect their data and applications in the cloud. So, not surprisingly, the scope of the 2021 CCAG pooled audit included, among others, the measures ensuring Google keeps customer data secure and private, effectively manages threats and vulnerabilities, and ensures transparency and accountability across the full software supply chain.&lt;/p&gt;&lt;p&gt;CCAG is an initiative of 50 leading European financial institutions and insurance companies who depend on cloud infrastructure and technologies to deliver innovative solutions and experiences for their customers. For the third year in a row, the CCAG audit of Google Cloud enabled the group members to manage the risks associated with outsourcing material workloads and satisfy strict national and EU regulatory obligations.&lt;/p&gt;&lt;p&gt;Hamidou Dia, VP for Solutions Engineering in Google Cloud, spoke about how critical verifiable transparency is to earning and retaining customer trust: &lt;/p&gt;&lt;p&gt;“Our customers recognize the need to secure their global workforce, applications, and data across all platforms, which includes understanding cloud service providers’ relevant policies and controls,” said Dia. “Successful enterprise trust partnerships require transparency, along with access to information, premises and experts, all of which help our customers rapidly complete their risk management and due diligence.”&lt;/p&gt;&lt;p&gt;The pooled audit executed by CCAG is a great example of customers working together to efficiently deploy their resources and gain detailed information and assurances of Google Cloud’s trust posture. The annual engagement lasts approximately six months and is a comprehensive assessment of the design and the effectiveness of Google Cloud security and privacy controls.&lt;/p&gt;&lt;p&gt;“This year we primarily focused on testing Google’s infrastructure security, cryptographic and data privacy controls, and supply chain management. An audit of the scale performed by CCAG requires extensive preparation and resources on both sides. To satisfy the participating members’ individual risk assessments, as well as meet regulatory compliance requirements, we reviewed a large number of policies, processes, technical documents, and test samples”, said Christina Hepp, Divisional Head IT, Operations &amp;amp; Sourcing Group Audit, Commerzbank. “Google Cloud teams pulled together subject matter experts across the organization and secured leadership support to help us successfully complete the audit.”&lt;/p&gt;&lt;p&gt;Verifying the security and privacy controls of the platform through pooled audits is one way Google Cloud maintains the commitment to being the industry’s most &lt;a href="https://cloud.google.com/blog/products/identity-security/delivering-the-industrys-most-trusted-cloud"&gt;trusted cloud&lt;/a&gt;. We continue to partner with customers to meet their evolving regulatory compliance requirements. To learn more about Google Cloud Trust &amp;amp; Compliance, visit our &lt;a href="http://cloud.google.com/security/compliance"&gt;Compliance resource center&lt;/a&gt;.&lt;/p&gt;&lt;/div&gt;
&lt;div class="block-related_article_tout"&gt;





&lt;div class="uni-related-article-tout h-c-page"&gt;
  &lt;section class="h-c-grid"&gt;
    &lt;a href="https://cloud.google.com/blog/products/compliance/google-completes-annual-pooled-audit-with-ccag-completely-remote/"
       data-analytics='{
                       "event": "page interaction",
                       "category": "article lead",
                       "action": "related article - inline",
                       "label": "article: {slug}"
                     }'
       class="uni-related-article-tout__wrapper h-c-grid__col h-c-grid__col--8 h-c-grid__col-m--6 h-c-grid__col-l--6
        h-c-grid__col--offset-2 h-c-grid__col-m--offset-3 h-c-grid__col-l--offset-3 uni-click-tracker"&gt;
      &lt;div class="uni-related-article-tout__inner-wrapper"&gt;
        &lt;p class="uni-related-article-tout__eyebrow h-c-eyebrow"&gt;Related Article&lt;/p&gt;

        &lt;div class="uni-related-article-tout__content-wrapper"&gt;
          &lt;div class="uni-related-article-tout__image-wrapper"&gt;
            &lt;div class="uni-related-article-tout__image" style="background-image: url('')"&gt;&lt;/div&gt;
          &lt;/div&gt;
          &lt;div class="uni-related-article-tout__content"&gt;
            &lt;h4 class="uni-related-article-tout__header h-has-bottom-margin"&gt;Earning customer trust through a pandemic: delivering our 2020 CCAG pooled audit&lt;/h4&gt;
            &lt;p class="uni-related-article-tout__body"&gt;Completely remote audit makes Google Cloud the only cloud service provider to complete 2020 annual pooled audit with CCAG.&lt;/p&gt;
            &lt;div class="cta module-cta h-c-copy  uni-related-article-tout__cta muted"&gt;
              &lt;span class="nowrap"&gt;Read Article
                &lt;svg class="icon h-c-icon" role="presentation"&gt;
                  &lt;use xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#mi-arrow-forward"&gt;&lt;/use&gt;
                &lt;/svg&gt;
              &lt;/span&gt;
            &lt;/div&gt;
          &lt;/div&gt;
        &lt;/div&gt;
      &lt;/div&gt;
    &lt;/a&gt;
  &lt;/section&gt;
&lt;/div&gt;

&lt;/div&gt;</description><pubDate>Tue, 05 Apr 2022 16:00:00 +0000</pubDate><guid>https://cloud.google.com/blog/products/identity-security/google-cloud-completed-the-ccag-pooled-audit-for-2021/</guid><category>Compliance</category><category>Google Cloud in Europe</category><category>Security &amp; Identity</category><og xmlns:og="http://ogp.me/ns#"><type>article</type><title>Verifying the security and privacy controls of Google Cloud: 2021 CCAG customer pooled audit</title><description></description><site_name>Google</site_name><url>https://cloud.google.com/blog/products/identity-security/google-cloud-completed-the-ccag-pooled-audit-for-2021/</url></og><author xmlns:author="http://www.w3.org/2005/Atom"><name>Rani Urbas</name><title>Head of Enterprise Trust, Google Cloud</title><department></department><company></company></author></item><item><title>An update on Google Cloud’s commitments to E.U. businesses in light of the new E.U.-U.S. data transfer framework</title><link>https://cloud.google.com/blog/products/identity-security/how-google-cloud-helps-eu-companies-under-new-data-transfer-rules/</link><description>&lt;div class="block-paragraph"&gt;&lt;p&gt;Last week, the European Commission and U.S. Government &lt;a href="https://www.whitehouse.gov/briefing-room/statements-releases/2022/03/25/united-states-and-european-commission-joint-statement-on-trans-atlantic-data-privacy-framework/" target="_blank"&gt;agreed&lt;/a&gt; on a new E.U.-U.S. data transfer framework. Earlier today, Google shared that it &lt;a href="https://blog.google/outreach-initiatives/public-policy/trans-atlantic-data-privacy-framework-building-long-term/" target="_blank"&gt;welcomes&lt;/a&gt; these efforts by the U.S. government to enhance privacy protections for E.U. data and facilitate trusted transatlantic data flows. For our Google Cloud customers, we intend to make the protections offered by this new framework available once it is implemented.&lt;br/&gt;&lt;/p&gt;&lt;p&gt;Last year, we &lt;a href="https://cloud.google.com/blog/products/compliance/how-google-cloud-helps-customers-stay-current-with-gdpr"&gt;reaffirmed&lt;/a&gt; our commitment to E.U. businesses after the European Data Protection Board (EDPB) issued its Recommendations on Supplementary Measures, following Europe’s top court ruling invalidating the E.U.-U.S. Privacy Shield Framework and upholding the E.U. Standard Contractual Clauses (SCCs).&lt;/p&gt;&lt;p&gt;Since then, we've continued to help our customers meet stringent data protection requirements by offering industry-leading technical controls, contractual commitments, and risk assessment resources. We've also continued our &lt;a href="https://blog.google/around-the-globe/google-europe/its-time-for-a-new-eu-us-data-transfer-framework/" target="_blank"&gt;advocacy&lt;/a&gt; to create more legal certainty around transatlantic data flows.&lt;/p&gt;&lt;p&gt;Today, we would like to provide an update to our customers on this work. &lt;/p&gt;&lt;h3&gt;A customer-controlled cloud &lt;/h3&gt;&lt;p&gt;Google Cloud&lt;sup&gt;1&lt;/sup&gt; continues to be a leading provider of technical and security controls to help meet customers’ data protection requirements, as well as their increasing data sovereignty expectations. &lt;/p&gt;&lt;p&gt;We are &lt;a href="https://cloud.google.com/blog/products/identity-security/helping-build-the-digital-future-on-europes-terms"&gt;committed to building our Cloud on Europe's terms&lt;/a&gt;, including by offering customer-managed encryption and data localization for a growing list of key products and collaborating with local partners to provide the highest levels of sovereignty, all while enabling the next wave of growth and transformation for Europe’s businesses and organizations.&lt;/p&gt;&lt;h3&gt;Google Cloud Platform &lt;/h3&gt;&lt;p&gt;We recently &lt;a href="https://cloud.google.com/blog/products/identity-security/meet-data-sovereignty-requirements-with-assured-workloads-for-eu-on-google-cloud?utm_source=POLITICO.EU&amp;amp;utm_campaign=17703213dd-EMAIL_CAMPAIGN_2022_02_03_06_07&amp;amp;utm_medium=email&amp;amp;utm_term=0_10959edeb5-17703213dd-190629740"&gt;announced&lt;/a&gt; the general availability of &lt;a href="https://cloud.google.com/assured-workloads"&gt;Assured Workloads for the E.U.&lt;/a&gt; This product helps Google Cloud Platform (GCP) customers protect their data by allowing them to:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;Store their data in their choice of E.U. Google Cloud region(s)&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;Ensure that only E.U. persons – located in the E.U. – have access to the data and provide customer support &lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;Deploy cryptographic control for data access, including &lt;a href="https://cloud.google.com/bigtable/docs/cmek?hl=en"&gt;customer-managed encryption keys&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Cloud External Key Manager (EKM) enables customers to encrypt data in a variety of services with keys that are stored and managed in a third-party key management system deployed outside of Google’s infrastructure. Google Cloud continues to be the only cloud provider to enable customers to store and manage encryption keys for cloud-resident data outside the provider's infrastructure with customer’s control over decryption based on specific justifications, including government access requests. &lt;/p&gt;&lt;p&gt;&lt;a href="https://cloud.google.com/blog/products/identity-security/control-access-to-gcp-data-with-key-access-justifications"&gt;Key Access Justifications&lt;/a&gt; greatly advances the control that GCP customers have over their data by giving customers a justification every time their externally hosted keys have to be used to decrypt data. &lt;a href="https://cloud.google.com/cloud-provider-access-management/access-approval/docs/overview"&gt;Signed Access Approval&lt;/a&gt; (SAA) adds a layer of extra assurance that requires explicit customer consent for any administrative access to customer data or configurations. &lt;/p&gt;&lt;p&gt;Google Cloud’s &lt;a href="https://cloud.google.com/confidential-computing"&gt;Confidential Computing portfolio&lt;/a&gt; is a breakthrough technology that allows customers to encrypt their most sensitive data in the cloud while in-use. &lt;a href="https://cloud.google.com/blog/products/identity-security/ubiquitous-data-encryption-on-google-cloud"&gt;Ubiquitous Data Encryption&lt;/a&gt; further extends data protection by providing cryptographic protection for this data at-rest, in-transit, and in-use. The keys used to encrypt customer data outside of GCP using Cloud EKM are securely shared with applications operating within Confidential environments. &lt;/p&gt;&lt;h3&gt;Google Workspace&lt;/h3&gt;&lt;p&gt;Our Google Workspace (including Workspace for Education) customers can choose to store their &lt;a href="https://support.google.com/a/answer/9223653?visit_id=637419430042474071-3052712775&amp;amp;rd=1" target="_blank"&gt;covered data&lt;/a&gt; in Europe. Additionally, with Client-Side Encryption, we &lt;a href="https://cloud.google.com/blog/products/workspace/new-google-workspace-security-features"&gt;offer&lt;/a&gt; customers direct control of encryption keys and the identity service they choose to access those keys. With Client-Side Encryption, customer data is indecipherable to Google, while users can continue to take advantage of Google’s native web-based collaboration, access content on mobile devices, and share encrypted files externally. Client-Side Encryption is currently available in Public Beta for &lt;a href="https://cloud.google.com/blog/products/workspace/new-google-workspace-security-features"&gt;Google Drive&lt;/a&gt;, Docs, Sheets, and Slides, and we plan to extend it to Gmail, Calendar and Meet. Additionally, customers can also benefit by choosing third party solutions that offer similar encryption capabilities with select Google Workspace services.&lt;/p&gt;&lt;h3&gt;Legal Basis for International Data Transfers&lt;/h3&gt;&lt;p&gt;We &lt;a href="https://cloud.google.com/blog/products/compliance/google-cloud-approach-to-implementing-eu-sccs"&gt;updated&lt;/a&gt; our data processing terms for &lt;a href="https://cloud.google.com/terms/data-processing-terms"&gt;GCP&lt;/a&gt; and &lt;a href="https://workspace.google.com/terms/dpa_terms.html" target="_blank"&gt;Google Workspace and Cloud Identity&lt;/a&gt; to reflect various modules of the new &lt;a href="https://cloud.google.com/terms/sccs"&gt;E.U. Standard Contractual Clauses&lt;/a&gt; (SCCs) approved by the European Commission on June 4, 2021, as well as separate U.K. SCCs. &lt;/p&gt;&lt;p&gt;Google Cloud plans to adopt the new E.U.-U.S. data transfer framework and offer it as a transfer solution to our cloud customers, as further detailed in our data processing terms.&lt;/p&gt;&lt;h3&gt;Advocacy and Additional Helpful Resources&lt;/h3&gt;&lt;p&gt;We have adopted the &lt;a href="https://trustedcloudprinciples.com/principles/" target="_blank"&gt;Trusted Cloud Principles&lt;/a&gt; with industry peers to demonstrate our commitments to protect the rights of our Google Cloud customers. We will continue to support the ongoing work of the Organisation for Economic Co-operation and Development on government access to data and the negotiation of CLOUD Act Agreements — including between the U.S. and E.U. — as vehicles for surveillance reform. &lt;/p&gt;&lt;p&gt;We will continue to publish additional materials on our &lt;a href="https://cloud.google.com/privacy"&gt;Cloud Privacy Resource Center&lt;/a&gt;, such as our &lt;a href="https://services.google.com/fh/files/misc/safeguards_for_international_data_transfers_with_google_cloud.pdf" target="_blank"&gt;whitepaper&lt;/a&gt; on safeguards for international data transfers with Google Cloud.&lt;/p&gt;&lt;p&gt;Millions of organizations with users in Europe rely on our cloud services to run their businesses every day, and we remain steadfastly committed to helping them meet their regulatory requirements by maintaining a diverse set of compliance tools.&lt;/p&gt;&lt;hr/&gt;&lt;p&gt;&lt;i&gt;&lt;sup&gt;1. Google Cloud: &lt;a href="https://workspace.google.com/" target="_blank"&gt;Google Workspace&lt;/a&gt; (including &lt;a href="https://edu.google.com/intl/ALL_us/products/workspace-for-education/" target="_blank"&gt;Google Workspace for Education&lt;/a&gt;) and &lt;a href="https://cloud.google.com/"&gt;Google Cloud Platform&lt;/a&gt; (GCP)&lt;/sup&gt;&lt;/i&gt;&lt;br/&gt;&lt;/p&gt;&lt;/div&gt;</description><pubDate>Mon, 28 Mar 2022 23:00:00 +0000</pubDate><guid>https://cloud.google.com/blog/products/identity-security/how-google-cloud-helps-eu-companies-under-new-data-transfer-rules/</guid><category>Compliance</category><category>Google Cloud in Europe</category><category>Security &amp; Identity</category><og xmlns:og="http://ogp.me/ns#"><type>article</type><title>An update on Google Cloud’s commitments to E.U. businesses in light of the new E.U.-U.S. data transfer framework</title><description></description><site_name>Google</site_name><url>https://cloud.google.com/blog/products/identity-security/how-google-cloud-helps-eu-companies-under-new-data-transfer-rules/</url></og><author xmlns:author="http://www.w3.org/2005/Atom"><name>Marc Crandall</name><title>Director and Global Head of Privacy, Google Cloud</title><department></department><company></company></author><author xmlns:author="http://www.w3.org/2005/Atom"><name>Nathaly Rey</name><title>Director, Global Regulatory Affairs, Google Cloud</title><department></department><company></company></author></item><item><title>How technology is forging the foundation for more efficient, transparent and secure financial markets</title><link>https://cloud.google.com/blog/topics/financial-services/building-the-financial-markets-foundation-for-the-future/</link><description>&lt;div class="block-paragraph"&gt;&lt;p&gt;Financial markets were among the first to adopt new technologies, and that has certainly been true of the derivatives markets, which were early adopters of electronic trading. Going forward, new capabilities will transform the way industry participants communicate, analyze, and trade. &lt;/p&gt;&lt;p&gt;I sat down with Google Cloud’s Phil Moyer and former SEC Commissioner, Troy Paredes, for a fireside chat at &lt;a href="https://www.fia.org/events/international-futures-industry-conference" target="_blank"&gt;FIA Boca 2022&lt;/a&gt; to discuss the future of markets and policy, the new technologies that are already paving the way for greater speed and transparency, and how cloud can help promote greater resiliency, performance, and security to enable the long-term vision for the market. The following is a summary of our discussion.&lt;/p&gt;&lt;/div&gt;
&lt;div class="block-video"&gt;



&lt;div class="article-module article-video "&gt;
  &lt;figure&gt;
    &lt;a class="h-c-video h-c-video--marquee"
      href="https://youtube.com/watch?v=Yr_PrM_uWfU"
      data-glue-modal-trigger="uni-modal-Yr_PrM_uWfU-"
      data-glue-modal-disabled-on-mobile="true"&gt;

      
        &lt;img src="//img.youtube.com/vi/Yr_PrM_uWfU/maxresdefault.jpg"
             alt="Originally hosted at FIA Boca 2022, this fireside chat focuses on the future of markets and policy, the new technologies that are already paving the way for greater speed and transparency, and how cloud can help promote greater resiliency, performance and security to enable the long-term vision for the market."/&gt;
      
      &lt;svg role="img" class="h-c-video__play h-c-icon h-c-icon--color-white"&gt;
        &lt;use xlink:href="#mi-youtube-icon"&gt;&lt;/use&gt;
      &lt;/svg&gt;
    &lt;/a&gt;

    
  &lt;/figure&gt;
&lt;/div&gt;

&lt;div class="h-c-modal--video"
     data-glue-modal="uni-modal-Yr_PrM_uWfU-"
     data-glue-modal-close-label="Close Dialog"&gt;
   &lt;a class="glue-yt-video"
      data-glue-yt-video-autoplay="true"
      data-glue-yt-video-height="99%"
      data-glue-yt-video-vid="Yr_PrM_uWfU"
      data-glue-yt-video-width="100%"
      href="https://youtube.com/watch?v=Yr_PrM_uWfU"
      ng-cloak&gt;
   &lt;/a&gt;
&lt;/div&gt;

&lt;/div&gt;
&lt;div class="block-paragraph"&gt;&lt;h3&gt;The current state of cloud technology&lt;/h3&gt;&lt;p&gt;When it comes to technology adoption, we’re seeing the market and participants adopt cloud technologies, and increasingly, machine learning (ML) on a wider scale. Cloud technology allows for easier, faster, and much more secure experimentation with large datasets and ML.&lt;/p&gt;&lt;p&gt;A recent Google sponsored &lt;a href="https://services.google.com/fh/files/misc/the_future_of_market_data_in_the_cloud_paper_1.pdf" target="_blank"&gt;study&lt;/a&gt; by Coalition Greenwich (September, 2021) showed that more than 93% of trading systems, exchanges, and data providers are in some way providing services on the cloud. The same study, revealed that about 72% of the financial industry across the buy side and sell side, intend to consume public cloud-data based market data within the next 12 months.&lt;/p&gt;&lt;p&gt;Data-driven decision-making and risk management have always been, and continue to remain, the cornerstones of the financial markets. Over time, technology innovation has facilitated access to better insights from data, and therefore, better decision-making and the ability to manage risk. That expectation is now mainstream, and will continue to grow in sophistication. &lt;/p&gt;&lt;h3&gt;The multi-phased technology trajectory&lt;/h3&gt;&lt;p&gt;The movement of exchanges to the cloud will occur in a “crawl-walk-run” fashion, with low-hanging fruits the first to be picked in the near term while bigger, paradigmatic changes will occur over the medium and long term. Some organizations are starting all three stages simultaneously, understanding that each will move at an independent cadence.&lt;/p&gt;&lt;p&gt;The “crawl” phase is one in which foundations are built, starting with organizations moving data to the cloud and experimenting with some degree of analytics. It’s one of the most important phases because it’s where the opportunity to increase transparency and risk management takes shape. &lt;/p&gt;&lt;p&gt;In moving to the cloud, the infrastructure – which in the past relied on a combination of people, processes, and some technology – becomes the code that runs applications. This early phase is key to empowering organizations to shift to a cloud-based, agile-first operating model that makes it easier and more seamless to launch new products in the future, including by freeing up people and resources from IT management to more mission-focused work.&lt;/p&gt;&lt;p&gt;Establishing the cloud operating model simplifies the “walk” and “run” phases where compliance is more automated, latency-sensitive applications are more readily available, and the next generation of exchanges, market participants, and regulators is better prepared to meet future challenges.&lt;/p&gt;&lt;p&gt;The “walk” phase is where much of the innovation happens. Exchanges are making significant progress in leveraging foundational data decisions in the “crawl” phase and innovations in the cloud to improve settlement, clearing, risk management, collateral management, and compliance, and launch new products. &lt;/p&gt;&lt;p&gt;And finally, the “run” phase is where organizations will start to move the latency-sensitive markets to the cloud, as the markets increasingly will demand low-latency and high performance along with transparency and analytics to solve historical obstacles to market access. &lt;/p&gt;&lt;h3&gt;Opportunities for both regulators and market participants&lt;/h3&gt;&lt;p&gt;Any time significant technological change takes place, regulators explore its implications, particularly with respect to their ability to meet their regulatory objectives. &lt;/p&gt;&lt;p&gt;Increasingly, we are seeing technological change driving more opportunities for regulators and market participants alike. Such changes may also allow better protection of the marketplace, with greater integrity and transparency.&lt;/p&gt;&lt;p&gt;Over time, regulatory regimes – rules, regulations, statutes, interpretations, and guidance – will also adjust to new technologies, both benefiting the marketplace and advancing regulatory goals.&lt;/p&gt;&lt;p&gt;As one example, the cloud is increasing the ability to meet compliance obligations by allowing compliance to be built into transactions. Moreover, predicated on the vision of real-time regulatory reporting, and given the pace of technological change in the marketplace over the last several years, various regulators have been using more advanced analytics. This trend will continue to help them more effectively and efficiently meet their objectives, and monitor and meet the expectations they have for the entire market.&lt;/p&gt;&lt;h3&gt;Machine learning’s role in the financial markets&lt;/h3&gt;&lt;p&gt;Google Cloud’s head of AI and Industry Solutions, Andrew Moore, said that ML will be doing three key things for us in the next 10 years: giving us meaning, providing concierge services, and serving as a guardian. Extracting information that is critical to investor decision-making can be extremely important. With more data than ever, ML can increase the ability to process it while also becoming more accessible in the cloud and better supporting regulatory objectives.&lt;/p&gt;&lt;p&gt;The technology will likely manifest in trading and anti-money laundering activities as they relate market functions, as well as managing a wide variety of risks – supporting the interests of both investors and regulators in terms of decision-making, surveillance, and protections.&lt;/p&gt;&lt;p&gt;Rather than taking individuals out of the equation, the digitization of markets, assets, and guard rails combined with ML will allow people to focus their expertise in different ways to achieve key objectives. &lt;/p&gt;&lt;h3&gt;Building the market foundation for the future&lt;/h3&gt;&lt;p&gt;The goals of operational resiliency, security, and privacy will continue to be critical for building the market foundation for both participants and regulators. While technology promises to create advantages in concrete, tangible ways, it will be important to scrutinize potential risks and concerns. &lt;/p&gt;&lt;p&gt;Priority one for technology providers is to build an environment of trustless security, including encryption at motion and encryption at rest, ensuring that markets are operationally resilient while instilling confidence for any exchange that runs on top of that infrastructure. Multicloud architectures and approaches are likely also to be part of the solution for operational resilience.&lt;/p&gt;&lt;p&gt;Throughout time, liquidity has been the outcome of improved access, transparency, and security. Technology providers are responding by sharing both the responsibility for, and fate of, the markets of the future to build an efficient, faster, and more transparent and secure financial industry. &lt;/p&gt;&lt;p&gt;You can learn more about our approach in our newest white paper, &lt;a href="https://services.google.com/fh/files/misc/building_the_financial_markets_foundation_for_the_future_wp.pdf" target="_blank"&gt;&lt;b&gt;Building the financial markets foundation for the future&lt;/b&gt;&lt;/a&gt;.&lt;/p&gt;&lt;/div&gt;
&lt;div class="block-related_article_tout_external"&gt;





&lt;div class="uni-related-article-tout h-c-page"&gt;
  &lt;section class="h-c-grid"&gt;
    &lt;a href=""
       data-analytics='{
                       "event": "page interaction",
                       "category": "article lead",
                       "action": "related article - inline",
                       "label": "article: {slug}"
                     }'
       class="uni-related-article-tout__wrapper h-c-grid__col h-c-grid__col--8 h-c-grid__col-m--6 h-c-grid__col-l--6
        h-c-grid__col--offset-2 h-c-grid__col-m--offset-3 h-c-grid__col-l--offset-3 uni-click-tracker"&gt;
      &lt;div class="uni-related-article-tout__inner-wrapper"&gt;
        &lt;p class="uni-related-article-tout__eyebrow h-c-eyebrow"&gt;Related Article&lt;/p&gt;

        &lt;div class="uni-related-article-tout__content-wrapper"&gt;
          &lt;div class="uni-related-article-tout__image-wrapper"&gt;
            &lt;div class="uni-related-article-tout__image" style="background-image: url('')"&gt;&lt;/div&gt;
          &lt;/div&gt;
          &lt;div class="uni-related-article-tout__content"&gt;
            &lt;h4 class="uni-related-article-tout__header h-has-bottom-margin"&gt;&lt;/h4&gt;
            &lt;p class="uni-related-article-tout__body"&gt;&lt;/p&gt;
            &lt;div class="cta module-cta h-c-copy  uni-related-article-tout__cta muted"&gt;
              &lt;span class="nowrap"&gt;Read Article
                &lt;svg class="icon h-c-icon" role="presentation"&gt;
                  &lt;use xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#mi-arrow-forward"&gt;&lt;/use&gt;
                &lt;/svg&gt;
              &lt;/span&gt;
            &lt;/div&gt;
          &lt;/div&gt;
        &lt;/div&gt;
      &lt;/div&gt;
    &lt;/a&gt;
  &lt;/section&gt;
&lt;/div&gt;

&lt;/div&gt;</description><pubDate>Wed, 23 Mar 2022 13:00:00 +0000</pubDate><guid>https://cloud.google.com/blog/topics/financial-services/building-the-financial-markets-foundation-for-the-future/</guid><category>Compliance</category><category>Financial Services</category><media:content height="540" url="https://storage.googleapis.com/gweb-cloudblog-publish/images/FIA_Boca_22.max-600x600.jpg" width="540"></media:content><og xmlns:og="http://ogp.me/ns#"><type>article</type><title>How technology is forging the foundation for more efficient, transparent and secure financial markets</title><description></description><image>https://storage.googleapis.com/gweb-cloudblog-publish/images/FIA_Boca_22.max-600x600.jpg</image><site_name>Google</site_name><url>https://cloud.google.com/blog/topics/financial-services/building-the-financial-markets-foundation-for-the-future/</url></og><author xmlns:author="http://www.w3.org/2005/Atom"><name>Behnaz Kibria</name><title>Director, Government Affairs and Public Policy, Google Cloud</title><department></department><company></company></author></item><item><title>Accelerating Government Compliance with Google Cloud’s Professional Service Organization</title><link>https://cloud.google.com/blog/topics/public-sector/accelerating-government-compliance-google-clouds-professional-service-organization/</link><description>&lt;div class="block-paragraph"&gt;&lt;p&gt;Did you know that by 2025, enterprise IT spending on public cloud computing will overtake traditional IT spending? In fact, 51% of IT spend in application software, infrastructure software, business process services, and system infrastructure will transition to the public cloud, compared to 41% in 2022&lt;sub&gt;1.&lt;/sub&gt;. As enterprises continue to rapidly shift to the cloud, government agencies must prioritize and accelerate security and compliance implementation. &lt;/p&gt;&lt;p&gt;In May 2021, the White House issued an &lt;a href="https://www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/executive-order-on-improving-the-nations-cybersecurity/" target="_blank"&gt;Executive Order&lt;/a&gt; requiring US Federal agencies to accelerate cloud adoption, embrace security best practices, develop plans to implement Zero Trust architectures, and map implementation frameworks to FedRAMP. The Administration’s focus on secure cloud adoption marks a critical shift to prioritizing cybersecurity at scale. Google Cloud’s Public Sector &lt;a href="https://cloud.google.com/consulting"&gt;Professional Services Organization&lt;/a&gt; (PSO) has committed to helping customers meet security and compliance requirements in the cloud through specialized consulting engagements. &lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;h3&gt;Accelerating Authority to Operate (ATO)&lt;/h3&gt;The Federal Risk and Authorization Management Program (FedRAMP) was established in 2011 as a government-wide program that promotes the adoption of secure cloud services across the federal government. FedRAMP provides a standardized approach to security and risk assessment for cloud technologies and federal agencies. US Federal agencies are required to utilize and implement FedRAMP cloud service offerings as part of the “Cloud First” &lt;a href="https://obamawhitehouse.archives.gov/sites/default/files/omb/assets/egov_docs/federal-cloud-computing-strategy.pdf" target="_blank"&gt;federal cloud computing strategy&lt;/a&gt;.&lt;p&gt;&lt;/p&gt;&lt;p&gt;While Google Cloud provides a &lt;a href="https://marketplace.fedramp.gov/#!/product/google-services-google-cloud-platform-products-and-underlying-infrastructure/versus/google-workspace?sort=productName&amp;amp;productNameSearch=Google" target="_blank"&gt;FedRAMP-authorized&lt;/a&gt; cloud services platform and a robust catalog of FedRAMP-approved &lt;a href="https://cloud.google.com/security/compliance/fedramp"&gt;products and services&lt;/a&gt; (92 services and counting), customers are still tasked with achieving Agency ATO for the products and services they use, and Google Cloud provides many resources to assist customers with this journey. Google Cloud’s FedRAMP package can be accessed by completing the &lt;a href="https://www.fedramp.gov/assets/resources/documents/Agency_Package_Request_Form.pdf" target="_blank"&gt;FedRAMP Package Access Request Form&lt;/a&gt; and submitting it to &lt;a href="mailto:info@fedramp.gov"&gt;info@fedramp.gov&lt;/a&gt;. Additionally, customers can use Google’s &lt;a href="https://services.google.com/fh/files/blogs/google-cloud-nist-800-53-accelerator-final.zip" target="_blank"&gt;NIST 800-53 ATO Accelerator&lt;/a&gt; as a starting point for documenting control implementation. Finally, Google Cloud’s Public Sector PSO offers the following strategic consulting engagements to help customers streamline the Agency ATO process.&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;&lt;b&gt;Cloud Discover:&lt;/b&gt; FedRAMP is a six-week interactive workshop to support customers that are just getting started with the ATO process on Google Cloud. Customers are educated on FedRAMP fundamentals, Google’s security and compliance posture, and how to approach ATO on Google Cloud. Through deep-dive interviews and design sessions, PSO helps customers craft an actionable ATO plan, assess FedRAMP readiness, and develop a conceptual ATO boundary. This engagement helps organizations establish a clear understanding and roadmap for FedRAMP ATO on Google Cloud.&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;&lt;b&gt;FedRAMP Security Review&lt;/b&gt; is a ten to twelve week engagement that aids customers in FedRAMP operational readiness. PSO consultants perform detailed FedRAMP architecture reviews to identify potential gaps in NIST 800-53 security control implementation and Google Cloud secure architecture best practices. Findings from the security reviews are shared with the customer along with configuration guidance and recommendations. This engagement helps organizations prepare for the third-party or independent security assessment that is required for FedRAMP ATO.&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;&lt;b&gt;Cloud Deploy&lt;/b&gt;: FedRAMP is a multi-month engagement designed to help customers document the details of their FedRAMP System Security Plan (SSP) and corresponding NIST 800-53 security controls, in preparation for Agency ATO on Google Cloud at FedRAMP Low, Moderate, or High. PSO collaborates with customers to develop a detailed technical infrastructure design document and security control matrix capturing evidence of the FedRAMP system architecture, security control implementation, data flows and system components. PSO can also partner with a third-party assessment organization (3PAO) or an independent assessor (IA) to support customer efforts for FedRAMP security assessment. This engagement helps customer system owners prepare for Agency ATO assessment and package submission.&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;h3&gt;Developing a Zero Trust Strategy&lt;/h3&gt;In addition to providing FedRAMP enablement, Public Sector PSO has partnered with the Google Cloud Chief Information Security Officer (CISO) team to assist organizations with developing a zero trust architecture and strategy.&lt;p&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;&lt;a href="https://services.google.com/fh/files/blogs/google_cloud_zero_trust_foundations_overview.pdf" target="_blank"&gt;&lt;b&gt;Zero Trust Foundations&lt;/b&gt;&lt;/a&gt; is a seven-week engagement co-delivered by Google Cloud’s CISO and PSO teams. CISO and PSO educate customers on zero trust fundamentals, Google’s journey to zero trust through &lt;a href="https://cloud.google.com/beyondcorp"&gt;BeyondCorp&lt;/a&gt;, and defense in depth best practices. The CISO team walks customers through a Zero Trust Assessment (ZTA) to understand the organization’s current security posture and maturity. Insights from the ZTA enable the CISO team to work with the customer to identify an ideal first-mover workload for zero trust adoption. Following the CISO ZTA, PSO facilitates a deep-dive Zero Trust Workshop (ZTW), collaborating with key customer stakeholders to develop a &lt;a href="https://csrc.nist.gov/publications/detail/sp/800-207/final" target="_blank"&gt;NIST 800-207&lt;/a&gt; aligned, cloud-agnostic zero trust architecture for the identified first-mover workload. The zero trust architecture is part of a comprehensive zero trust strategy deliverable that is based on focus areas called out in the Office of Management and Budget (OMB) &lt;a href="https://www.whitehouse.gov/omb/briefing-room/2022/01/26/office-of-management-and-budget-releases-federal-strategy-to-move-the-u-s-government-towards-a-zero-trust-architecture/" target="_blank"&gt;Federal Zero Trust Strategy&lt;/a&gt; released January 2022. &lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;&lt;h3&gt;Scaling Secure Cloud Adoption with PSO&lt;/h3&gt;&lt;p&gt;Public Sector PSO enables customer success by sharing our technical expertise, providing cloud strategy, implementation guidance, training and enablement using our proven &lt;a href="https://www.youtube.com/watch?v=DoopnS8-HbM" target="_blank"&gt;methodology&lt;/a&gt;. As enterprise IT, operations, and organizational models continue to evolve, our goal is to help government agencies accelerate their security and compliance journeys in the cloud.  To learn more about the work we are doing with the federal government, visit &lt;a href="https://cloud.google.com/solutions/federal-government"&gt;cloud.google.com/solutions/federal-government&lt;/a&gt;. &lt;/p&gt;&lt;br/&gt;&lt;p&gt;&lt;sup&gt;1&lt;/sup&gt; &lt;a href="https://www.gartner.com/en/newsroom/press-releases/2022-02-09-gartner-says-more-than-half-of-enterprise-it-spending" target="_blank"&gt;Gartner Says More Than Half of Enterprise IT Spending in Key Market Segments Will Shift to the Cloud by 2025&lt;/a&gt;&lt;/p&gt;&lt;/div&gt;</description><pubDate>Mon, 21 Mar 2022 17:00:00 +0000</pubDate><guid>https://cloud.google.com/blog/topics/public-sector/accelerating-government-compliance-google-clouds-professional-service-organization/</guid><category>Compliance</category><category>Training and Certifications</category><category>Public Sector</category><og xmlns:og="http://ogp.me/ns#"><type>article</type><title>Accelerating Government Compliance with Google Cloud’s Professional Service Organization</title><description></description><site_name>Google</site_name><url>https://cloud.google.com/blog/topics/public-sector/accelerating-government-compliance-google-clouds-professional-service-organization/</url></og><author xmlns:author="http://www.w3.org/2005/Atom"><name>Adrienne Wilkins</name><title>Strategic Cloud Advisor, Public Sector</title><department>Professional Services</department><company>Google Cloud</company></author></item><item><title>Accelerate Google Cloud vendor due diligence by leveraging third party risk management providers</title><link>https://cloud.google.com/blog/products/compliance/trpm-providers-speed-vendor-due-diligence-for-google-cloud/</link><description>&lt;div class="block-paragraph"&gt;&lt;p&gt;As organizations accelerate adoption of cloud services to deliver innovative solutions and experiences for their customers, risk and compliance teams are adjusting their due diligence programs to better understand and manage the risks associated with outsourcing of business critical workloads. At the core of these efforts is protecting sensitive data and applications in accordance with internal policies and best practices, while maintaining compliance with complex global regulatory requirements, frameworks, and guidelines. Cloud auditability, control monitoring, and continuous cloud risk assessment are prerequisites to building trust and regulator confidence in cloud services that underpin core business processes and apps. As a result, organizations are increasingly dedicating resources to perform comprehensive assessments of relevant cloud policies, processes, and technical implementations, and these resources are always looking for ways to increase breadth and depth of their provider risk assessments while optimizing the costs to the organization.&lt;/p&gt;&lt;p&gt;Here at Google Cloud we are committed to being the industry’s most &lt;a href="https://cloud.google.com/blog/products/identity-security/delivering-the-industrys-most-trusted-cloud"&gt;trusted cloud&lt;/a&gt; and our &lt;a href="https://cloud.google.com/security/gcat"&gt;Google Cybersecurity Action Team&lt;/a&gt; works closely with customers to help them meet their due diligence, risk management, and regulatory compliance needs. One way we help our customers scale and accelerate their cloud assessments is by collaborating with third party risk management (TPRM) providers. These organizations provide independent due diligence services and platforms to help automate vendor risk management based on the data they collect and provide. We enable the TPRM assessors to examine the controls present in our infrastructure and operations. Based on their observations and assessments, TPRM providers develop independent and unbiased audit reports that can be shared directly with customers.&lt;/p&gt;&lt;p&gt;Some of the benefits of TPRM solutions for Google Cloud customers include:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;&lt;b&gt;Comprehensive and regular assessments&lt;/b&gt;: TPRM providers perform periodic, multi-tier, multidimensional assessments of Google Cloud’s platform and services on a regular schedule. As part of these assessments, TPRM providers inspect hundreds of security, privacy, business continuity, and operational resiliency controls aligned with industry standards and regulations such as NIST SP 800-53, NIST CSF, ISO 27001, PCI-DSS, HIPAA, CMMC, SOC2, CSA STAR, etc. The information provided in these in-depth assessments help support Google Cloud customers’ own assessment processes that underpin their efforts to meet complex regulatory compliance requirements when managing data and applications in the cloud.&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;&lt;b&gt;Efficient use of audit resources&lt;/b&gt;: TPRM providers facilitate an exchange of risk assessments between Google Cloud and our customers, customizing the reports to the customer's compliance landscape. This helps streamline the vendor risk assessment process and decrease the regular effort required by both the customer as well as Google. By leveraging the broad scope and extensive fieldwork of these TPRM assessments, Google Cloud customers can accelerate their vendor due diligence and overall risk management processes.&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;&lt;b&gt;Access to independent cloud audit expertise&lt;/b&gt;: TPRM solutions provide customers with audit assessments and reports that are fully independent of Google Cloud. Additionally, customers have the opportunity to discuss their cloud controls, risk posture, and audit practice with a third party, experienced in auditing public cloud providers.&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Many Google Cloud customers already leverage the TPRM relationships we’ve established. Today, we work with industry leading TPRM providers such as &lt;a href="https://cloud.google.com/security/compliance/cybergrx"&gt;CyberGRX&lt;/a&gt;, &lt;a href="https://cloud.google.com/security/compliance/trusight"&gt;TruSight&lt;/a&gt;, and &lt;a href="https://cloud.google.com/security/compliance/ky3p"&gt;KY3P&lt;/a&gt; to deliver high-quality risk assessments for our customers globally. We are committed to continue to find effective, efficient solutions that can help customers meet customer risk management and regulatory compliance requirements. To learn more about Google Cloud Trust &amp;amp; Compliance, visit our &lt;a href="http://cloud.google.com/security/compliance"&gt;Compliance resource center&lt;/a&gt;.&lt;/p&gt;&lt;/div&gt;
&lt;div class="block-related_article_tout"&gt;





&lt;div class="uni-related-article-tout h-c-page"&gt;
  &lt;section class="h-c-grid"&gt;
    &lt;a href="https://cloud.google.com/blog/products/identity-security/cloud-ciso-perspectives-february-2022/"
       data-analytics='{
                       "event": "page interaction",
                       "category": "article lead",
                       "action": "related article - inline",
                       "label": "article: {slug}"
                     }'
       class="uni-related-article-tout__wrapper h-c-grid__col h-c-grid__col--8 h-c-grid__col-m--6 h-c-grid__col-l--6
        h-c-grid__col--offset-2 h-c-grid__col-m--offset-3 h-c-grid__col-l--offset-3 uni-click-tracker"&gt;
      &lt;div class="uni-related-article-tout__inner-wrapper"&gt;
        &lt;p class="uni-related-article-tout__eyebrow h-c-eyebrow"&gt;Related Article&lt;/p&gt;

        &lt;div class="uni-related-article-tout__content-wrapper"&gt;
          &lt;div class="uni-related-article-tout__image-wrapper"&gt;
            &lt;div class="uni-related-article-tout__image" style="background-image: url('https://storage.googleapis.com/gweb-cloudblog-publish/images/cybersecurity_action_team_jl2RU0c.max-500x500.jpg')"&gt;&lt;/div&gt;
          &lt;/div&gt;
          &lt;div class="uni-related-article-tout__content"&gt;
            &lt;h4 class="uni-related-article-tout__header h-has-bottom-margin"&gt;Cloud CISO Perspectives: February 2022&lt;/h4&gt;
            &lt;p class="uni-related-article-tout__body"&gt;Google Cloud CISO Phil Venables shares his thoughts on the latest security updates from the Google Cybersecurity Action Team.&lt;/p&gt;
            &lt;div class="cta module-cta h-c-copy  uni-related-article-tout__cta muted"&gt;
              &lt;span class="nowrap"&gt;Read Article
                &lt;svg class="icon h-c-icon" role="presentation"&gt;
                  &lt;use xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#mi-arrow-forward"&gt;&lt;/use&gt;
                &lt;/svg&gt;
              &lt;/span&gt;
            &lt;/div&gt;
          &lt;/div&gt;
        &lt;/div&gt;
      &lt;/div&gt;
    &lt;/a&gt;
  &lt;/section&gt;
&lt;/div&gt;

&lt;/div&gt;</description><pubDate>Tue, 08 Mar 2022 17:00:00 +0000</pubDate><guid>https://cloud.google.com/blog/products/compliance/trpm-providers-speed-vendor-due-diligence-for-google-cloud/</guid><category>Security &amp; Identity</category><category>Compliance</category><og xmlns:og="http://ogp.me/ns#"><type>article</type><title>Accelerate Google Cloud vendor due diligence by leveraging third party risk management providers</title><description></description><site_name>Google</site_name><url>https://cloud.google.com/blog/products/compliance/trpm-providers-speed-vendor-due-diligence-for-google-cloud/</url></og><author xmlns:author="http://www.w3.org/2005/Atom"><name>Rani Urbas</name><title>Head of Enterprise Trust, Google Cloud</title><department></department><company></company></author></item><item><title>Strengthening our European data sovereignty offerings with Assured Workloads for EU</title><link>https://cloud.google.com/blog/products/identity-security/meet-data-sovereignty-requirements-with-assured-workloads-for-eu-on-google-cloud/</link></item><item><title>Compliance Engineering - Continuous Compliance GCP case studies</title><link>https://cloud.google.com/blog/products/compliance/continuous-compliance-engineering-gcp-case-studies/</link><description>&lt;div class="block-paragraph"&gt;&lt;p&gt;Our &lt;a href="https://cloud.google.com/blog/products/identity-security/how-banks-can-engineer-compliance-into-their-cloud-systems"&gt;previous article&lt;/a&gt; provided tools and techniques to transform your productionalization process and make it ready for Cloud workloads. In this post, we will cover technical examples of GCP controls and how it can help your organization maintain your security and compliance posture in GCP.&lt;/p&gt;&lt;p&gt;In comparison to on-prem infrastructure, GCP is a highly integrated environment and provides out of the box capabilities to evidence a large variety of controls. The following cornerstones build the foundation of an effective control attestation:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;&lt;b&gt;Inventory Management&lt;/b&gt; - On-prem workloads frequently have discovery tools installed to understand what infrastructure components are actually deployed in the corporate IT environment. In GCP, every component has to be explicitly declared for it to exist. This accurate and real-time inventory is the basis for the below case studies to reach continuous compliance.&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;b&gt;Infrastructure as Code&lt;/b&gt; - All deployments and configuration in GCP should be implemented in machine readable instructions (such as &lt;a href="https://www.terraform.io/" target="_blank"&gt;Terraform&lt;/a&gt;) and as part of a CI/CD pipeline staging to higher level environments. The programmatic definition of infrastructure resources allows for efficient checking of the security posture before the deployment takes place (such as a misconfigured Google Cloud Storage bucket that would be exposed to the public Internet).&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;b&gt;Compliance as Code&lt;/b&gt; - The same is true for the implementation of policies. Programmatic definition, “Compliance as Code” should be used to automate the evidence-gathering and compliance-checking during the lifetime of the workload. &lt;a href="https://cloud.google.com/blog/products/identity-security/risk-and-compliance-as-code"&gt;Google Cloud’ Risk and Compliance as Code solution&lt;/a&gt; can help implement such a process based on best practices.&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Now let’s take a few controls out from the &lt;a href="https://cloudsecurityalliance.org/research/cloud-controls-matrix/" target="_blank"&gt;Cloud Security Alliance Cloud Controls Matrix (CSA CCM)&lt;/a&gt; and show how GCP helps you to fulfill them. &lt;/p&gt;&lt;h3&gt;Case Study - Log Key Lifecycle Management events&lt;/h3&gt;&lt;p&gt;Let’s have a look at a specific control from CSA CCM regarding log key lifecycle management:&lt;/p&gt;&lt;p&gt;&lt;i&gt;LOG-11 - Logging &amp;amp; Monitoring Transaction/Activity Logging - Log and monitor key lifecycle management events to enable auditing and reporting on usage of cryptographic keys.&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://cloud.google.com/security/key-management-deep-dive"&gt;Cloud Key Management Service&lt;/a&gt; (KMS) in combination with &lt;a href="https://cloud.google.com/security/key-management-deep-dive#541_cloud_audit_logs"&gt;Cloud Audit Logs&lt;/a&gt; records customer activities on the Key object, such as creating or destroying a key. Customers can define the retention period of the logs as well as access permissions. A log message would look like the following:&lt;/p&gt;&lt;/div&gt;
&lt;div class="block-code"&gt;&lt;dl&gt;
    &lt;dt&gt;code_block&lt;/dt&gt;
    &lt;dd&gt;&amp;lt;ListValue: [StructValue([(&amp;#x27;code&amp;#x27;, &amp;#x27;gcloud logging read &amp;quot;logName : projects/my-project/logs/cloudaudit.googleapis.com&amp;quot; --project=my-project\r\n\r\n[...]\r\n   permission: cloudkms.cryptoKeys.create\r\n    resource: projects/my-project/locations/us-central1/keyRings/sample-keyring\r\n    resourceAttributes:\r\n      name: projects/my-project/locations/us-central1/keyRings/sample-keyring/cryptoKeys/key-us\r\n      service: google.cloud.kms\r\n      type: google.cloud.kms.CryptoKey\r\n  methodName: CreateCryptoKey\r\n[...]&amp;#x27;), (&amp;#x27;language&amp;#x27;, &amp;#x27;&amp;#x27;), (&amp;#x27;caption&amp;#x27;, &amp;lt;wagtail.rich_text.RichText object at 0x7f3aa85614f0&amp;gt;)])]&amp;gt;&lt;/dd&gt;
&lt;/dl&gt;&lt;/div&gt;
&lt;div class="block-paragraph"&gt;&lt;p&gt;&lt;i&gt;Figure 1 - Logging of key creation&lt;br/&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;In order to actively monitor these activities, a &lt;a href="https://cloud.google.com/logging/docs/logs-based-metrics/counter-metrics"&gt;counter log-based metric&lt;/a&gt; in Operations Suite has to be created for protoPayload.methodName="CreateCryptoKey" . This log-based metric can then be used to create an &lt;a href="https://cloud.google.com/logging/docs/alerting/log-based-alerts"&gt;alarm&lt;/a&gt; for each event, or trigger a &lt;a href="https://cloud.google.com/monitoring/support/notification-options"&gt;notification&lt;/a&gt; for when a certain threshold is reached. Cloud Monitoring will display an incident notification and have visualizations ready to be inspected. &lt;/p&gt;&lt;h3&gt;Case Study - Change restoration&lt;/h3&gt;&lt;p&gt;In the traditional IT world, production roll-outs are often staged through the environments guarded by a strict change management process and subject to change approval boards. In the cloud world, equivalent checks should take place but can be accomplished end-to-end much more quickly. As mentioned above, there should be limited human interaction in the production environment. All application and infrastructure deployments should be following the infrastructure as code pattern and leverage automation technologies. Repeatable automated patterns will simplify operations and enable compliance verification at scale. Let’s look at the following example out of the CSA CCM control set:&lt;/p&gt;&lt;p&gt;&lt;i&gt;CCC-09 Change Control &amp;amp; Configuration Management - Change Restoration - Define and implement a process to proactively roll back changes to a previous known good state in case of errors or security concerns.&lt;/i&gt;&lt;/p&gt;&lt;p&gt;By describing the state of the infrastructure configuration in Terraform, each change can easily be rolled-out and rolled-back without missing out a step or having a non-reversible change. The control owners have assurance that the changes are automated and fully reversible to a known working state.&lt;/p&gt;&lt;p&gt;As a best practice, we recommend storing the Infrastructure as Code patterns along the application project source code in the version control system, and staging it through the environments by leveraging a CI/CD pipeline.&lt;/p&gt;&lt;h3&gt;Case Study - Safeguard Logs Integrity&lt;/h3&gt;&lt;p&gt;Extensive logging capabilities of GCP such as &lt;a href="https://cloud.google.com/logging/docs/audit"&gt;Cloud Audit Logs&lt;/a&gt; and &lt;a href="https://cloud.google.com/logging/docs/audit/access-transparency-overview"&gt;Access Transparency&lt;/a&gt; take a record of activities happening in the environment. Especially in regulated industries, these logs have to be kept for an extended period while ensuring their immutability and integrity. This requirement is reflected in the following CSA CCM: &lt;/p&gt;&lt;p&gt;&lt;i&gt; IAM-12 Identity &amp;amp; Access Management - Safeguard Logs Integrity - Define, implement and evaluate processes, procedures and technical measures to ensure the logging infrastructure is read-only for all with write access, including privileged access roles, and that the ability to disable it is controlled through a procedure that ensures the segregation of duties and break glass procedures.&lt;/i&gt;&lt;/p&gt;&lt;p&gt;Leveraging GCP Log Sinks, log entries can be exported into different supported destinations, including Google Cloud Storage. Log entries will be stored as JSON files on a GCS bucket. GCS buckets support data retention policies, which govern how long objects in the bucket must be retained. The  “&lt;a href="https://cloud.google.com/storage/docs/bucket-lock"&gt;Bucket Lock&lt;/a&gt;” feature lets you set a permanent non-reversible configuration of the data retention policy on the corresponding GCS bucket.  &lt;/p&gt;&lt;p&gt;Example Terraform for locking a bucket and keeping the files for 2 days:&lt;/p&gt;&lt;/div&gt;
&lt;div class="block-code"&gt;&lt;dl&gt;
    &lt;dt&gt;code_block&lt;/dt&gt;
    &lt;dd&gt;&amp;lt;ListValue: [StructValue([(&amp;#x27;code&amp;#x27;, &amp;#x27;resource &amp;quot;google_storage_bucket&amp;quot; &amp;quot;my-log-bucket&amp;quot; {\r\n  name          = &amp;quot;my-log-bucket-8225&amp;quot;\r\n  location      = &amp;quot;EU&amp;quot;\r\n  force_destroy = false\r\n\r\n  retention_policy {\r\n    retention_period = 172800\r\n    is_locked        = true\r\n  }\r\n}&amp;#x27;), (&amp;#x27;language&amp;#x27;, &amp;#x27;&amp;#x27;), (&amp;#x27;caption&amp;#x27;, &amp;lt;wagtail.rich_text.RichText object at 0x7f3aa8561190&amp;gt;)])]&amp;gt;&lt;/dd&gt;
&lt;/dl&gt;&lt;/div&gt;
&lt;div class="block-paragraph"&gt;&lt;p&gt;&lt;i&gt;Figure 2 - Bucket Locking mechanism&lt;/i&gt;&lt;/p&gt;&lt;p&gt;The Bucket Lock is a non-reversible activity. As outlined in the above example, files stored within that GCS bucket will be retained for the defined period, including roles with privileged access.&lt;/p&gt;&lt;/div&gt;
&lt;div class="block-code"&gt;&lt;dl&gt;
    &lt;dt&gt;code_block&lt;/dt&gt;
    &lt;dd&gt;&amp;lt;ListValue: [StructValue([(&amp;#x27;code&amp;#x27;, &amp;quot;$ gsutil retention get gs://my-log-bucket-8225\r\n  Retention Policy (LOCKED):\r\n    Duration: 2 Day(s)\r\n    Effective Time: Tue, 30 Nov 2021 13:17:14 GMT\r\n\r\n$ gsutil retention set 1d gs://my-log-bucket-8225\r\nSetting Retention Policy on gs://my-log-bucket-8225/...\r\nAccessDeniedException: 403 Cannot reduce retention duration of a locked Retention Policy for bucket &amp;#x27;my-log-bucket-8225&amp;#x27;.\r\n\r\ngsutil rm gs://my-log-bucket-8225/README.txt\r\nRemoving gs://my-log-bucket-8225/README.txt...\r\nAccessDeniedException: 403 Object &amp;#x27;my-log-bucket-8225/README.txt&amp;#x27; is subject to bucket&amp;#x27;s retention policy and cannot be deleted, overwritten or archived until 2021-12-02T05:24:02.18624-08:00&amp;quot;), (&amp;#x27;language&amp;#x27;, &amp;#x27;&amp;#x27;), (&amp;#x27;caption&amp;#x27;, &amp;lt;wagtail.rich_text.RichText object at 0x7f3aa8561bb0&amp;gt;)])]&amp;gt;&lt;/dd&gt;
&lt;/dl&gt;&lt;/div&gt;
&lt;div class="block-paragraph"&gt;&lt;p&gt;&lt;i&gt;Figure 3 - Bucket Locking effects&lt;/i&gt;&lt;/p&gt;&lt;h3&gt;FSI transformation&lt;/h3&gt;&lt;p&gt;Automation has been a key driver for accelerating transformation at Deutsche Bank:&lt;/p&gt;&lt;/div&gt;
&lt;div class="block-pull_quote"&gt;&lt;div class="uni-pull-quote h-c-page"&gt;
  &lt;section class="h-c-grid"&gt;
    &lt;div class="uni-pull-quote__wrapper h-c-grid__col h-c-grid__col--8 h-c-grid__col-m--6 h-c-grid__col-l--6
      h-c-grid__col--offset-2 h-c-grid__col-m--offset-3 h-c-grid__col-l--offset-3"&gt;
      &lt;div class="uni-pull-quote__inner-wrapper h-c-copy h-c-copy"&gt;
        &lt;q class="uni-pull-quote__text"&gt;With the last few controls being transformed to ‘cloud ready’ and the initial set of applications passing through the controls, control automation is now at the center of our focus. As we progressively learn, utilize, and gain confidence in the real power of the embedded control framework of Google Cloud, we closely work with the control owners to leverage Google Cloud native capabilities. The success we see in automation is now driving the momentum in the on-prem world as well, therefore the hybrid model for automating controls is the next challenge for us in the upcoming months.&lt;/q&gt;

        
          &lt;cite class="uni-pull-quote__author"&gt;
            
            
              &lt;span class="uni-pull-quote__author-meta"&gt;
                
                  &lt;strong class="h-u-font-weight-medium"&gt;Greta Binder,  Operational Readiness Product Owner - Vice President at Deutsche Bank&lt;/strong&gt;&lt;br /&gt;
                
                
              &lt;/span&gt;
            
          &lt;/cite&gt;
        
      &lt;/div&gt;
    &lt;/div&gt;
  &lt;/section&gt;
&lt;/div&gt;

&lt;/div&gt;
&lt;div class="block-paragraph"&gt;&lt;p&gt;The integrated environment of GCP provides foundational capabilities (such as real-time inventory) that can significantly reduce the burden for control owners as they work to establish and maintain their security and compliance posture. The case studies give examples as to how GCP customers can move into continuous compliance, encompassing real-time attestation and notification (something which could occur in case of a misconfiguration, for example). The more familiar control owners become with the GCP capabilities the more confident they feel to automate their controls.&lt;/p&gt;&lt;p&gt;Building on the control automation examples we covered, potential next steps could be embedding the controls into policies within &lt;a href="https://cloud.google.com/anthos-config-management/docs/concepts/policy-controller"&gt;GKE Policy Controller&lt;/a&gt;, and &lt;a href="https://cloud.google.com/config-connector/docs/overview"&gt;GKE Config Connector&lt;/a&gt; seamlessly logging into Cloud Operations Suite, as well as &lt;a href="https://cloud.google.com/security-command-center"&gt;Security Command Center&lt;/a&gt;. Read more about this topic as part of our recently released solution &lt;a href="https://cloud.google.com/blog/products/identity-security/risk-and-compliance-as-code"&gt;Modernizing Compliance: Introducing Risk and Compliance as Code&lt;/a&gt;.&lt;/p&gt;&lt;/div&gt;
&lt;div class="block-related_article_tout"&gt;





&lt;div class="uni-related-article-tout h-c-page"&gt;
  &lt;section class="h-c-grid"&gt;
    &lt;a href="https://cloud.google.com/blog/products/identity-security/risk-and-compliance-as-code/"
       data-analytics='{
                       "event": "page interaction",
                       "category": "article lead",
                       "action": "related article - inline",
                       "label": "article: {slug}"
                     }'
       class="uni-related-article-tout__wrapper h-c-grid__col h-c-grid__col--8 h-c-grid__col-m--6 h-c-grid__col-l--6
        h-c-grid__col--offset-2 h-c-grid__col-m--offset-3 h-c-grid__col-l--offset-3 uni-click-tracker"&gt;
      &lt;div class="uni-related-article-tout__inner-wrapper"&gt;
        &lt;p class="uni-related-article-tout__eyebrow h-c-eyebrow"&gt;Related Article&lt;/p&gt;

        &lt;div class="uni-related-article-tout__content-wrapper"&gt;
          &lt;div class="uni-related-article-tout__image-wrapper"&gt;
            &lt;div class="uni-related-article-tout__image" style="background-image: url('https://storage.googleapis.com/gweb-cloudblog-publish/images/cybersecurity_action_team_jl2RU0c.max-500x500.jpg')"&gt;&lt;/div&gt;
          &lt;/div&gt;
          &lt;div class="uni-related-article-tout__content"&gt;
            &lt;h4 class="uni-related-article-tout__header h-has-bottom-margin"&gt;Modernizing compliance: Introducing Risk and Compliance as Code&lt;/h4&gt;
            &lt;p class="uni-related-article-tout__body"&gt;The RCaC solution stack enables compliance and security control automation through a combination of Google Cloud Products, Blueprints, Pa...&lt;/p&gt;
            &lt;div class="cta module-cta h-c-copy  uni-related-article-tout__cta muted"&gt;
              &lt;span class="nowrap"&gt;Read Article
                &lt;svg class="icon h-c-icon" role="presentation"&gt;
                  &lt;use xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#mi-arrow-forward"&gt;&lt;/use&gt;
                &lt;/svg&gt;
              &lt;/span&gt;
            &lt;/div&gt;
          &lt;/div&gt;
        &lt;/div&gt;
      &lt;/div&gt;
    &lt;/a&gt;
  &lt;/section&gt;
&lt;/div&gt;

&lt;/div&gt;</description><pubDate>Wed, 15 Dec 2021 17:00:00 +0000</pubDate><guid>https://cloud.google.com/blog/products/compliance/continuous-compliance-engineering-gcp-case-studies/</guid><category>Security &amp; Identity</category><category>Compliance</category><og xmlns:og="http://ogp.me/ns#"><type>article</type><title>Compliance Engineering - Continuous Compliance GCP case studies</title><description></description><site_name>Google</site_name><url>https://cloud.google.com/blog/products/compliance/continuous-compliance-engineering-gcp-case-studies/</url></og><author xmlns:author="http://www.w3.org/2005/Atom"><name>Florian Graf</name><title>Google Cloud Consulting</title><department></department><company></company></author><author xmlns:author="http://www.w3.org/2005/Atom"><name>Jo Hellwig</name><title>Technical Account Manager</title><department></department><company></company></author></item><item><title>Software-Defined community cloud - a new way to “Government Cloud”</title><link>https://cloud.google.com/blog/products/identity-security/software-defined-community-cloud-new-way-government-cloud/</link></item></channel></rss>