Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying Google Cloud Platform for Architects
  • Table Of Contents Toc
  • Feedback & Rating feedback
Google Cloud Platform for Architects

Google Cloud Platform for Architects

By : Vitthal Srinivasan, Loonycorn Ravi, Judy Raj
3.1 (12)
close
close
Google Cloud Platform for Architects

Google Cloud Platform for Architects

3.1 (12)
By: Vitthal Srinivasan, Loonycorn Ravi, Judy Raj

Overview of this book

Using a public cloud platform was considered risky a decade ago, and unconventional even just a few years ago. Today, however, use of the public cloud is completely mainstream - the norm, rather than the exception. Several leading technology firms, including Google, have built sophisticated cloud platforms, and are locked in a fierce competition for market share. The main goal of this book is to enable you to get the best out of the GCP, and to use it with confidence and competence. You will learn why cloud architectures take the forms that they do, and this will help you become a skilled high-level cloud architect. You will also learn how individual cloud services are configured and used, so that you are never intimidated at having to build it yourself. You will also learn the right way and the right situation in which to use the important GCP services. By the end of this book, you will be able to make the most out of Google Cloud Platform design.
Table of Contents (19 chapters)
close
close
13
Logging and Monitoring

BeyondCorp – Identity-Aware Proxy

While every organisation wishes to have and maintain security of it's network infrastructure and data, maintaining zero-trust architecture (where all traffic is equally untrustworthy) with increasing scale is always a challenge. Google claims to have maintained it for 6 years and the result of such research and practices is BeyondCorp, an enterprise security model built on the idea of making individual users the units of security management instead of relying on network perimeter.

And now, BeyondCorp is available on GCP as a service. They call it Identity-Aware-Proxy (IAP). Here, the IAM identities are used to create firewall and other security policies for the user. As a user, it implies following practices towards you:

  • Service access can not be determined just by being a part of some network (unlike most of the University resource...

Unlock full access

Continue reading for free

A Packt free trial gives you instant online access to our library of over 7000 practical eBooks and videos, constantly updated with the latest in tech
bookmark search playlist font-size

Change the font size

margin-width

Change margin width

day-mode

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Delete Bookmark

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY