program for reporting vulnerabilities Remote locations with restricted access Guards, cameras, analytics to detect intruders “Mission: Impossible” tech: thermal imaging, laser detection, biometric scans Top 5 server manufacturer We build everything: hardware, custom software stack Full-stack ownership greatly reduces attack surface Live Migration keeps you running while we patch People Physical Full Stack Google-Grade Security
enabling Proxy-based Load Balancing • When you enable HTTP(S) Load Balancing or SSL proxy Load Balancing, Google infrastructure mitigates and absorbs many Layer 4 and below attacks, such as SYN floods, IP fragment floods, port exhaustion, etc. • If you have HTTP(S) Load Balancing with instances in multiple regions, you are able to disperse your attack across instances around the globe.
your instances on Google Cloud Platform, follow these best practices: - Connect securely to your instance. - Ensure the project firewall is not open to everyone on the internet. Leaving all firewall rules open to 0.0.0/0 - Use a strong password. - Ensure that all software is up to date. Make sure that the software you have installed is up to date and that there are no known vulnerabilities that could compromise your instance. - Monitor project usage closely via the monitoring API to identify abnormal project usage. Investigate any suspicious usage to ensure that your instance is not being hijacked by malicious software.