Summary
In this chapter, we gave an overview of Google Cloud’s core security infrastructure. We looked at how Google secures and makes its infrastructure compliant, and we covered what the shared security responsibility model and shared fate on Google Cloud are. Next, we looked at some security by design building blocks, covering operational security, data security, service and identity, and low-level security controls, such as physical security and boot stack security. Finally, we learned about threat and vulnerability management and how Google Cloud runs its malware protection, vulnerability management, security monitoring, and incident response.
In the next chapter, we will look at trust and compliance, which is an extension of the core security and compliance infrastructure of Google Cloud.