In this chapter, you learned that the GCP benefits from Google's long experience countering cyber-threats and security attacks targeted at other Google services, such as Google search, YouTube, and Gmail.
There are several built-in security features that already protect users of the GCP from several threats that might not even be recognized as existing in an on-premise world.
In addition to these in-built protections, all GCP users have various tools at their disposal to scan for security threats and to protect their data.
Finally, there are also some well-recognized best practices around cloud architecture design that ought to be kept in mind in order to reduce the likelihood of attacks and the impact of attacks that do indeed occur.