Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
The Ultimate Guide to Building a Google Cloud Foundation

You're reading from   The Ultimate Guide to Building a Google Cloud Foundation A one-on-one tutorial with one of Google's top trainers

Arrow left icon
Product type Paperback
Published in Aug 2022
Publisher Packt
ISBN-13 9781803240855
Length 284 pages
Edition 1st Edition
Arrow right icon
Author (1):
Arrow left icon
Patrick Haggerty Patrick Haggerty
Author Profile Icon Patrick Haggerty
Patrick Haggerty
Arrow right icon
View More author details
Toc

Table of Contents (10) Chapters Close

Preface 1. Chapter 1: Getting to Know Google’s Cloud 2. Chapter 2: IAM, Users, Groups, and Admin Access FREE CHAPTER 3. Chapter 3: Setting Up Billing and Cost Controls 4. Chapter 4: Terraforming a Resource Hierarchy 5. Chapter 5: Controlling Access with IAM Roles 6. Chapter 6: Laying the Network 7. Chapter 7: Foundational Monitoring and Logging 8. Chapter 8: Augmenting Security and Registering for Support 9. Other Books You May Enjoy

Food for thought

I could seriously write a book on logging and monitoring in Google Cloud. In this chapter, I’ve tried to focus on the things that should be part of most Google Cloud foundations, without getting into all the variations you’ll need to implement depending on exactly what you are doing in Google Cloud. Now, let’s talk about some stuff you should at least consider.

Security Information and Event Management (SIEM) tools are third-party tools designed to help you scan your logs for untoward activities. Splunk, Elasticsearch, Sumo Logic, ArcSight, and QRadar, just to name a few, could all be configured to connect to Cloud Logging using Pub/Sub. Then, they can analyze what’s happening in your logs and spot naughty people trying to do naughty things. Additionally, Google now has Chronicle, which can scan logs alongside information coming out of Security Command Center for various threats.

Homegrown log analysis could be constructed in a few...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime