47
How Google protect your data?

How Google protect your data? · Edge points of presence (>100) Google global cache edge nodes (>800) Better global infrastructure More edge & peering points than any public cloud

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: How Google protect your data? · Edge points of presence (>100) Google global cache edge nodes (>800) Better global infrastructure More edge & peering points than any public cloud

How Google protect your data?

Page 2: How Google protect your data? · Edge points of presence (>100) Google global cache edge nodes (>800) Better global infrastructure More edge & peering points than any public cloud

Security

Confiability and Reliability

Access Control

Privacy

Page 3: How Google protect your data? · Edge points of presence (>100) Google global cache edge nodes (>800) Better global infrastructure More edge & peering points than any public cloud

Security

Confiability and Reliability

Access Control

Privacy

Page 4: How Google protect your data? · Edge points of presence (>100) Google global cache edge nodes (>800) Better global infrastructure More edge & peering points than any public cloud

Contains trade secrets and other confidential/proprietary information - Do not copy, share or distribute

Transparency is a priority

we put you in controland we keep you compliant

Page 5: How Google protect your data? · Edge points of presence (>100) Google global cache edge nodes (>800) Better global infrastructure More edge & peering points than any public cloud

Malicious people have become

increasingly sophisticated and

effective.

Users are not make it easy...+ Large expectations

+ Relative easy to be deceived

+ Can cause damage from the inside

Page 6: How Google protect your data? · Edge points of presence (>100) Google global cache edge nodes (>800) Better global infrastructure More edge & peering points than any public cloud
Page 7: How Google protect your data? · Edge points of presence (>100) Google global cache edge nodes (>800) Better global infrastructure More edge & peering points than any public cloud

Article Link

Page 8: How Google protect your data? · Edge points of presence (>100) Google global cache edge nodes (>800) Better global infrastructure More edge & peering points than any public cloud

For the past 15 years, Google has been buildingout the fastest, most powerful, highest quality cloud infrastructure onthe planet.

➔ Chipset➔ OS ➔ Applications

Page 9: How Google protect your data? · Edge points of presence (>100) Google global cache edge nodes (>800) Better global infrastructure More edge & peering points than any public cloud

Proprietary Network Layer

Jupiter Superblocks & Pluto Switches

40 Terabits per second

Page 10: How Google protect your data? · Edge points of presence (>100) Google global cache edge nodes (>800) Better global infrastructure More edge & peering points than any public cloud

Google backboneWe lay our own cables across the ocean

Page 11: How Google protect your data? · Edge points of presence (>100) Google global cache edge nodes (>800) Better global infrastructure More edge & peering points than any public cloud

Confidential & Proprietary

Edge points of presence (>100)

Google global cache edge nodes (>800)

Better global infrastructure More edge & peering points than any public cloud

Page 12: How Google protect your data? · Edge points of presence (>100) Google global cache edge nodes (>800) Better global infrastructure More edge & peering points than any public cloud

Confidential & Proprietary

Frankfurt

BelgiumLondon

São Paulo

FinlandNetherlands

Hong Kong

3

Sydney3

Singapore

Sydney

Mumbai

Tokyo

TaiwanS CarolinaN Virginia

Oregon Iowa

Montreal

California

3

34

33

3

3

Better global infrastructure Select from 20 Regions, 61 Zones

3

2

3 33

3

3

2

3

Edge points of presence (>100)

New regions and number of zones

Current region and number of zones

Google global cache edge nodes (>800)

Page 13: How Google protect your data? · Edge points of presence (>100) Google global cache edge nodes (>800) Better global infrastructure More edge & peering points than any public cloud

Confidential & Proprietary

3

Tannat (BR, UY, AR) in construction

FASTER (US, JP, TW) 2016

Monet (US, BR) in construction for 2017

Junior (Rio, Santos) in construction

PLCN Unity (HK, LA) in construction for 2018

Frankfurt

BelgiumLondon

São Paulo

FinlandNetherlands

Hong Kong

3

Sydney3

Singapore

Sydney

Mumbai

Tokyo

TaiwanS CarolinaN Virginia

Oregon Iowa

Montreal

California

3

34

33

3

3

3

2

3 33

3

3

2

3

Edge points of presence (>100)

Future region and number of zones

Current region and number of zones

Google global cache edge nodes (>800)

Google leased/owned fiber

Better global infrastructure More than 100,000s miles of fiber optic cable

Demo

Page 14: How Google protect your data? · Edge points of presence (>100) Google global cache edge nodes (>800) Better global infrastructure More edge & peering points than any public cloud

Security

Confiability and Reliability

Access Control

Privacy

Page 15: How Google protect your data? · Edge points of presence (>100) Google global cache edge nodes (>800) Better global infrastructure More edge & peering points than any public cloud

Data Encrypted at Rest & Transit

Page 16: How Google protect your data? · Edge points of presence (>100) Google global cache edge nodes (>800) Better global infrastructure More edge & peering points than any public cloud

Data Center

Data Center

Data Replication for High Availability

Data Center

Data Center

Data obfuscation for Security

Page 17: How Google protect your data? · Edge points of presence (>100) Google global cache edge nodes (>800) Better global infrastructure More edge & peering points than any public cloud

Data Encryption for High Security

Page 18: How Google protect your data? · Edge points of presence (>100) Google global cache edge nodes (>800) Better global infrastructure More edge & peering points than any public cloud

Encryption by default

Connections to Google Cloud

require TLS

Data is chunked and each

chunk is encrypted with its

own data encryption key

Data encryption keys

(DEKs) are wrapped using

a key encryption key (KEK)

Encrypted chunks and wrapped

encryption keys are distributed across

Google’s storage infrastructure.

Page 19: How Google protect your data? · Edge points of presence (>100) Google global cache edge nodes (>800) Better global infrastructure More edge & peering points than any public cloud

PLACE IMAGE HERE

High availability comes from software

Data chunks encrypted with

unique keys

Encrypted chunks distributed across Google’s storage

infrastructure

Page 20: How Google protect your data? · Edge points of presence (>100) Google global cache edge nodes (>800) Better global infrastructure More edge & peering points than any public cloud

Data is ‘chunked’ for encryption and storage

Page 21: How Google protect your data? · Edge points of presence (>100) Google global cache edge nodes (>800) Better global infrastructure More edge & peering points than any public cloud

KMS is a central point of control for all data access

Page 22: How Google protect your data? · Edge points of presence (>100) Google global cache edge nodes (>800) Better global infrastructure More edge & peering points than any public cloud

Google’s root KMS

Page 23: How Google protect your data? · Edge points of presence (>100) Google global cache edge nodes (>800) Better global infrastructure More edge & peering points than any public cloud

New encryption WhitepaperEncryption Whitepaper: Must read

Page 24: How Google protect your data? · Edge points of presence (>100) Google global cache edge nodes (>800) Better global infrastructure More edge & peering points than any public cloud

Protecting beyond just GoogleProject zero

Page 25: How Google protect your data? · Edge points of presence (>100) Google global cache edge nodes (>800) Better global infrastructure More edge & peering points than any public cloud

Faster development, deployment, response

Agility

Adapting fast gives more

security

● we prevent more incidents

● we can respond faster

● we test our own systems

● we learn and iterate

Page 26: How Google protect your data? · Edge points of presence (>100) Google global cache edge nodes (>800) Better global infrastructure More edge & peering points than any public cloud

Security

Confiability and Reliability

Access Control

Privacy

Page 27: How Google protect your data? · Edge points of presence (>100) Google global cache edge nodes (>800) Better global infrastructure More edge & peering points than any public cloud

Are you secure ? Are you sure ?

Page 28: How Google protect your data? · Edge points of presence (>100) Google global cache edge nodes (>800) Better global infrastructure More edge & peering points than any public cloud

Reduced “vendor in the middle” risk

Purpose-built

chips

Purpose-built

servers

Purpose-built

storage

Purpose-built

network

Purpose-built

data centers

Safee ArchitectureNo more Updates

Page 29: How Google protect your data? · Edge points of presence (>100) Google global cache edge nodes (>800) Better global infrastructure More edge & peering points than any public cloud

Yesterday: Walls, walls and walls

On prem

Identity

ERP

SERVER

CRM

SERVER

EmployeeVPN

Page 30: How Google protect your data? · Edge points of presence (>100) Google global cache edge nodes (>800) Better global infrastructure More edge & peering points than any public cloud

And... not just employees

On prem

Unintended access for contractor

Identity

ERP

SERVER

CRM

SERVER

Employee

Contractor

VPN

Page 31: How Google protect your data? · Edge points of presence (>100) Google global cache edge nodes (>800) Better global infrastructure More edge & peering points than any public cloud

Change: Infra leaves the

building

On prem

IdentityEmployee

Contractor

VPN

ERP

VM

CRM

VM

Page 32: How Google protect your data? · Edge points of presence (>100) Google global cache edge nodes (>800) Better global infrastructure More edge & peering points than any public cloud

Change: Identity leaves the

building

Employee

Contractor

ERP

VM

CRM

VM Identity

Page 33: How Google protect your data? · Edge points of presence (>100) Google global cache edge nodes (>800) Better global infrastructure More edge & peering points than any public cloud

What are the risks?

Employee

Contractor

ERP

VM

CRM

VM IdentityIs this device

safe?Is it the

real person?

Is the network path secure?

Is this person allowed to see

this application?

Is my application safe?

Page 34: How Google protect your data? · Edge points of presence (>100) Google global cache edge nodes (>800) Better global infrastructure More edge & peering points than any public cloud

Solutions

Employee

Contractor

ERP

VM

CRM

VM IdentityDevice

managementPhishing

resistant authN

Well configured TLS

Proxy for access control, TLS termination

App Security Scans

Page 35: How Google protect your data? · Edge points of presence (>100) Google global cache edge nodes (>800) Better global infrastructure More edge & peering points than any public cloud

What we do

Employee

Contractor

Google Cloud Load Balancer

Google MDM

Pro

xy

ERP

VM

CRM

VM Identity

Cloud Security Scanner

Security Key Enforcement

Identity-Aware Proxyor

BeyondCorp

Page 36: How Google protect your data? · Edge points of presence (>100) Google global cache edge nodes (>800) Better global infrastructure More edge & peering points than any public cloud

IAM Service

Who can do what on which resource

Page 37: How Google protect your data? · Edge points of presence (>100) Google global cache edge nodes (>800) Better global infrastructure More edge & peering points than any public cloud

Identity-Aware Proxy

● Control access by user identity

● Simpler and safer than VPN

● Building block for “BeyondCorp”

Page 38: How Google protect your data? · Edge points of presence (>100) Google global cache edge nodes (>800) Better global infrastructure More edge & peering points than any public cloud

Security Key Enforcement

● Enforce security keys as 2nd factor

● Protect from #1 threat, phishing

● Building block for “BeyondCorp”

Page 39: How Google protect your data? · Edge points of presence (>100) Google global cache edge nodes (>800) Better global infrastructure More edge & peering points than any public cloud

Mobile Application

Network

Servers

Chips

Recap: Secure ArchitectureNo more patching anywhere in the stack

Page 40: How Google protect your data? · Edge points of presence (>100) Google global cache edge nodes (>800) Better global infrastructure More edge & peering points than any public cloud

Security

Confiability and Reliability

Access Control

Privacy

Page 41: How Google protect your data? · Edge points of presence (>100) Google global cache edge nodes (>800) Better global infrastructure More edge & peering points than any public cloud

Security PrivacyData

Protection

Photo credit: @ogwrnsk

Page 42: How Google protect your data? · Edge points of presence (>100) Google global cache edge nodes (>800) Better global infrastructure More edge & peering points than any public cloud

Businesses have different needs than consumers

Page 43: How Google protect your data? · Edge points of presence (>100) Google global cache edge nodes (>800) Better global infrastructure More edge & peering points than any public cloud

PortabilityScope IP

Page 44: How Google protect your data? · Edge points of presence (>100) Google global cache edge nodes (>800) Better global infrastructure More edge & peering points than any public cloud

Contracts

Photo credit: Alan Davey

Page 45: How Google protect your data? · Edge points of presence (>100) Google global cache edge nodes (>800) Better global infrastructure More edge & peering points than any public cloud

You are the data controller

We are a data processor

Page 46: How Google protect your data? · Edge points of presence (>100) Google global cache edge nodes (>800) Better global infrastructure More edge & peering points than any public cloud

Third-party audits and certification

ISO 27001 ISO 27017 ISO 27018 HIPAA 21 CFR Part 11

ISAE 3402 Type II AICPA SOC 3AICPA SOC 1 SSAE 16 Type IIAICPA SOC 2

FedRAMP ATOFor G Suite and App Engine

MTCS Level 3STAR CertificationPCI DSS v3.2

Page 47: How Google protect your data? · Edge points of presence (>100) Google global cache edge nodes (>800) Better global infrastructure More edge & peering points than any public cloud

Confidential & Proprietary

Thank you