时间:2021-07-15 | 标签: | 作者:Q8 | 来源:weixin_26722031网络
小提示:您能找到这篇{Google Cloud如何为您的应用程序安全提供帮助?}绝对不是偶然,我们能帮您找到潜在客户,解决您的困扰。如果您对本页介绍的Google Cloud如何为您的应用程序安全提供帮助?内容感兴趣,有相关需求意向欢迎拨打我们的服务热线,或留言咨询,我们将第一时间联系您! |
< font-size: 16px;"> < font-size: 16px;">我们将介绍云安全基础知识,包括三个非常简单的安全概念。 < font-size: 16px;">Here you go! Read on and please share your though公关公司怎么样ts in the comments below. < font-size: 16px;">干得好! 继续阅读,请在下面的评论中分享您的想法。 < font-size: 16px;">三大安全基础 (Three security fundamentals) < font-size: 16px;">#1保护 (#1 Protection) < font-size: 16px;">Google Cloud provides protection from threats through a secure foundation. It offers the core infrastructure that is designed, built and operated to help prevent threats. How is it done? Here are a few of the ways! < font-size: 16px;">Google Cloud通过安全的基础提供了免受威胁的保护。 它提供了设计,构建和运行以帮助防止威胁的核心基础架构。 怎么做? 以下是几种方法! < font-size: 16px;">Defense in depth < font-size: 16px;">纵深防御 < font-size: 16px;">Google’s infrastructure doesn’t rely on any single technology to make it secure. Rather, builds security through progressive layers that deliver true defense in depth. < font-size: 16px;">Google的基础架构不依赖任何单一技术来确保其安全性。 而是通过可进行深度防御的渐进层来建立安全性。 < font-size: 16px;">Other cloud providers may describe a similar stack of capabilities, but the way Google Cloud approaches many of these is unique. Here is how: < font-size: 16px;">其他云提供商可能会描述类似的功能堆栈,但是Google Cloud处理其中许多功能的方式是独特的。 方法如下: < font-size: 16px;">The hardware is Google controlled, built and hardened. < font-size: 16px;">硬件由Google控制,构建和加固。 < font-size: 16px;">Any application binary that runs on Google infrastructure is deployed securely. < font-size: 16px;">在Google基础架构上运行的所有应用程序二进制文件均已安全部署。 < font-size: 16px;">There is no assumption of any trust between services, and multiple mechanisms are used to establish and maintain trust — the infrastructure was designed to be multi-tenant from the beginning. < font-size: 16px;">服务之间不存在任何信任的假设,并且使用多种机制来建立和维护信任-基础结构从一开始就被设计为多租户。 < font-size: 16px;">All identities, users and services, are strongly authenticated. < font-size: 16px;">所有身份,用户和服务均经过严格认证。 < font-size: 16px;">Data stored on Google’s infrastructure is automatically encrypted at rest and distributed for availability and reliability. < font-size: 16px;">Google的基础架构上存储的数据会自动进行静态加密,并进行分发以提高可用性和可靠性。 < font-size: 16px;">Communications over the Internet to Google Cloud services are encrypted. < font-size: 16px;">互联网上与Google Cloud服务的通信已加密。 < font-size: 16px;">The scale of the infrastructure allows to absorb many Denial of Service (DoS) attacks, and there are multiple layers of protection that further reduce the risk of any DDoS impact. < font-size: 16px;">基础架构的规模允许吸收许多拒绝服务(DoS)攻击,并且多层保护可以进一步降低任何DDoS影响的风险。 < font-size: 16px;">The operations teams detect threats and respond to incidents 24 x 7 x 365. < font-size: 16px;">运营团队可以检测威胁并对事件进行24 x 7 x 365响应。 < font-size: 16px;">If this is intriguing, here is a white paper on Google infrastructure design that goes into all of these areas in significant details. < font-size: 16px;">如果感兴趣的话,请参阅以下有关Google基础架构设计的白皮书,其中将详细介绍所有这些领域。 < font-size: 16px;">End-to-end provenance & attestation < font-size: 16px;">端到端的出处和证明 < font-size: 16px;">Google’s hardware infrastructure is custom-designed by Google “from chip to chiller” to precisely meet their requirements, including security. < font-size: 16px;">Google的硬件基础架构由Google“从芯片到冷却器”进行定制设计,以精确满足其要求,包括安全性。 < font-size: 16px;">Google’s servers and Operating Systems(OS) are designed for the sole purpose of providing Google services. < font-size: 16px;">Google的服务器和操作系统(OS)专为提供Google服务而设计。 < font-size: 16px;">The servers are custom built and don’t include unnecessary components like video cards or peripheral interconnects that can introduce vulnerabilities. < font-size: 16px;">这些服务器是自定义构建的,不包含不必要的组件,例如视频卡或可能引起漏洞的外围互连。 < font-size: 16px;">The same goes for software, including low-level software and OS, which is a stripped-down, hardened version of Linux. < font-size: 16px;">对于软件(包括底层软件和OS)也是如此,后者是精简的Linux简化版本。 < font-size: 16px;">Further, Google designed and included hardware specifically for security — like Titan, custom security chip that is used to establish a hardware ro全球赢ot of trust in the servers and peripherals. < font-size: 16px;">此外,Google设计并包含了专门用于安全性的硬件,例如Titan,这是用于在服务器和外围设备中建立信任的硬件根的定制安全芯片 。 < font-size: 16px;">Network hardware and software are also purpose built to improve performance as well as security. < font-size: 16px;">还专门构建了网络硬件和软件以提高性能和安全性。 < font-size: 16px;">This all rolls up to the custom data center designs, which include multiple layers of physical and logical protection. < font-size: 16px;">这一切都汇总到了定制数据中心设计中,其中包括多层物理和逻辑保护。 < font-size: 16px;">Understanding provenance from the bottom of the hardware stack to the top allows Google Cloud to control the underpinnings of the security posture. Unlike other cloud providers, Google has greatly reduced the “vendor in the middle problem” — if a vulnerability is found, steps can be taken immediately to develop and roll out a fix. This level of control results in greatly reduced exposure. < font-size: 16px;">了解从硬件堆栈底部到顶部的出处,可以使Google Cloud控制安全状况的基础。 与其他云提供商不同,Google大大减少了“中间厂商问题” —如果发现漏洞,则可以立即采取措施来开发和推出修复程序。 这种控制水平可大大减少暴露。 < font-size: 16px;">Private backbone < font-size: 16px;">私人骨干 < font-size: 16px;">Google operates one of the largest backbone networks in the world. There are more than 130 points of presence across 35 countries — and there is a continuous addition of more zones and regions to meet customers’ preferences and policy requirements. < font-size: 16px;">Google经营着世界上最大的骨干网之一。 在35个国家/地区设有130多个服务点-并不断增加更多的区域和地区,以满足客户的喜好和政策要求。 < font-size: 16px;">Google’s network delivers low latency but also improves security. Once customers’ traffic is on Google’s network it is no longer transiting the public internet, making it less likely to be attacked, intercepted, or manipulated. < font-size: 16px;">Google的网络提供了低延迟,但也提高了安全性。 一旦客户的流量进入Google的网络,它就不再通过公共互联网,从而减少了受到攻击,拦截或操纵的可能性。 < font-size: 16px;">Encryption at rest by default < font-size: 16px;">默认情况下加密静态 < font-size: 16px;">We will cover this one in more details in the upcoming comics but in short, all data at rest or in motion is encrypted by default on the Google network. And some services offer the option to supply or manager your own keys. < font-size: 16px;">我们将在即将到来的漫画中更详细地介绍这一内容,但简而言之,默认情况下,所有静态或动态数据在Google网络上都是加密的。 某些服务提供了提供或管理您自己的密钥的选项。 < font-size: 16px;">Update at scale without disruptions < font-size: 16px;">大规模更新而不会中断 < font-size: 16px;">Google has the ability to update the cloud infrastructure without disrupting customers using a technology called Live Migration. < font-size: 16px;">Google能够使用称为Live Migration的技术来更新云基础架构,而不会中断客户。 < font-size: 16px;">Updates add functionality, but from a security standpoint, they also are required to patch software vulnerabilities. No one writes perfect software, so this is a constant requirement. < font-size: 16px;">更新增加了功能,但是从安全角度出发,也需要修补程序来修补软件漏洞。 没有人编写完美的软件,因此这是一个持续的要求。 < font-size: 16px;">Keeping ahead of threats < font-size: 16px;">领先于威胁 < font-size: 16px;">Security landscape rapidly evolves and many organizations struggle to keep pace. Because Google runs on the same infrastructure that is available to the customers, customers can directly benefit from those investments. < font-size: 16px;">安全形势Swift发展,许多组织努力跟上步伐。 由于Google在客户可用的相同基础架构上运行,因此客户可以直接从这些投资中受益。 < font-size: 16px;">The global footprint across enterprises and consumers gives Google an unprecedented visibility into threats and attacks. As a result, solutions can be developed before many other organizations even see the threats, reducing exposure. < font-size: 16px;">Google在企业和消费者中的全球足迹使Google对威胁和攻击有了前所未有的可见性。 因此,可以在许多其他组织甚至没有看到威胁之前就开发解决方案,从而减少暴露。 < font-size: 16px;">#2控件 (#2 Controls) < font-size: 16px;">In the cloud there can be a lot of control options to make sure the app, the data and the services you deploy are secure. The most important thing to understand is that “cloud security requires collaboration” < font-size: 16px;">在云中,可以有很多控制选项来确保您部署的应用程序,数据和服务是安全的。 要了解的最重要的事情是“ 云安全需要协作 ” < font-size: 16px;">Your cloud provider (Google Cloud) is responsible for securing the infrastructure. < font-size: 16px;">您的云提供商(Google Cloud)负责保护基础架构。 < font-size: 16px;">You are responsible for securing your data. < font-size: 16px;">您有责任保护您的数据。 < font-size: 16px;">And.. Google Cloud provides the best practices, templates, products and solutions to help you secure your data and services. < font-size: 16px;">并且.. Google Cloud提供了最佳做法,模板,产品和解决方案,可帮助您保护数据和服务。 < font-size: 16px;">Keeping this section short because I am planning on doing another comic issue on this topic, there is a lot more to learn here, so stay tuned! ?? < font-size: 16px;">由于我计划针对该主题再做一本漫画问题,因此本节不多,这里还有很多要学习的内容,请继续关注! ?? < font-size: 16px;">#3合规 (#3 Compliance) < font-size: 16px;">In order to protect the sensitive data that you store in Google Cloud, it maintains and goes though compliance including complex regulatory, frameworks and guidelines. For example HIPPA, FedRAMP, SOC etc. < font-size: 16px;">为了保护您存储在Google Cloud中的敏感数据,它会保持并遵守法规,包括复杂的法规,框架和指南。 例如HIPPA,FedRAMP,SOC等。 < font-size: 16px;">翻译自: https://medium.com/google-cloud/how-can-google-cloud-help-with-security-of-your-apps-8f5692f56177 |
上一篇:如何使TikTok适应当前的营销策略?
下一篇:Google Cloud: 5种增强云存储安全性和数据保护的方
基于对传统行业渠道的理解,对互联网行业的渠道我们可以下这样一个定义:一切...
小米应用商店的后台操作和苹果是比较相似的,因为都能填写100字符关键词,允许...
小米的规则目前是在变更中的,但是根据经验小米的搜索排名评分的高低是个很重...
为了恰饭,有时候是要接入一些广告的,所以FB也专门有一个广告的SDK,这就是A...
在 2018 年于旧金山举行的游戏开发者大会上,Amazon Web Services (AWS) 曾宣布,目前世...
关于Facebook Audience Network如何收款的问题,其实官方已经给了详细的步骤。本文主要...
本文介绍了Audience Network对广告载体的质量检查,以及它重点广告形式需要注意的问...
随着iOS开发,作为开发者或公司需要针对iOS App开发涉及的方方面面作出对应的信息...
Facebook和谷歌对出海企业广告渠道都很熟悉,但事实上,在国外还有一些渠道也很...
卖家从做号的第1分钟开始,就一定要想好变现路径是什么?一定要以变现为目的去...
小提示:您应该对本页介绍的“Google Cloud如何为您的应用程序安全提供帮助?”相关内容感兴趣,若您有相关需求欢迎拨打我们的服务热线或留言咨询,我们尽快与您联系沟通Google Cloud如何为您的应用程序安全提供帮助?的相关事宜。
关键词:Google,Cloud如何为您的应用