Cloud Next: Google announces a deluge of new security features
As part of the Next UK’19 conference, Google unveils many new security features. These different services will allow users to benefit from increased security in the Cloud and beyond…
The Cloud brings many benefits for businesses , but security remains one of the main weaknesses today. In October 2018, McAfee went as far as to describe cloud security as “catastrophic” .
To remedy the problem, Google Cloud has announced several new cybersecurity products at its Next UK 2019 conference. These new features include data encryption, network security, security analysis and protection. users.
First of all, in order to meet the requirements of European customers who are particularly concerned with controlling their data, Google has unveiled the External Key Manager allowing it to store and manage the encryption keys for BigQuery and ComputeEngine data outside its infrastructure.
In addition, the External Key Manager is accompanied by a new Key Access Justification functionality . This allows you to benefit from a detailed justification each time a key is requested to decrypt the data. The company therefore only has to approve or refuse to provide this key. With these two tools, companies can therefore benefit from total control over their data.
The Google Cloud Armor is getting stronger
In addition to these new features dedicated to data encryption, Google is announcing the new Web Application Firewall (WAF) for its Cloud Armor . This new feature helps protect applications from targeted and distributed threats on the web.
Now, users can configure the Cloud Armor with geolocation-based access controls, pre-configured WAF application protection rules against major threats, or the creation of Layer-7 filtering rules.
In addition, the Cloud Armor is now integrated with the Cloud Security Command Center (Cloud SCC). Thus, users will be directly notified on the SCC Cloud in the event of suspicious traffic patterns on their applications.
Threat detection and access control tools
Another innovation announced at Next UK 19 for safety is the Packet Mirroring service . Available in beta now, this service collects and inspects network traffic for Compute Engine and GKE. Users can use third-party tools to proactively detect threats, to better react to intrusions using a signature-based attack detection system and an anomaly detection system to better identify attacks zero-day.
In addition, the Advanced Protection Program is now available to all G Suite and Cloud Identity users. In particular, it allows you to block access to suspicious applications and scan emails for possible threats.
An application access control system will also help reduce the risk of data loss by limiting access to G Suite APIs to third-party applications verified by the user. The latter will also be able to manage and restrict the APIs available for use by third-party applications.
Two new features for the Cloud Security Command Center
The Cloud Security Command Center in Premium Edition is enriched with new features. First of all, Event Threat Detection, available in beta , allows you to detect threats hanging over your Cloud resources using logs.
Thus, incidents can be sent to SIEM in order to conduct a thorough investigation. This allows threats to be detected before they result in loss or damage. The second feature, Security Health Analytics, helps prevent incidents by identifying misconfigurations and compliance issues in GCP resources.
Chronicle Backstory gives you internal Google security tools
Finally, the Backstory product developed by Chronicle’s security professionals allows everyone to benefit from the same threat detection and security incident investigation techniques as Google.
This product makes it easy to collect and store security data from the various systems that make up hybrid cloud environments for businesses. This data can thus be analyzed in a few clicks.
With all these new features, Google Cloud allows its customers to benefit from increased security on the GCP, but also on site or on other Clouds . It is therefore a real advantage over the competition, which meets the needs of businesses in a context where cyber threats are increasing…