Securing Access to GCP Resources (Cloud Next '18)

1 381
25.6
Следующее
Популярные
18 дней – 5794:04
Ad-hoc reporting with Looker
89 дней – 2 0860:50
RAG expansion for AI apps
Опубликовано 26 июля 2018, 22:07
In this session, we will walk you through how to secure and control access to different types of GCP resources and track them through logging. Differently from on-prem perimeter-based networking security, GCP offers distributed defense in depth, in which different types of policies and conditions are enforced through different user traffic paths. This session will walk you through how to apply the right policies for each use case, and how to validate the enforcement through logging and monitoring mechanisms.

IO239

Event schedule → g.co/next18

Watch more Infrastructure & Operations sessions here → bit.ly/2uEykpQ
Next ‘18 All Sessions playlist → bit.ly/Allsessions

Subscribe to the Google Cloud channel! → bit.ly/NextSub


re_ty: Publish; product: Cloud - General; fullname: Ines Envid; event: Google Cloud Next 2018;
Случайные видео
31.05.22 – 5 150 51319:32
The All WALMART Gaming Setup
03.10.21 – 94 47010:34
This Analog Keyboard is SPECIAL!
08.02.17 – 145 60512:37
Tested: Sony a6500 Mirrorless Camera
автотехномузыкадетское