Google Cloud Security Architecture Overview

Google Cloud Architecture

Google’s cloud infrastructure is built on a Multi-Layered Security model, designed to protect data from physical to application level.

🔐 Security Architecture Overview

1. 🏗️ Secure Low-Level Infrastructure

  • Physical Security
    • Camera surveillance
    • Metal detectors
    • Biometric identification
  • Hardware Identity
    • Servers have unique IDs for authentication
  • Operational Automation
    • Automated updates
    • Issue detection mechanisms

2. 🛡️ Secure Service Deployment

  • Zero-Trust Security Model
    • All users, devices, and systems require authentication and authorization
  • Customer Data Isolation
    • Ensures tenant separation in shared infrastructure

3. 🔐 Secure Data Storage

  • Encryption at Rest
    • Protects against unauthorized access
  • Scheduled Data Deletion
    • Prevents both accidental and malicious loss

4. 🌐 Secure Internet Communication

  • Private IP Addressing
    • Infrastructure isolated from public internet
  • Credential-Based Access
    • Authentication required for accessing cloud services

5. ⚙️ Operational Security

  • Code and Software Security
    • Verified code libraries
    • Manual code security reviews
  • Device and Credential Protection
    • Safeguarding employee hardware
    • Multi-factor authentication (MFA)
  • Threat Detection & Patching
    • Active monitoring
    • Regular security updates and patch management
graph TD
    L1["         Operational Security       "] --> L2["      Secure Internet Communication     "] --> L3["  Secure Data Storage "] --> L4[" Secure Service Deployment"] --> L5[" Secure Low-Level Infrastructure"]

Security in the cloud (5 Layers)


Sovereign Clouds

Definition

Sovereign Cloud
A cloud setup confined to a specific country or region, ensuring data handling complies with local privacy laws.

Key Points

  • Ensures national laws govern data access and processing.
  • Supports national security by keeping sensitive data (e.g., healthcare) local.
  • Enables digital Sovereignty for governments.
  • Adds cost and complexity for global organizations.

Warning

Non-compliance may result in being barred from operating in that region.


🔐 HMAC-Based Authentication in Cloud APIs

HMAC-based (or signature-based) authentication is widely used in cloud services like AWS S3, Google Cloud Storage, and others.

📌 Key Concepts

  • The servers and clients do not store the password (secret key) in plaintext.
  • Instead, they uses the secret key to generate a cryptographic signature (e.g., HMAC-SHA256) over the request.
  • This signature is sent along with authentication request.
  • The other end verifies the signature using the known secret key.

Note

The secret key is never sent over the network, but it must be accessible to the client to generate the signature.


🔄 Why the Secret Key Must Be Stored on the Client

Warning

You can’t just store a hash of the secret key!

  • Hashes like SHA256 are one-way — they cannot be reversed.
  • To compute an HMAC, you need the original secret key, not its hash.
  • Therefore, the client must store the secret key securely, even if not in plaintext.

✅ Secure Storage Options for Secret Keys

MethodDescription
Secrets ManagerCentralized service (e.g., Lockboxes) for managing and rotating secrets.
TPM / HSMHardware-based secure storage (Trusted Platform Module / Hardware Security Module).
Encrypted FilesEncrypted configuration files (e.g., ComponentCredentials.xml).

❓ When Is the System Passphrase Used?

Info

The system passphrase plays a critical role in Servers components.

Acts as a primary key for:

  • File system encryption
  • Cloud access
  • Certificate management
  • Boost tokens
  • System configuration in scale-out environments
  • Licensing information

🧑‍🚒 Defense In Depth (NIST CSF)

Layered approach that uses multiple security control

  • Identity Control: Measure that authenticates user before resource access (MFA)
  • Protective Control: Protect access to resources and shields against malicious (AV, WAF, IaaC Policies)
  • Network Controls: Firewalls, IPS
  • Detective Controls: IDS, Cloud Security Command Center
  • Responsive Controls: Actions after detection
  • Recovery Controls: Actions after damage, like reverting to backups,

🪪 IAM and Cloud IAM

  • Roles: Collection of permissions, policies and constrains to principals
  • Principals: Users or Apps (Service Accounts) // Groups: Combine them depending on Org.
  • Policies: Rules that allow/deny access.

Federation

Granting external identities access to your cloud environment. Like using SSO. It is recommended to allow MFA to users using federation.

🧱 Firewall best practices

Here are a few best practices you can apply when using firewalls:

  • Always use the principle of least privilege. When creating firewall rules, only allow necessary traffic to traverse the network.
  • Use hierarchical firewall policies, which will allow your organization to apply firewall policies to the organization and folder levels. Invoking hierarchical policy structure promotes consistency across organizational resources and the firewalls that protect them.
  • If your organization isn’t using their CSP’s firewall service, choose a FWaaS solution developed by a company that tailors their product to the specific CSP’s environment. There are many companies that provide FWaaS solutions to organizations.

🛡️ What is Software Delivery Shield (SDS)?

SDS is like a security team + smart kitchen + camera system built by Google Cloud to protect the software supply chain.

SDS includes:

  • Secure workstations: developers work in the cloud, not risky personal laptops
  • 📜 SBOMs (Software Bill of Materials): a list of everything used in your software — like a food label!
  • 🔍 Assured Open Source Software (OSS): only uses open-source tools that are verified and safe
  • 🚦 Dashboards: show you if something’s wrong with your app’s security

🕒 What does Shift Left mean?

Usually, security is added at the end, like putting the lock on the pizza box after delivery.

But shifting left means putting security at the beginning:

  • While you’re mixing ingredients
  • While the chef is cooking
  • While the kitchen is open

This helps catch problems early and fix them faster.

In short:

The software supply chain is everything involved in making software.
Software Delivery Shield helps keep that process safe from start to finish — like a super clean, secure pizza kitchen in the cloud.


Google Cloud NIST CSF Alignment

Info

This note aligns cloud tools with the five pillars of the NIST Cybersecurity Framework (CSF): Identify, Protect, Detect, Respond, and Recover.

🧱 NIST CSF Pillars Overview

graph LR
  ID[Identify] --> PR[Protect]
  PR --> DE[Detect]
  DE --> RS[Respond]
  RS --> RC[Recover]

🕵️ Identify

ToolDescription
IAMRole-based access control; bind roles to groups for easier management.
Cloud Asset Inventory35-day time-series inventory of GCP assets.
Cloud IdentityCentralized user/group management via IDaaS.
SCC (Identify)Asset discovery, inventory, and vulnerability scans.

Tip

Use Cloud Asset Inventory with IAM to track access and ensure least-privilege access.


🛡️ Protect

ToolPurpose
Cloud IDSDetects network-level intrusions and threats.
reCAPTCHA EnterprisePrevents bots using adaptive challenges.
Cloud ArmorDefends against DDoS and web application attacks.
BeyondCorp EnterpriseEnforces contextual security policies.
Identity-Aware ProxyImplements app-level access control.
Two-Factor Auth (2FA)Adds hardware/software-based secondary authentication.
Service ControlsPrevents data exfiltration within GCP.
Zero TrustValidates all access, regardless of origin.
SCC (Protect module)Detects threats and enforces security posture.

Warning

Adopt a zero-trust model — assume breach and continuously validate access.


🔍 Detect

ToolFunctionality
Cloud LoggingReal-time log collection and alerting.
Cloud MonitoringObservability and alerting for multicloud/hybrid environments.
SCC (Detect module)Consolidates threat detection and custom rule definitions.
Chronicle SIEMAggregates and analyzes security events in real-time.

Example

Use Cloud Logging to alert when service accounts are accessed outside business hours.


🧯 Respond

ToolRole in Incident Response
Chronicle SOARAutomates and orchestrates threat response workflows.
MandiantProvides forensic analysis, breach investigation, and remediation.

Tip

Combine Chronicle SIEM with SOAR to automate detection-to-response pipelines.


🔄 Recover

ToolCapability
Backup & RestoreManages incremental backups across all workloads.
Actifio GoSupports granular, app-aware, and bare-metal recovery.
Cyber InsuranceCovers financial and legal aspects of recovery from breaches.

Note

Test recovery processes regularly to ensure backup integrity and response readiness.

Key Takeaways

  • Use the NIST CSF to guide tool adoption and security maturity.
  • Map tools like SCC and Chronicle across multiple pillars.
  • Implement layered defenses, automate responses, and maintain tested recovery plans.

Perimeter Protection and Zero Trust

Perimeter Protection

  • Identity and Context based access
  • Firewalls
  • IDPS (Intrusion Detection and Prevention Systems)
  • VPNs Virtual Private Networks
  • ACLs Access Control Lists
  • DMZs

🔒 Firewall Rules Logs & VPC Flow Logs

Google Cloud’s Cloud Logging collects logs from resources for analysis via Logs Explorer.  Two key log types:


🚧 Firewall Rules Logs

Purpose: Track actions of firewall rules (allow/deny traffic). - Use Case: Verify if a rule blocks traffic from a specific IP range. - Details Logged:   - Source & destination IPs   - Protocols & ports   - Date & time - Access: Available in Cloud Logging when logging is enabled.


🌐 VPC Flow Logs

Purpose: Monitor network traffic in/out of VMs in a VPC. - Use Case: Analyze traffic patterns, detect threats, troubleshoot connectivity. - Details Logged:   - Source & destination IPs   - Ports & protocols   - Timestamps


Zero Trust

  • Verify Explicitly: every access request must be authenticated and authorized before access is granted to any resource.
  • Least Privilege Access: users, devices, and systems should only be granted the minimum access necessary to perform their tasks.
  • Assume Breach: Organizations embracing zero trust should operate under the assumption that a breach has already happened or will happen, and design their security measures accordingly.

Justification

 graph TD

    A[Perimeter Protection] --> B[Limitations in Modern Threat Landscape]
    B --> C[Need for Adaptive Security]
    C --> D[Zero Trust Principles]
    D --> E[Verify Explicitly]
    D --> F[Least Privilege Access]
    D --> G[Assume Breach]

Implementing Zero Trust

  • IAM: Identity and Access Management
  • MFA: Multi-Factor Authentication
  • Micro Segmentation: Divides a network into smaller, isolated segments to limit unauthorized access and reduce the potential attack surface.
  • Network Access Control (NAC): Policy Based Access Control enforces policy-based access control to network resources.

Context Aware Access Location

  • CASBs (Cloud Access Security Brokers): Act as intermediaries between cloud service users and cloud service providers, enabling organizations to enforce security policies and maintain visibility over cloud-based activities.
  • SASE Platforms: combine network and security functions into a single, cloud-based service.

Comparison of Traditional Perimeter Security Measures and Zero Trust Measures

CharacteristicTraditional Perimeter Security MeasuresZero Trust Measures
FocusCreates a strong barrier between the internal network and the outside worldVerifies access to resources on a case-by-case basis, regardless of location
Key TechnologiesFirewalls, IDS, IPS, Physical security controlsIdentity and access management (IAM), Multi-Factor Authentication (MFA), Micro-segmentation, Network Access Control (NAC), Continuous monitoring with Cloud Access Security Brokers (CASBs) and Secure Access Service Edge (SASE) platforms
BenefitsCan be relatively simple to implement and manageCan provide more comprehensive security and visibility for a large number of users than traditional perimeter security measures
Drawbacks     Can be difficult to protect against sophisticated attacks, Provide limited protection once an attacker is in the internal networkCan be more complex to implement and manage than traditional perimeter security measures

Evidence preservation and Incident Response

Digital Evidence (IoC):

  • Logs
  • hashes
  • malware
  • bad behavior
  • Ip Addresses

Evidence Preservation

  • Cloud storage
  • Google Backup
  • Google Docs

Techniques for preservation

Digital evidence preservation techniques Here are some best practices you can use when preserving digital evidence: ● Use disk imaging to maintain an original file. Create a bit-by-bit duplication of an evidence file. This lets you keep the original evidence file. ● Avoid doing any analysis on the original artifact, and the system as a whole by implementing write-blocking techniques. This will prevent data modifications on the original device and ensure data integrity during analysis. Anything done to the original artifact may prevent it from being accepted as legal evidence. ● During imaging, cryptographic hash values are created. A hash is a digital checksum. Your files can be identified by their hashes. If you change the file, the hash will also change. A changed hash can tell you if there’s been a change to the file. So, you can use the hash to ensure the integrity of the file as evidence. ● When comparing cloud storage and local storage, cloud storage has additional layers of security, so it’s more secure, and also safeguards your digital evidence files. ● Document the chain of custody by maintaining a detailed record of the device’s possession and handling to ensure its traceability. ● Document all preservation procedures, including the tools used, timestamps, and any relevant observations to provide transparency and support admissibility in court.


Incident Response members and coordination

  • Incident Manager
  • Lead Investigator
  • Communication Lead
  • Technical Specialist

📚 Resources


Penguinified by https://chatgpt.com/g/g-683f4d44a4b881919df0a7714238daae-penguinify