WHY TRUST THE GOOGLE CLOUD [GCP SECURITY WEEK #3]
How to integrate the Google Cloud with existing and third party applications?
We are now in week 3 of our Google Cloud Security Weeks and would like to continue with the topic of user management in connection with cloud security and why should you trust the Google Cloud.
Many companies will surely ask themselves how it looks with already existing infrastructure and interoperability with, for example, Microsoft Office and Azure. For both points, there are already solutions from Google that cover these scenarios. On the one hand, Google Cloud Directory Sync helps to automatically synchronize users and groups from a local directory. If you rely on Microsoft technology and use the Azure Active Directory, there is also a very simple integration option with which the synchronization takes place completely automatically. Once you are done with the task, you have laid the foundation for all further activities.
What about Shadow IT?
We threw the term “Shadow IT” into the room in our first week. Now we would like to close the loop and say a few words about it. Many of you will have established a certain setup or a so-called application stack, which has also been approved by the security department. In order to be able to comply with the requirements, Google offers the possibility to release or block services and applications for users and groups for its products in the Admin Console. Especially with regard to cloud storage, it is possible to prevent the use of Google Drive, which means that data can be stored on the approved services only.
But of course, the variety of configuration options does not end here. Another aspect that is often mentioned is the fact that you now have the additional complexity of two accounts from an end user’s point of view. But again, Google allows you to configure SSO with other providers to ensure the best possible end user experience. This way, users get the familiar picture even if they just want to use Google services. Subsequently, it is possible with the setup to use other Google Cloud services and solutions, which also take into account classic data center scenarios and also offer the latest managed services and Big Data technologies.
We will continue at this point in the next post and discuss further aspects related to identities in the cloud in order to eliminate any concerns and thereby strengthen trust. So stay tuned and follow us in the coming weeks for more insights into the world of Google Cloud.
You may also like…
Google Cloud Unmanaged Accounts [GCP Security Week #1]
Do you know how many of your employees have a Google account with their business email address? A lot of companies will be able to give a rather vague answer to this simple…
Unmanaged Accounts [GCP Security Week #2]
In the second part of our Google Cloud Security Weeks, we continue with the topic “unmanaged accounts” and address the question “How do I get back control” Last week we talked about…
GCP Security Week #4
Week 4 of our Google Cloud Security Weeks started and we would like to give you some more interesting insights into the Google Cloud. Last time we talked about services that can be blocked or unblocke…