Securing Access to GCP Resources (Cloud Next ’18)

In this session, we will walk you through how to secure and control access to different types of GCP resources and track them through logging. Differently from on-prem perimeter-based networking security, GCP offers distributed defense in depth, in which different types of policies and conditions are enforced through different user traffic paths. This session will walk you through how to apply the right policies for each use case, and how to validate the enforcement through logging and monitoring mechanisms.

Event schedule →

Watch more Infrastructure & Operations sessions here →
Next ‘18 All Sessions playlist →

Subscribe to the Google Cloud channel! →

Duration: 44:20
Publisher: Google Cloud
You can watch this video also at the source.