With security zones, org policies, and IAM, GCP has a rich blend of tools to help prevent the exfiltration of data. We discuss how to use them together in this session.
Event schedule → http://g.co/next18
Watch more Security sessions here → http://bit.ly/2zJTZml
Next ‘18 All Sessions playlist → http://bit.ly/Allsessions
Subscribe to the Google Cloud channel! → http://bit.ly/NextSub
Publisher: Google Cloud
You can watch this video also at the source.