Google Cloud Technical Brief

Similar documents
Using Trustwave SEG Cloud with Exchange Server

VMware AirWatch Secure Gateway Guide Securing Your Infrastructure

VMware AirWatch Secure Gateway Guide Securing Your Infrastructure

BIOMETRICS IN HEALTH CARE : A VALUE PROPOSITION FROM HEALTH CARE SECTOR

Project Overview for the Technical Compliance Monitoring System

Siebel Installation Guide for Microsoft Windows. Siebel Innovation Pack 2015, Rev. D November 2015

The future of patient care. 6 ways workflow automation will transform the healthcare experience

E-MARKETING WITH GOOGLE ANALYTICS. Peter Lo

Siebel Installation Guide for Microsoft Windows. Siebel Innovation Pack 2017 July 2017

Running a Bug Bounty Program

Transit Routing. Transit Routing in the ACI Fabric. This chapter contains the following sections: Transit Routing Use Cases, page 3

Security Evolution - Bug Bounty Programs for Web Applications OWASP. The OWASP Foundation Michael Coates - Mozilla

Recommendations on outsourcing to cloud service providers (EBA/REC/2017/03)

WASC/OWASP WAFEC From industry to community project

Patient Unified Lookup System for Emergencies (PULSE) System Requirements

LotusLive. Working together just got easier Online collaboration solutions for the working world

Vacancy Announcement

SOLICITATION OF INTEREST

RECOMMENDATIONS ON CLOUD OUTSOURCING EBA/REC/2017/03 28/03/2018. Recommendations. on outsourcing to cloud service providers

Russ Kuhn Scott Moore Esri

ONESOURCE FRINGE BENEFITS TAX ONESOURCE FBT INSTALLATION GUIDE 2017 STAND-ALONE INSTALLATION AND UPGRADE GUIDE. Thomson Reuters ONESOURCE Support

March 14, pm ET

U.S. Department of Defense: Defense Logistics Agency (DLA) achieves unmatched agility through telework and BYOD strategy

Washington State Patrol

Guide to Enterprise Telework and Remote Access Security (Draft)

Nationwide Job Opportunity ANG Active Guard/Reserve AGR Vacancy

Cybersecurity TEMP Body Example

Army Enterprise Service Desk (AESD)-ARCYBER Convergence: A Contributing Element in Today s Defensive Cyber Operations (DCO)

A Tool to Inject Credible Warfighter-Focused Non- Kinetic Attack Effects into the BMDS M&S Environment

LOE 1 - Unified Network

CYBERPATRIOT ONLINE COACHES AND MENTORS MEETING

Customer Training Catalog Course Descriptions FBB

Increasing security and convenience at Epic health systems

Companies like yours partner with AVI-SPL Service Solutions

Defense Solutions: Overview. Karl Terrey Natalie Feuerstein

MC Network Modernization Implementation Plan

Patient Safety Reporting System for Nursing Homes Patient Safety Authority Commonwealth of Pennsylvania. Government to Business (G to B)

Courts Service ICT Strategy Statement

Expanded IP Office Telecommuter Mode for use by remote Avaya Contact Center Select (ACCS) Agents

US Army Europe Joint Multinational Training Command

AFCEA Mission Command Industry Engagement Symposium

VMware AirWatch Guide for the Apple Device Enrollment Program (DEP) Using Apple's DEP to automatically enroll new devices with AirWatch MDM

Allworx Reach and Reach Link

A Guide On. Project Charter Process (PCP) Prepared by e-builder 31 January 2018

FPGA Accelerator Virtualization in an OpenPOWERcloud. Fei Chen, Yonghua Lin IBM China Research Lab

Schedule of Events. October 16-19, 2018 Gaylord Opryland Resort

Broward County, Florida

Vacancy Announcement

BUILD OPERATE SECURE DEFEND

The Value of Creating Simple and Seamless Collaboration

Appendix. Final Version of the Electronic Health Record (EHR) Survey Questionnaire

Public Safety and Security Response Exercise Evaluation Guide

THE STATE OF BUG BOUNTY

WISHIN Statement on Privacy, Security, and HIPAA Compliance - for WISHIN Pulse

MaRS 2017 Venture Client Annual Survey - Methodology

Siebel Bookshelf Workflow Guide 8.1 Upgrade

Coast Guard Cyber Command. Driving Mission Execution CAPT John Felker Deputy Commander, CGCYBERCOM August 2011

2018 NASS IDEAS Award Application State of Colorado

PEO C3T PD Cyber Operations & Defense

RFP for Mobile Application for IBEF. Request for Proposal [RFP]

ABM Industries Incorporated

STRENGTHENING THE NAVAL TRANSPORT PROTECTION CAPACITIES OF ROMANIAN GENDARMERIE

Cybersecurity United States National Security Strategy President Barack Obama

RESOLUTION MSC.298(87) (adopted on 21 May 2010) ESTABLISHMENT OF A DISTRIBUTION FACILITY FOR THE PROVISION OF LRIT INFORMATION TO SECURITY FORCES

12d Synergy Client Installation Guide

Software Requirements Specification

Vacancy Announcement

eprint MOBILE DRIVER User Guide

Health Cloud Implementation Guide

Defense Transformation

1. TF- CSIRT Open Meeting - Welcome from Chair, Baiba Kaskina Overview of the TI Review Working Group, Nicole Harris... 2

Keep on Keepin On Arkansas Continuity of Operations Program

ENABLING DIGITAL TRANSFORMATION WITH SECURE ENGAGMENT AND COLLABORATION

1. Lead Times. 2. Duration and Effective Date

NEW JERSEY TRANSIT POLICE DEPARTMENT

Vacancy Announcement

Built to Scale: Rolling out 100+ Drupal 8 Sites for Fairfax County Public Schools

Health Technology for Tomorrow

Installing and Configuring Siebel CRM Server Software on Linux

CRITICAL INCIDENT MANAGEMENT

Cloud Computing and Startups

JRSS Discussion Panel Joint Regional Security Stack

Getting the Most out of Business Process Outsourcing and Offshoring Initiatives with Desktop Virtualization WHITE PAPER

HIT Usability and Data Breaches. Ritu Agarwal University of Maryland

Report No. D September 25, Controls Over Information Contained in BlackBerry Devices Used Within DoD

Security Risk Analysis and 365 Days of Meaningful Use. Rodney Gauna & Val Tuerk, Object Health

September 28, Local Media Association Presents: Self-serve newspaper advertising platform answers mixed media need

The 8 Mistakes People Make When Selecting an Image Exchange Provider WHITEPAPER

PRIME Registry CONTACT THE AMERICAN BOARD OF FAMILY MEDICINE. phone:

Onboard. Design Specifications v1.0. Team Members. Liam Yafuso Robert Waite Diane Cordero Jacqueline Avis Daniel Tea

BioWatch Overview. Current Operations Future Autonomous Detection. June 25, 2013 Michael V. Walter, Ph.D.

Privacy Rio Grande Valley HIE Policy: P1. Last date Revised/Updated 02/18/2016

United Kingdom National Release Centre and Implementation of SNOMED CT

Coflight efdp Angelo Corsaro, Ph.D. Software Technologies Scientist

Castles in the Clouds: Do we have the right battlement? (Cyber Situational Awareness)

Signature: Signed by GNT Date Signed: 1/21/2014

OFFICE OF THE DIRECTOR OF NATION At INTELLIGENCE WASHINGTON, DC 20511

Integrated Nurse Call Solutions

Report No. DODIG March 26, Improvements Needed With Tracking and Configuring Army Commercial Mobile Devices

ATTACHMENT G-1 LOS ANGELES COUNTY REGIONAL ITS ARCHITECTURE CONSISTENCY SELF-CERTIFICATION FORM

Transcription:

Google Cloud Technical Brief As data and applications move to GCP so does the increased threat of web attacks like SQL injections, cross site scripting (XSS), hacking attempts, bad bots and application layer DDoS floods. While GCP includes a number of basic security features such as data encryption, authentication and vulnerability scanning, it still recommends using a specialized solution for protection against Web attacks, bots, and application layer DDoS. Incapsula protects Google-hosted applications from all web and DDoS attacks, filtering out malicious traffic before it reaches Google Cloud Platform. Incapsula can be deployed in a few minutes, and once configured, automatic daily updates of bot signatures and reputation lists offload the burden of learning and configuring security rules from your staff. Protection for all environments Incapsula covers any deployment model for GCP, including hybrid cloud environments. Clients that are migrating to GCP make a simple DNS change to enable their GCP deployments to benefit from the same level of protection as their existing on-premises deployments. Incapsula gives clients the ability to apply a consistent security model across their entire infrastructure on premises, private and public cloud. On-Premises Server Use Case #2 Use Case #3 Use Case #1 Legitimate Traffic Incapsula Network GCP Load Balancer Website or Application VMs Google Cloud Platform 1

Here are 3 common examples of how Incapsula secures and protects GCP users: Use Case 1: With Google Load Balancer Incapsula complements Google security services by providing an additional layer of protection in front of the traffic before it reaches GCP. After Incapsula is deployed, attacks are mitigated before they can reach the GCP servers. To start, Google provides an IP address that can be found on the Load Balancing control panel. Google provides GCP load balancer IP address 2

To begin the configuration process with Incapsula, it is necessary to create a DNS entry mapping the hostname to the GCP load balancer IP address (provided by Google) on the Cloud DNS control panel. User creates DNS entry mapping hostname to GCP Load Balancer IP Once the mapping exists in the DNS zone file, Incapsula will pull the load balancer IP address by performing an NS lookup on the load balancer DNS entry. Incapsula pulls the GCP load balancer IP 3

Once a site is successfully provisioned on Incapsula, it is assigned a unique CNAME record that is used both for pointing traffic to the Incapsula network and also to identify the Incapsula site when multiple applications point to the same site. All Incapsula sites are assigned a unique CNAME 4

Use Case 2: Hybrid deployments Incapsula is in front of all client applications, including GCP, in existing on-premises data centers, or in other cloud environments. As a result, the client gets a single application to monitor and enforce policies across all deployments. This ensures security policies are identical between GCP and the client s on-premises deployments, making migration of security architecture to GCP as simple as making a DNS change. Incapsula can load balance across hybrid GCP deployments In addition, GCP websites using Incapsula Website Protection for hybrid deployments are protected from any type of DDoS attack, including both network (layer 3 and 4) and application (layer 7) attacks. 5

Use Case 3: Without Google Load Balancer Clients can also use Incapsula DDoS Protection and Web Security services with Incapsula layer 7 load balancing by pointing their DNS settings to the Incapsula CNAME. Clients can use Incapsula Load Balancer by pointing their DNS settings to Incapsula CNAME 6

Incapsula Load Balancer distributes user requests among origin data centers and/or GCP alias names to achieve optimal performance and response time. In addition, it helps ensure high availability in the case of a malfunctioning server or data center by routing traffic to a healthy server. Incapsula Load Balancer distributes traffic across multiple GCP instances 7

In all use cases, Incapsula provides security and acceleration at the web application level by mitigating all types of attacks in real time, before they reach GCP. Incapsula dashboard shows traffic security events in real-time 8