Documentación de la transparencia de acceso
La Transparencia de acceso es parte del compromiso a largo plazo de Google con la transparencia y la confianza del usuario. La transparencia de acceso registra las acciones que toma el personal de Google cuando accede al contenido de los clientes almacenado en Google Cloud. Obtén más información.
Google Cloud proporciona varios controles de acceso administrativo que están diseñados para garantizar que el personal de Google no pueda acceder al contenido de los clientes sin tu consentimiento explícito. La Aprobación de acceso te permite aprobar o rechazar el acceso de los empleados de Google a tu contenido. Para obtener más información, consulta la documentación de la aprobación de acceso.
El objetivo de Key Access Justifications es brindarte visibilidad de una solicitud de una clave de encriptación administrada de forma externa, ya que incluye una justificación para esa solicitud. Para obtener más información, consulta Descripción general de Key Access Justifications.
Assured Workloads te permite proteger tus cargas de trabajo y acelerar tu recorrido hacia la ejecución de cargas de trabajo que cumplen con las normativas en Google Cloud. Para obtener más información, consulta la documentación de Assured Workloads.
Comienza tu prueba de concepto con un crédito gratis de USD 300
- Accede a Gemini 2.0 Flash Thinking
- Uso mensual gratuito de productos populares, incluidas las APIs de IA y BigQuery
- Sin cargos automáticos y sin compromisos
Recursos de documentación
Recursos
Videos relacionados
Securing your AI model development pipeline
Vertex AI Pipelines → https://goo.gle/41IIBSZ Binary Authorization → https://goo.gle/3VOTAGL Vertex AI Pipeline demo → https://goo.gle/4ghaHJE Are you concerned about AI models going rogue? Secure your AI development pipeline using Google Cloud and
Assured Workloads for EU Data Sovereignty
Assured Workloads → https://goo.gle/3WSM3VY When it comes to your data, you should decide who has access. In this episode of our series on Assured Workloads, Developer Advocate Carter Morgan shares a few ways Google Cloud’s Data Sovereignty protects
Cloud Storage Data Security and Sovereignty
Learn more → https://goo.gle/3H4mKZI Join us today and learn about a number of new Google Cloud storage capabilities which empower our customers with Data security and Data Sovereignty. In this session we'll discuss how we think about Data Security
Security in the Cloud
In this episode of Eyes on Enterprise Stephanie Wong invites Collin Frierson - Security and Compliance Specialist - to discuss security in the cloud. They’ll cover how an enterprise can protect themselves from phishing, offer an in-depth approach on
Security and Trust on Google Cloud (Cloud Next ‘19 UK)
Running your business in the cloud requires a high degree of confidence and trust in your provider. In this session, customers and security product leaders from across Google Cloud will describe how our infrastructure, apps, and services, including
Bringing You More Control: New Services for Data Security and Transparency (Cloud Next ‘19 UK)
When you run workloads with sensitive and regulated data in the cloud, you need options to protect and control that enterprise data. From Key Management to Access Transparency to HSMs, Google Cloud offers numerous ways to keep in control of your
Minimizing Insider Risk From Cloud Provider Administrators (Cloud Next '19)
The cloud gives you tremendous flexibility and power by allowing someone else to worry about managing your infrastructure. But with this external management comes new risks - how do you know whether you can trust what your cloud provider is doing
Shared Responsibility: What This Means for You as a CISO (Cloud Next '19)
As companies move to public cloud, they move to a new paradigm where they are no longer the sole actors that affect their security. The division of shared security responsibility between customers and providers varies depending on the type of
Learn about Google Cloud’s trust and security services — Next '19
Learn how Google Cloud provides security and trust both in and for the cloud in this ‘Next 19 session. Customers and security product leaders detail how Google Cloud’s infrastructure, apps and services work to deliver a secure and trusted cloud. They
Getting Real-Time access Logs with Access Transparency (Cloud Next '18)
When do you access my data, and how will I know?' is a question that troubles every cloud customer who cares about their data, and one that few cloud providers have an answer for. This talk reviews Google's robust data protection infrastructure, and
Security and Trust for Google Cloud (Cloud Next '18)
Running your business in the cloud requires a high degree of confidence and trust in your provider. In this session, customers and security product leaders from across Google Cloud will describe how our infrastructure, apps, and services, including