Get started with Assured Workloads by signing up for a free trial.
Accelerate your path to running more secure and compliant workloads on Google Cloud.
Configure regulated workloads in just a few clicks
Help prevent misconfigurations of required controls
Simplify your path to compliance
Help meet government cloud compliance requirements
Benefits
Compliance without compromise
You don’t have to choose between supporting regulatory compliance and using the latest, most innovative cloud services.
Simplified security and compliance
Help manage the requirements for your regulated workloads with just a few clicks.
Reduced cost and risk
Reduce costs and risk through simplified management of required controls.
Key features
To help comply with data residency requirements, Google Cloud gives you the ability to control the regions where data at rest is stored.
During Assured Workloads setup, you create an environment and select your compliance program. When you create resources in the environment, Assured Workloads restricts the regions you can select for those resources based on the compliance program you chose using Organization Policy.
The Google Cloud Data Location Service Specific Terms apply.
Google Cloud applies encryption at rest and in transit by default. To gain more control over how data is encrypted, Google Cloud customers can use Cloud Key Management Service to generate, use, rotate, and destroy encryption keys according to their own policies.
Cryptographic control over data access is achieved through the use of Key Access Justifications (KAJ) together with our Cloud External Key Manager (EKM).
Assured Workloads configures the appropriate encryption services per workload depending on the compliance program you chose.
Regulated customers’ compliance obligations extend to support services. Assured Support is a value-added service to Premium or Enhanced Support to ensure only Google support personnel meeting specific geographical locations and personnel conditions support their workload when raising a support case or needing technical assistance.
By delivering the same features and benefits of Premium or Enhanced Support (including response times) with an added layer of controls and transparency, Assured Support helps customers meet compliance requirements without compromising on the level and quality of support.
Assured Workloads monitoring scans your environment in real time and provides alerts whenever organization policy changes violate the defined compliance posture. The monitoring dashboard shows which policy is being violated and provides instructions on how to resolve the finding.
What's new
Sign up for Google Cloud newsletters to receive product updates, event information, special offers, and more.
Documentation
Understand key concepts, such as data residency, platform controls, personnel access controls, and encryption key management.
Use this guide to get started on how to set up and evaluate the core capabilities of Assured Workloads in your Google Cloud environment.
Set up a new Assured Workloads environment in Google Cloud Console for IL4 and CJIS compliance programs.
Set up a new Assured Workloads environment in Google Cloud Console for FedRAMP Moderate, FedRAMP High, and US Regions and Support compliance programs.
Set up a new Assured Workloads environment in Google Cloud Console for EU Regions and Support with optional Sovereign Controls.
Use cases
Apply security controls to an environment in support of compliance requirements.
All features
FedRAMP Moderate | The FedRAMP Moderate controls support access controls for first level support personnel who have completed enhanced background checks. Additionally, customers can control what region their data should reside using an org policy. |
FedRAMP High | The FedRAMP High platform controls support access controls for first- and second-level support personnel who have completed enhanced background checks and are located in the US. Data location controls are set to support US-only regions. |
Criminal Justice Information Systems (CJIS) | The CJIS platform controls support access controls for first- and second-level support personnel who have completed state-sponsored background checks and are located in the US. Escorted session controls are also used to supervise and monitor support actions by non-adjudicated staff. Data location controls are set to support US-only regions. |
Impact Level 2 (IL2) | The IL2 controls support access controls for first- and second-level support personnel who have completed enhanced background checks, are US persons, and are located in the US. Data location controls are set to support US-only regions. |
Impact Level 4 (IL4) | The IL4 controls support access controls for first- and second-level support personnel who have completed enhanced background checks, are US persons, and are located in the US. Data location controls are set to support US-only regions. |
Impact Level 5 (IL5) | The IL5 controls support access controls for first- and second-level support personnel who have completed enhanced background checks, are US persons, and are located in the US. Data location controls are set to support US-only regions. |
International Traffic in Arms Regulations (ITAR) | The ITAR controls support access controls for first- and second-level support personnel who are US persons, and are located in the US. Data location controls are set to support US-only regions. |
US Regions and Support | The US Regions and Support controls support access controls for first- and second-level support personnel who are US persons and are located in the US. Data location controls are set to support US-only regions. |
EU Regions and Support | The EU Regions and Support controls support access controls for first- and second-level support personnel who are EU personnel based in the EU. Data location controls are set to support available EU regions. |
EU Regions and Support with Sovereign Controls | The Assured Workloads for EU Regions and Support with Sovereign Controls support access controls for first- and second-level support personnel who are based in the EU, and provides data residency and data sovereignty controls for EU-based customers. Data location controls are set to support EU-only regions. |
Australia Regions and Support | The Australia Regions and Support controls restrict personnel access and technical support to persons based in five countries (US, UK, Australia, Canada, and New Zealand). Data location controls are set to support available Australia regions. |
Canada Regions and Support | The Canada Regions and Support controls support access controls for first- and second-level support personnel who are Canadian personnel based in Canada. Data location controls are set to support available Canadian regions. |
Israel Regions and Support | The Israel Regions and Support controls support access controls for first-level and second-level support personnel who are either security-cleared Israeli personnel located in Israel or US persons who have completed enhanced background checks located in the US. Data location controls are set to support Israel-only regions. |
Japan Regions | Data location controls are set to support available Japan regions. |
Healthcare & Life Sciences Controls | Data location controls are restricted to US regions. Services must have completed a HIPAA BAA & the HITRUST CSF, and support Data Residency at-rest in the US, CMEK, VPC-SC, and Access Transparency approvals and logging. |
Healthcare & Life Sciences Controls with US Support | Data location controls are restricted to US regions. Services must have completed a HIPAA BAA & the HITRUST CSF, and support Data Residency at-rest in the US, CMEK, VPC-SC, and Access Transparency approvals and logging. Support access controls are set for first- and second-level support personnel who are located in the US. |
Kingdom of Saudi Arabia Sovereign Controls for Multinationals | Sovereign Controls for Kingdom of Saudi Arabia (KSA) is specifically for non-Saudi domiciled organizations and is built on Google Cloud’s Class C-certified infrastructure. It provides data residency and data sovereignty controls in the KSA region. Data location controls are set to support KSA-only regions. |
Pricing
Assured Workloads and Assured Support pricing is based on consumption. Please contact sales for more information.
Partners
Deploy workloads with Assured Workloads using ISV solutions. The Google Cloud Ready initiative ensures compliance. Visit the Regulated & Sovereignty Solutions page for details.
Start building on Google Cloud with $300 in free credits and 20+ always free products.