Cloud Firewall icon

Cloud Firewall

Scalable, cloud-first firewall service

A cloud-first NGFW with advanced threat protection and operational simplicity

Now introducing Cloud NGFW capabilities with the new Cloud Firewall Plus tier.

New customers get $300 in free credits to spend on Google Cloud. 


Features

Distributed, cloud-first firewall service

Cloud Firewall’s fully distributed, stateful inspection firewall engine is built natively into our software defined networking fabric and enforced at each workload.

Advanced threat protection

Cloud Firewall offers a cloud-first, market-leading, easy to deploy Intrusion Prevention System powered by Palo Alto Networks for inline protection against malware, spyware, and command-and-control attacks on your network. 

Simplified configuration and deployment

Network firewall policies are global by default and apply to all regions. Define policies at the organization, folder, and project levels with hierarchical firewall policies.

Granular control and micro-segmentation

Leverage IAM-governed tags to define granular control for both north-south and east-west traffic, down to a single VM, across VPCs and organizations. 

Context-aware and dynamic objects for firewall rules

Policy objects, such as Google Cloud Threat Intelligence lists, domain name (FQDN) objects, and geo-location objects, provide advanced protection for firewall rules. These objects are curated by Google, constantly updated, and automatically applied in firewall rules that call them. 

Cloud Firewall tiers

FeatureCloud Firewall EssentialsCloud Firewall StandardCloud Firewall Plus

Global and regional network firewall policy

Tag integration

Stateful inspection

Address groups

Google Cloud Threat Intelligence

FQDN objects

Geo-location filtering

Intrusion Prevention System (IPS)

TLS decryption

Global and regional network firewall policy

Tag integration

Stateful inspection

Address groups

Google Cloud Threat Intelligence

FQDN objects

Geo-location filtering

Intrusion Prevention System (IPS)

TLS decryption

How It Works

To use Cloud Firewall, you’ll first create a firewall policy. Then you'll be able to configure rules to help protect your cloud workloads against both internal and external attacks and meet compliance requirements. 

Security illustration

Common Uses

Detect and prevent advanced threats

Inline Intrusion Prevention System (IPS)

Cloud Firewall Plus offers a cloud-first, market-leading, easy to deploy Intrusion Prevention System (IPS). It helps prevent malware, spyware, and command-and-control attacks on your network by inspecting both TLS and non-TLS traffic.

Architecture diagram for Cloud Firewall Plus

    Inline Intrusion Prevention System (IPS)

    Cloud Firewall Plus offers a cloud-first, market-leading, easy to deploy Intrusion Prevention System (IPS). It helps prevent malware, spyware, and command-and-control attacks on your network by inspecting both TLS and non-TLS traffic.

    Architecture diagram for Cloud Firewall Plus

      Secure traffic based on domain names

      Domain name (FQDN) based objects

      Achieve advanced protection with dynamic policies that filter traffic from domains, even as the underlying IP addresses change. 

      Learn more about the FQDN feature

        Domain name (FQDN) based objects

        Achieve advanced protection with dynamic policies that filter traffic from domains, even as the underlying IP addresses change. 

        Learn more about the FQDN feature

          Filter traffic based on location

          Geo-location objects

          Simplify the process of managing traffic to designated countries without the need to specify individual IP addresses.

          Learn more about the geo-location feature

            Geo-location objects

            Simplify the process of managing traffic to designated countries without the need to specify individual IP addresses.

            Learn more about the geo-location feature

              Integrate with threat intelligence data

              Threat Intelligence for Cloud Firewall

              Block traffic based on curated lists of threat intelligence data, such as known malicious IPs and domains. Allow public IPs that your service uses. These lists are managed by Google Cloud and aggregate data from various Google, third-party, and open-source feeds. 

              Learn more about the Threat Intelligence feature