Multi-layered security

Operational & device security
We develop and deploy infrastructure software using rigorous security practices. Our operations teams detect and respond to threats to the infrastructure from both insiders and external actors, 24/7/365.

Internet communication
Communications over the Internet to our public cloud services are encrypted in transit. Our network and infrastructure have multiple layers of protection to defend our customers against Denial-of-service attacks.

Identity
Identities, users, and services are strongly authenticated with multiple factors. Access to sensitive data is protected by advanced tools like phishing-resistant Security Keys.

Storage services
Data stored on our infrastructure is automatically encrypted at rest and distributed for availability and reliability. This helps guard against unauthorized access and service interruptions.

Service deployment
Any application that runs on our infrastructure is deployed with security in mind. We don't assume any trust between services, and we use multiple mechanisms to establish and maintain trust. Our infrastructure was designed to be multi-tenant from the start.

Hardware infrastructure
From the physical premises to the purpose-built servers, networking equipment, and custom security chips to the low-level software stack running on every machine, our entire hardware infrastructure is Google-controlled, -secured, -built, and -hardened.
Our network
Google owns and operates one of the largest backbone networks in the world to connect our data centers. We use advanced software-defined networking and edge caching services to deliver fast, scalable, and consistent performance. When your traffic is on our network, it no longer transits the public Internet, making it less likely to be attacked, intercepted, or manipulated.

Data centers
Google data centers feature a layered security model with custom-designed electronic access cards, alarms, vehicle access barriers, perimeter fencing, metal detectors, and biometrics. The data center floor features laser beam intrusion detection.
Our data centers are monitored 24/7 by high-resolution interior and exterior cameras that can detect and track intruders. Only approved employees with specific roles may enter. Fewer than one percent of Googlers will ever step foot in one of our data centers.
Watch video: Google data center security Watch video: Take a virtual tour of a Google data center
Continuous availability
Infrastructure underpins how Google Cloud delivers services that meet our high standards for performance, resilience, availability, correctness, and security. Design, operation, and delivery all play a role in making services continuously available.
Read the whitepaper
Get started
Work with Google
Tell us about your business, and our experts will help you build the right solution for your needs.
Work with a partner
Choose one of our global partners to integrate our services with your current security operations, add functionality and specific expertise in data protection, identity and user protection, infrastructure security, scanning, monitoring, logging, and more.
Interested in becoming a partner? Apply here.