Trust and security
Google Cloud's security model, world-scale infrastructure, and unique capability to innovate will help keep your organization secure and compliant.
Trusted cloud infrastructure
Take advantage of the same secure-by-design infrastructure, built-in protection, and global network that Google uses to protect your information, identities, applications, and devices. Our stack builds security through progressive layers that deliver true defense in depth at scale.
Encryption by default, at rest and in transit
"We chose Google because there are a number of security services that you can't get elsewhere, like Identity-Aware Proxy and encryption at rest by default."
Leonard Austin, CTO, RavelinRead the case study
We undergo independent verification of our security, privacy, and compliance controls to help you meet your regulatory and policy objectives. Find details on our full set of compliance offerings, like ISO/IEC 27001/27017/27018/27701, SOC 1/2/3, PCI DSS, VPAT (WCAG, U.S. Section 508, EN 301 549) and FedRAMP certifications, and alignment with HIPAA, GDPR, and CCPA, among others, in our compliance resource center.
Protecting the privacy of Google Cloud Platform and Google Workspace customers is a priority and codified in our Enterprise Privacy Commitments, which guide our security and privacy practices. Learn more about how we protect privacy and keep you in control in our privacy resource center.
We work to earn your trust through transparency. We state and adhere to a concrete set of trust principles that govern our approach to security. We only process data in accordance with our terms and data protection agreements and clearly outline our policies on responding to government requests.