See the Security Foundation solution announcement in the 2022 Security Summit opening keynote. Watch now.
Jump to

Security Foundation

An enterprise solution that includes Google Cloud recommended products and security capabilities to help organizations achieve a strong security posture and protections for their Google Cloud environment. 

Benefits

Proven products to achieve a strong security posture on Google Cloud

Easily consume security capabilities

Provides a packaged offering to easily adopt Google Cloud recommended products and security capabilities that help achieve a strong security posture for your cloud environment.

Alignment with security best practices

The solution aligns with Google Cloud security best practices to help meet your security and compliance objectives as you deploy workloads on Google Cloud.

Cost-effective package of security products

Provides security controls you need for data protection, network security, security monitoring, and much more to help make your deployments secure, and to do it cost-effectively.

Key features

A solution approach to help address your security needs

Security foundations blueprint alignment

Prescriptive guidance with products and capabilities aligned to Google Cloud security best practices using the security foundations blueprint guide and deployable terraform assets.

Comprehensive security controls for cloud

Provides a comprehensive set of security products to address specific use cases in data protection, network security, security monitoring, and much more in the enterprise journey toward cloud adoption and modernizing workloads.

Security suite overview

Google Cybersecurity Action Team validation

Our Google Cybersecurity Action Team (GCAT) reviewed and validated the solution and its product components to help you know you are applying best practices and robust security controls in your security transformation journey. 


Ready to get started? Contact us.

What's in it

The Security Foundation solution includes a foundational set of products across Identity & Security, Network Security, and Compute Management.