VPC Service Controls documentation
VPC Service Controls lets you mitigate data exfiltration risks by isolating resources of multi-tenant Google Cloud services. With VPC Service Controls, you can enforce adaptive access control based on IP range or device trust for accessing Google Cloud resources from outside privileged networks. For more information, see Overview of VPC Service Controls.
Start your next project with $300 in free credit
Build and test a proof of concept with the free trial credits and free monthly usage of 20+ products.
Documentation resources
Guides
-
Set up a service perimeter using Google Cloud console
-
Add projects to a perimeter using Terraform
-
Design and architect perimeters
-
Manage dry run configurations
-
Design access levels
-
Configure ingress and egress rules
-
Allow access to protected resources from outside a perimeter
-
Create a scoped policy
-
Set up private connectivity to Google APIs and services
Concepts
Reference and resources
Related videos
How to secure your cloud with VPC Service Controls
Overview of VPC Service Controls → https://goo.gle/405HhIT How you can mitigate data exfiltration with VPC Service Controls → https://goo.gle/3zY4xhA Discover how to strengthen your Google Cloud security posture with VPC Service Controls. Join Martin
VPC Service Controls: How to segment your cloud projects in shared VPC
Google Cloud’s VPC Service Controls can help organizations mitigate data exfiltration from their Google Cloud managed services. VPC Service Controls (VPC-SC) creates isolation perimeters around cloud resources and networks in Google Cloud, helping
VPC Service Controls: Private IP support to create granular access controls
Google Cloud’s VPC Service Controls can help organizations mitigate data exfiltration from their Google Cloud managed services. VPC Service Controls (VPC-SC) creates isolation perimeters around cloud resources and networks in Google Cloud, helping
How to use dry run mode in VPC Service Controls
Google Cloud’s VPC Service Controls can help organizations mitigate data exfiltration from their Google Cloud managed services. VPC Service Controls (VPC-SC) creates isolation perimeters around cloud resources and networks in Google Cloud, helping
VPC Service Controls in a minute
VPC Service Controls → https://goo.gle/3h6I04N Best practices for creating a service perimeter → https://goo.gle/3wT7IQI Required roles → https://goo.gle/3zU7aMo VPC Service Controls allow you to manage your network and security perimeters to keep
What’s new for networking edge and security - part 2
Cloud Armor Preconfigured Rules→ https://goo.gle/3zpJVbM Cloud Armor Security Policies → https://goo.gle/3zkOCn6 VPC Service Controls Troubleshooter → https://goo.gle/3tXWpG9 Welcome back to What’s New in Networking where we keep you up-to-date on
Achieve zero-trust certificate issuance with CAS
Access Context Manager → https://goo.gle/3cfBJ7V Endpoint verification → https://goo.gle/3PdNsTa VPC Service Controls→ https://goo.gle/3aKg5bu Interactive tutorial → https://goo.gle/3UX9ZGo Are you moving your organization from on-premise PKI
Securing GCP Projects with VPC Service Controls
VPC Service Controls enables you to establish security perimeters around sensitive data in Google Cloud Platform services such as Google Cloud Storage and BigQuery. Join Max Saltonstall and Steve Soleimani as they show you how to protect your GCP
Protect your resources with VPC Service Controls
Overview → https://goo.gle/vpc-sc Ingress and Egress rules → https://goo.gle/ingress-egress-rules Google Cloud's VPC Service Controls is a security feature that allows developers to define fine-grained perimeter security around cloud resources and
VPC Service Controls, zero trust, & more!
Here to bring you the latest news in the Cloud is Priyanka Vergadia. • Zero trust is a must → https://goo.gle/3jjgIu3 • VPC Service Controls → https://goo.gle/38dquaO • Listen to the Blog → https://goo.gle/3zk20bO Chapters: 0:00 - Intro 0:13 - Zero
What’s new for networking edge and security
Cloud Armor → https://goo.gle/36E2pJx Cloud Armor Managed Protection Plus → https://goo.gle/3z6lu31 Cloud Armor DDoS response and bill protection → https://goo.gle/3rbFuyJ Welcome back to What’s New In Networking, where we keep you up-to-date with
How to mitigate data exfiltration risks with Google Cloud security controls
Learn how Commerzbank uses cloud controls like VPC Service Controls to restrict access to their production environment and mitigate data exfiltration risks. This conversational session will cover how you can build layers of defense for your cloud
Virtual Private Cloud in a minute
Virtual Private Cloud → https://goo.gle/3jHWOtB VPC (Virtual Private Cloud) is the managed networking service for your Google Cloud infrastructure, and the foundation for your network in the cloud. In this episode of Cloud Bytes, we show that VPC’s
Secure Data Pipelines using VPC Service Controls with Two Sigma
In this episode of Stack Chat, Tony Walker, Public Cloud Engineering from Two Sigma, shares how the company builds its data pipeline with the combination of GCP technologies and the company’s own native services to meet demands while maintaining
Prevent data exfiltration with Google Cloud's built-in controls
As attackers get creative, organizations need to employ a defense-in-depth approach to mitigate data exfiltration risks and reduce the rising cost of a breach. Join us to hear from Charles Schwab, and Commerzbank on their security journey to mitigate
How to use BigQuery Data Exfiltration
Event Threat Detection Conceptual Overview → http://goo.gle/2Y52xgK Security Command Center can help enterprises keep their data safe against unauthorized access and data exfiltration. In this episode of Getting Started with Security Command Center,
Security in the Cloud
In this episode of Eyes on Enterprise Stephanie Wong invites Collin Frierson - Security and Compliance Specialist - to discuss security in the cloud. They’ll cover how an enterprise can protect themselves from phishing, offer an in-depth approach on
How to Secure and Protect Your Data in Cloud Storage (Cloud Next '19)
In this session, we will discuss how cloud storage customers leverage the rich set of features and inbuilt security and privacy capabilities to build systems with state-of-the-art security. We'll talk about how our customers are using features such
Protecting Your Sensitive Data
Did you know that the average total cost of a data breach is $3.62 million? Learn more about how to prevent data exfiltration as senior product manager Chris Law and developer advocate Yufeng Guo walk us through a comprehensive approach involving