đź’Ą TRENDING: Security/products/assured workloads - Full Archive
Data Boundary via Assured Workloads
Accelerate your path to running more secure and compliant workloads on Google Cloud.
Data Boundary is part of our Sovereign Cloud solutions designed to help governments and enterprises achieve greater control, choice, and security in the cloud — without compromising functionality.
Configure regulated workloads in just a few clicks
Help prevent misconfigurations of required controls
Simplify your path to compliance
Help meet government cloud compliance requirements
Benefits
Compliance without compromise
Compliance without compromise
You don’t have to choose between supporting regulatory compliance and using the latest, most innovative cloud services.
Simplified security and compliance
Simplified security and compliance
Help manage the requirements for your regulated workloads with just a few clicks.
Reduced cost and risk
Reduced cost and risk
Reduce costs and risk through simplified management of required controls.
Key features
Key features of Assured Workloads
Data residency
To help comply with data residency requirements, Google Cloud gives you the ability to control the regions where data at rest is stored.Â
During Assured Workloads setup, you create an environment and select your compliance program. When you create resources in the environment, Assured Workloads restricts the regions you can select for those resources based on the compliance program you chose using Organization Policy.
The Google Cloud Data Location Service Specific Terms apply.
Cryptographic control over data access
Google Cloud applies encryption at rest and in transit by default. To gain more control over how data is encrypted, Google Cloud customers can use Cloud Key Management Service to generate, use, rotate, and destroy encryption keys according to their own policies.Â
Cryptographic control over data access is achieved through the use of Key Access Justifications (KAJ) together with our Cloud External Key Manager (EKM).
Assured Workloads configures the appropriate encryption services per workload depending on the compliance program you chose.
Assured Support
Regulated customers’ compliance obligations extend to support services. Assured Support is a value-added service to Premium or Enhanced Support to ensure only Google support personnel meeting specific geographical locations and personnel conditions support their workload when raising a support case or needing technical assistance.Â
By delivering the same features and benefits of Premium or Enhanced Support (including response times) with an added layer of controls and transparency, Assured Support helps customers meet compliance requirements without compromising on the level and quality of support.
Assured Workloads monitoring
Assured Workloads monitoring scans your environment in real time and provides alerts whenever organization policy changes violate the defined compliance posture. The monitoring dashboard shows which policy is being violated and provides instructions on how to resolve the finding.
We chose to deploy with Google Cloud Assured Workloads because it provides us with the security controls we need and helps address a wide range of compliance requirements. Our ability to meet requirements around the globe enables us to grow our business while reducing the overhead and complexities of the multinational compliance process.
David Williams, Cloud Manager, Iron Mountain
What's new
What’s new
Sign up for Google Cloud newsletters to receive product updates, event information, special offers, and more.
Documentation
Documentation
All features
Compliance programs
| FedRAMP Moderate | The FedRAMP Moderate controls support access controls for first level support personnel who have completed enhanced background checks. Additionally, customers can control what region their data should reside using an org policy. |
| FedRAMP High | The FedRAMP High platform controls support access controls for first- and second-level support personnel who have completed enhanced background checks and are located in the US. Data location controls are set to support US-only regions. |
| Criminal Justice Information Systems (CJIS) | The CJIS platform controls support access controls for first- and second-level support personnel who have completed state-sponsored background checks and are located in the US. Escorted session controls are also used to supervise and monitor support actions by non-adjudicated staff. Data location controls are set to support US-only regions. |
| Impact Level 2 (IL2) | The IL2 controls support access controls for first- and second-level support personnel who have completed enhanced background checks, are US persons, and are located in the US. Data location controls are set to support US-only regions. |
| Impact Level 4 (IL4) | The IL4 controls support access controls for first- and second-level support personnel who have completed enhanced background checks, are US persons, and are located in the US. Data location controls are set to support US-only regions. |
| Impact Level 5 (IL5) | The IL5 controls support access controls for first- and second-level support personnel who have completed enhanced background checks, are US persons, and are located in the US. Data location controls are set to support US-only regions. |
| International Traffic in Arms Regulations (ITAR) | The ITAR controls support access controls for first- and second-level support personnel who are US persons, and are located in the US. Data location controls are set to support US-only regions. |
| US Regions and Support | The US Regions and Support controls support access controls for first- and second-level support personnel who are US persons and are located in the US. Data location controls are set to support US-only regions. |
| EU Regions and Support | The EU Regions and Support controls support access controls for first- and second-level support personnel who are EU personnel based in the EU. Data location controls are set to support available EU regions. |
| EU Regions and Support with Sovereign Controls |







