Skip to content

Cloud computing

4 posts with the tag “Cloud computing”

Features in Google Cloud for Securing Virtual Machines(VMs)

Shielded VMs use verification on hardware IDs and chips to defend against Linux bootkits and rootkits and provides self-healing security features such as integrity monitoring and healing.

It uses Secure Boot, Virtual trusted platform module(vTPM)-enabled Measured Boot, and Integrity monitoring.

You can monitor your VMs in a few ways with Shielded VMs:

  • You can monitor the boot integrity of shielded VMs with cloud monitoring.
  • You can automatically take action on integrity failures with cloud functions.

These Virtual Machines use encryption-in-use and encrypt the data in memory. You provision this type of VM with the type N2D:

  • n2d-standard-2
  • n2d-standard-4
  • n2d-standard-8
  • n2d-standard-16
  • n2d-standard-32
  • n2d-standard-48
  • n2d-standard-64
  • n2d-standard-80
  • n2d-standard-96
  • n2d-standard-128
  • n2d-standard-224

VPC Service Controls can define perimeters around sets of services within a VPC and can have their access limited. Traffic that crosses perimeters have Ingress and Egress rules. This affords us the following benefits:

  • Unauthorized networks with stolen credentials are blocked
  • Data exfiltration blocked.
  • Safety net for misconfigured over-permissive IAM policies.
  • Honeypot perimetering and additional monitoring.
  • Extend perimeters to on-premiss networks
  • Context-aware access to resources

image

Comparison of Standard and Flexible App Engine Environments

Table of App Engine Distinguishing Features

Section titled “Table of App Engine Distinguishing Features”
ProductAccess GCP ServicesAny LanguageScalingScale to ZeroBackground threadsBackground ProcessesModify the RuntimeWebsocketsWrite to Disk
Standard🔴🔴🟢🟢🟢🔴🔴🔴Java: /tmp
Flexible🟢🟢🟢🔴🟢🟢🟢🟢🟢
SymbolMeaning
🟢Yes
🔴No

Contrasting Preemptible and Spot Virtual Machines(VMs)

Table of Preemptible vs Spot Distinguishing Features

Section titled “Table of Preemptible vs Spot Distinguishing Features”
ProductUnlimited Runtimepreemptive deletepreemptive pauseSLA CoverageCost ReductionMigrate to Standard VMRestart on EventLive Migration
Preemptible VMs🔴🔴🟢🔴🟢🔴🔴🔴
Spot VMs🟢🟢🟢🔴🟢🔴🔴🔴
SymbolMeaning
🟢Yes
🔴No

Complete List of Google Cloud Certified Professional Cloud Architecture Skills

When it comes to designing a cloud for business use-cases, there are a few key considerations that need to be taken into account.

Product strategies have a big impact on cloud architecture design.

Cloud-based launches require careful planning to ensure a successful outcome.

Applications that are designed to run in the cloud must be able to take advantage of the functionality, scalability and flexibility that the cloud offers.

For every cost-effective option for running an application, there are at least two other cost-ineffective ways to accomplish the same thing in a cloud.

Key considerations for communicating between cloud and on-premises networks and applications.

Keeping your data safe and secret is the goal of proper data handling, especially production and sensitive data.

Compliance, Regulations, Access Restrictions

Section titled “Compliance, Regulations, Access Restrictions”

Designing cloud architecture requires staying within industry compliance, legal regulation, and policy access restrictions. That involves careful consideration and arduous planning.

Trust no file, no connection, no application. Treat everything as untrusted as a potential layer of breach, act according to that and you’ll be fine.

Does our proof of concept have any measures of success other than a successful healthcheck? It should. What else are we missing?

Technical debt is the amount of time and effort required to fix or improve software that is not up to date or is poorly designed. It can accumulate over time as a result of shortcuts taken during development, such as using quick and dirty solutions instead of taking the time to do things properly.

What is required to ensuring high-availability in the cloud. Is availability one of your business needs?

Ensuring that the scaling process is efficient and cost effective and elastic.

Working to identify and mitigate potential sources of failure.

Google Compute Engine is a cloud computing service that provides virtual machines that run on Google infrastructure.

Google Kubernetes Engine (GKE) is a managed, production-ready environment for deploying containerized applications.

A platform that enables runs containerized applications in hybrid or multi-cloud environment, whether they are deployed on-premises or in the cloud.

Google Cloud Functions is a serverless computing platform that allows you to run code in the cloud without having to manage a server or cluster.

Handling Application configuration.

Considering infrastructure management tasks such as log rotation.

Stateful applications, application states, statelessness.

Message queuing, bottlenecks and performance.

Maintaining the accuracy and consistency of data over its entire lifecycle.

Set up alerts and view monitoring data for your projects via dashboards.

Object storage is a type of storage that is well-suited for storing large amounts of data that is unstructured or semi-structured.

Google Cloud Platform (GCP) offers a managed network attached storage (NAS) service called Filestore and volumes attached to compute based services such as GKE.

Knowledge of relational database creation, maintenance, backup, and related processes.

Managed relational databases meet certain needs that compute database engines do not.

Google Cloud Spanner is a relational database service that offers global horizontal scaling, strong consistency, and high availability. Basically Managed Vitesse.

Google BigQuery is a cloud-based big data analytics web service for processing very large read-only data sets.

Cloud Firestore is an auto-scaling document database for storing, syncing, and querying data for mobile and web apps.

Google Big Table is a distributed storage system for low-latency access to large amounts(petabytes) of structured data.

As data doesn’t need to be access as frequently, it can be time partitioned for cost-effective solutions.

Latency is a key consideration for accessing data in any kind of storage. Regional, zone, and CDN considerations must be made.

IP Addressing, CIDR ranges, Firewall Rules and Routers. Cloud Router, Cloud Armor, VPC subnet and VPC sharing.

Knowledge of how hybrid cloud networking a mix of on-premises, private cloud, and public cloud services are setup and maintained.

CDN, DNS Zones, Zone Peering, Service Registry

Section titled “CDN, DNS Zones, Zone Peering, Service Registry”

Additional services provided in GCP Networking.

Regional and Global Load Balancing have different use-cases. How GKE and provisions LBs.

Section titled “Legal and Security Centric Design Scrutiny”

All access is managed through IAM, it is relevant to every gcp service.

Understanding GCP’s encryption at-rest schema.

Understanding encryption in transit in GCP.

Ability to ascertain the needs of projects which need to control their own key management for data encryption.

Penetration Testing & Iam Policy Auditing

Full understanding of concepts like separation of duties, least privilege and Defense in Depth.

Information Technology Infrastructure Library Framework

Section titled “Information Technology Infrastructure Library Framework”

The Information Technology Infrastructure Library (ITIL) is a framework that provides a set of best practices for managing IT services.

The Health Insurance Portability and Accountability Act, or HIPAA, is a federal law that was enacted in 199 HIPAA protects the privacy of patients’ health information and establishes national standards for the security of electronic health information. The HITECH Act is a federal law that promotes the adoption and meaningful use of health information technology.

GDPR applies to any company that processes the personal data of EU citizens, regardless of where the company is located. It strengthens EU data protection rules by giving individuals more control over their personal data, and establishing new rights for individuals.

The Sarbanes-Oxley Act was enacted in 2002 in response to the Enron scandal. The Act includes provisions to protect investors from fraudulent accounting practices and to improve the accuracy and transparency of corporate disclosures. The Act also created the Public Company Accounting Oversight Board to oversee the auditing of public companies.

The Children’s Online Privacy Protection Act (COPPA) is a law that requires companies to get parental consent before collecting, using, or disclosing personal information from children under 1 COPPA also gives parents the right to review and delete their child’s personal information, and to refuse to allow companies to collect or use it.

Stackdriver is a cloud monitoring tool that provides comprehensive monitoring and logging for cloud-powered applications. It offers powerful features like monitoring dashboards, alerting, log management, and tracing. Stackdriver is a great tool for keeping track of the health and performance of your cloud-based applications.

Just use Harness. Cloud Deploy in GCP is $15 per pipeline per month.

Cloud build basics.

Reliability engineering via Cloud Ops: Logging, Monitoring, Alerting, Etc.

Designs need to deal with capacity overloads, they need to fail in a cascading manor, and reliability testing.

Incident Management, Analysis, and Reporting

Section titled “Incident Management, Analysis, and Reporting”

Identify Incident cause, Plan for fix remediation, and log the actions taken.

Create and Understand Software Development Lifecycle plans.

Fixing your technical processes by revisiting your Incident Response and Post-Mortem Culture

Fit your Technical Processes into the IT processes of your wider group. For example, creating AD groups and syncing them to GCP for IAM federation.

Business Continuity Planning and Disaster Recovery

Section titled “Business Continuity Planning and Disaster Recovery”

Architects wil be asked to help teams to be better prepared to run their app in a new environment from scratch.

The ability to deliver and set expectations with people who have an interest in the project you’re designing.

Understanding of Plan, Do, Study, Act.

Help develop internal skill-sets among the team.

Helping customers to get the most value from your services.

Resource planning, Cost estimation, budgeting, and cost control.

Familiar with HR Costs, Infrastructure costs, Operational Costs, and Capital Costs. Can contribute to optimizing these costs.

Create Development-and-Redevelopment-for-Cloud Strategies

Section titled “Create Development-and-Redevelopment-for-Cloud Strategies”

Ability to guide app developers to plan for redeveloping applications for cloud specific services.

Understanding APIs, RESTful and RPC. API Security familiarization and comprehension of resource limiting.

Vulnerability Testing, Unit Testing, Regression Testing, WebDriver Testing, HTTP and Healthcheck verifications.

Strategy for storing sensitivity data in the cloud.

gcloud, gsutil, bq, cbt, kubectl, pubsub emulator…

Awareness in local emulators for development reduction. Bigtable, Datastore, Firestore, Pub/Sub, Spanner.

Lift and Shift, Move and improve, or Rip and restore?

Storage Transfer Service, gsutil, Google Cloud Database Migration, Google Transfer Appliances, and 3rd party options.

Data Size, Redevelopment Time, Migration Time, Planning Time.

Integrating Cloud Systems with Existing Services

Section titled “Integrating Cloud Systems with Existing Services”

Migrating Applications and Data to Support a Solution

Section titled “Migrating Applications and Data to Support a Solution”

Planning Changing code and configuration to support shifts in platform differences.

Consider the size and type of data being migrated, the workload requirements, and the available budget. Other restrictions.

Ensuring that data is managed to stay in-compliance effectively and consistently across a migration.

Bucket structure, Roles and Access Controls. Time and Cost comprehension, transfer sequence, transfer methods.

Volume considerations, downtime considerations, replicate in the cloud for no-downtime migrations.

Understanding of BYOL models and pay-as-you-go models.

Planning Shared Networks in Tiered Projects, Planning VPCs, Planning Network Access Standards, Scaling & Performance Testing, Connectivity