Book Image

The Ultimate Guide to Building a Google Cloud Foundation

By : Patrick Haggerty
Book Image

The Ultimate Guide to Building a Google Cloud Foundation

By: Patrick Haggerty

Overview of this book

From data ingestion and storage, through data processing and data analytics, to application hosting and even machine learning, whatever your IT infrastructural need, there's a good chance that Google Cloud has a service that can help. But instant, self-serve access to a virtually limitless pool of IT resources has its drawbacks. More and more organizations are running into cost overruns, security problems, and simple "why is this not working?" headaches. This book has been written by one of Google’s top trainers as a tutorial on how to create your infrastructural foundation in Google Cloud the right way. By following Google’s ten-step checklist and Google’s security blueprint, you will learn how to set up your initial identity provider and create an organization. Further on, you will configure your users and groups, enable administrative access, and set up billing. Next, you will create a resource hierarchy, configure and control access, and enable a cloud network. Later chapters will guide you through configuring monitoring and logging, adding additional security measures, and enabling a support plan with Google. By the end of this book, you will have an understanding of what it takes to leverage Terraform for properly building a Google Cloud foundational layer that engenders security, flexibility, and extensibility from the ground up.
Table of Contents (10 chapters)

Chapter 8: Augmenting Security and Registering for Support

It’s hard to believe, but we’re down to our last two foundational layers: security and support. In a way, holding off on getting your support package in place until you are close to going live with production systems makes a bit of sense, but security? Zero trust security is something you have to do in layers, and that’s why we’ve been securing our foundation one step at a time since Chapter 2, IAM, Users, Groups, and Admin Access. I mean, the first thing we did was to set up our identity provider. Then, we configured the users and groups, got some administrative access in place, figured out who was paying for everything and who could control billing, set up our initial resource hierarchy, configured user access, built our initial network, and set up some logging and monitoring. Think about all the security that we have in place already.

In this final chapter, our goal is to review elements of...