[[["易于理解","easyToUnderstand","thumb-up"],["解决了我的问题","solvedMyProblem","thumb-up"],["其他","otherUp","thumb-up"]],[["很难理解","hardToUnderstand","thumb-down"],["信息或示例代码不正确","incorrectInformationOrSampleCode","thumb-down"],["没有我需要的信息/示例","missingTheInformationSamplesINeed","thumb-down"],["翻译问题","translationIssue","thumb-down"],["其他","otherDown","thumb-down"]],["最后更新时间 (UTC):2025-05-15。"],[],[],null,["# Deploy the blueprint\n\nThis section describes the process that you can use to deploy the blueprint, its\nnaming conventions, and alternatives to blueprint recommendations.\n\nBringing it all together\n------------------------\n\nTo deploy your own enterprise foundation in alignment with the best practices\nand recommendations from this blueprint, follow the high-level tasks summarized\nin this section. Deployment requires a combination of prerequisite setup steps,\nautomated deployment through the\n[terraform-example-foundation](https://github.com/terraform-google-modules/terraform-example-foundation)\non GitHub, and additional steps that must be configured manually after the\ninitial foundation deployment is complete.\n\nAdditional administrative controls for customers with sensitive workloads\n-------------------------------------------------------------------------\n\nGoogle Cloud provides additional administrative controls that can help your\nsecurity and compliance requirements. However, some controls involve additional\ncost or operational trade-offs that might not be appropriate for every customer.\nThese controls also require customized inputs for your specific requirements\nthat can't be fully automated in the blueprint with a default value for all\ncustomers.\n\nThis section introduces security controls that you apply centrally to your\nfoundation. This section isn't intended to be exhaustive of all the security\ncontrols that you can apply to specific workloads. For more information on\nGoogle's security products and solutions, see\n[Google Cloud security best practices center](/security/best-practices).\n\nEvaluate whether the following controls are appropriate for your foundation\nbased on your compliance requirements, risk appetite, and sensitivity of data.\n\nNaming conventions\n------------------\n\nWe recommend that you have a standardized naming convention for your\nGoogle Cloud resources. The following table describes recommended\nconventions for resource names in the blueprint.\n\nAlternatives to default recommendations\n---------------------------------------\n\nThe best practices that are recommended in the blueprint might not work for\nevery customer. You can customize any of the recommendations to meet your\nspecific requirements. The following table introduces some of the common\nvariations that you might require based on your existing technology stack and\nways of working.\n\nWhat's next\n-----------\n\n- Implement the blueprint using the [Terraform example\n foundation](https://github.com/terraform-google-modules/terraform-example-foundation/tree/master) on GitHub.\n- Learn more about best practice design principles with the [Google Cloud Well-Architected Framework](/architecture/framework).\n- Review the [library of blueprints](/docs/terraform/blueprints/terraform-blueprints)\n to help you accelerate the design and build of common enterprise workloads,\n including the following:\n\n - [Import data from Google Cloud into a secured BigQuery data warehouse](/architecture/blueprints/confidential-data-warehouse-blueprint)\n\n - [Import data from an external network into a secured BigQuery data warehouse](/architecture/blueprints/secured-data-warehouse-blueprint-onprem)\n\n - [Deploy a secured serverless architecture using Cloud Run functions](/architecture/blueprints/serverless-functions-blueprint)\n\n - [Deploy a secured serverless architecture using Cloud Run](/architecture/blueprints/serverless-blueprint)\n\n- See [related solutions](/solutions) to deploy on top of your foundation\n environment."]]