本文档介绍了在 Google Cloud中部署一组基础资源的最佳实践。云基础是资源、配置和能力的基准,使公司能够采用Google Cloud 来满足其业务需求。设计良好的基础可让您的环境中的所有工作负载实现一致的治理、安全控制、扩缩、可见性和对共享服务的访问权限。 Google Cloud 部署本文档中介绍的控制和治理后,您可以将工作负载部署到 Google Cloud。
企业基础蓝图(以前称为安全基础蓝图)适用于负责设计 Google Cloud上的企业级环境的架构师、安全从业人员和平台工程团队。此蓝图包含以下内容:
[[["易于理解","easyToUnderstand","thumb-up"],["解决了我的问题","solvedMyProblem","thumb-up"],["其他","otherUp","thumb-up"]],[["很难理解","hardToUnderstand","thumb-down"],["信息或示例代码不正确","incorrectInformationOrSampleCode","thumb-down"],["没有我需要的信息/示例","missingTheInformationSamplesINeed","thumb-down"],["翻译问题","translationIssue","thumb-down"],["其他","otherDown","thumb-down"]],["最后更新时间 (UTC):2025-05-15。"],[],[],null,["# Enterprise foundations blueprint\n\nThis document describes the best practices that let you deploy a foundational\nset of resources in Google Cloud. A cloud foundation is the baseline of\nresources, configurations, and capabilities that enable companies to adopt\nGoogle Cloud for their business needs. A well-designed foundation enables\nconsistent governance, security controls, scale, visibility, and access to\nshared services across all workloads in your Google Cloud environment. After you\ndeploy the controls and governance that are described in this document, you can\ndeploy workloads to Google Cloud.\n\nThe *enterprise foundations blueprint* (formerly known as the *security\nfoundations blueprint*) is intended for architects, security practitioners, and\nplatform engineering teams who are responsible for designing an enterprise-ready\nenvironment on Google Cloud. This blueprint consists of the following:\n\n- A [terraform-example-foundation GitHub\n repository](https://github.com/terraform-google-modules/terraform-example-foundation) that contains the deployable Terraform assets.\n- A guide that describes the architecture, design, and controls that you implement with the blueprint (this document).\n\nYou can use this guide in one of two ways:\n\n- To create a complete foundation based on Google's best practices. You can deploy all the recommendations from this guide as a starting point, and then customize the environment to address your business' specific requirements.\n- To review an existing environment on Google Cloud. You can compare specific components of your design against Google-recommended best practices.\n\nSupported use cases\n-------------------\n\nThe enterprise foundation blueprint provides a baseline layer of resources and\nconfigurations that help enable all types of workloads on Google Cloud.\nWhether you're migrating existing compute workloads to Google Cloud,\nbuilding containerized web applications, or creating big data and machine\nlearning workloads, the enterprise foundation blueprint helps you build your\nenvironment to support enterprise workloads at scale.\n\nAfter you deploy the enterprise foundation blueprint, you can deploy workloads\ndirectly or deploy additional blueprints to support complex workloads that\nrequire additional capabilities.\n\nA defense-in-depth security model\n---------------------------------\n\nGoogle Cloud services benefit from the underlying\n[Google infrastructure security design](/docs/security/infrastructure/design).\nIt is your responsibility to design security into the systems that you build on\ntop of Google Cloud. The enterprise foundation blueprint helps you to\nimplement a defense-in-depth security model for your Google Cloud services\nand workloads.\n\nThe following diagram shows a defense-in-depth security model for your\nGoogle Cloud organization that combines architecture controls, policy\ncontrols, and detective controls.\n\nThe diagram describes the following controls:\n\n- **Policy controls** are programmatic constraints that enforce acceptable resource configurations and prevent risky configurations. The blueprint uses a combination of policy controls including infrastructure-as-code (IaC) validation in your pipeline and organization policy constraints.\n- **Architecture controls** are the configuration of Google Cloud resources like networks and resource hierarchy. The blueprint architecture is based on security best practices.\n- **Detective controls** let you detect anomalous or malicious behavior within the organization. The blueprint uses platform features such as Security Command Center, integrates with your existing detective controls and workflows such as a security operations center (SOC), and provides capabilities to enforce custom detective controls.\n\nKey decisions\n-------------\n\nThis section summarizes the high-level architectural decisions of the\nblueprint.\n\nThe diagram describes how Google Cloud services contribute to key\narchitectural decisions:\n\n- **Cloud Build:** Infrastructure resources are managed using a GitOps model. Declarative IaC is written in Terraform and managed in a version control system for review and approval, and resources are deployed using Cloud Build as the continuous integration and continuous deployment (CI/CD) automation tool. The pipeline also enforces policy-as-code checks to validate that resources meet expected configurations before deployment.\n- **Cloud Identity:** Users and group membership are synchronized from your existing identity provider. Controls for user account lifecycle management and single sign-on (SSO) rely on the existing controls and processes of your identity provider.\n- **Identity and Access Management (IAM):** Allow policies (formerly known as IAM policies) allow access to resources and are applied to groups based on job function. Users are added to the appropriate groups to receive view-only access to foundation resources. All changes to foundation resources are deployed through the CI/CD pipeline which uses privileged service account identities.\n- **Resource Manager:** All resources are managed under a single organization, with a resource hierarchy of folders that organizes projects by environments. Projects are labeled with metadata for governance including cost attribution.\n- **Networking** : Network topologies use Shared VPC to provide network resources for workloads across multiple [regions](/docs/geography-and-regions#regions_and_zones) and zones, separated by environment, and managed centrally. All network paths between on-premises hosts, Google Cloud resources in the VPC networks, and Google Cloud services are private. No outbound traffic to or inbound traffic from the public internet is permitted by default.\n- **Cloud Logging**: Aggregated log sinks are configured to collect logs relevant for security and auditing into a centralized project for long-term retention, analysis, and export to external systems.\n- **Organization Policy Service:** Organization policy constraints are configured to prevent various high-risk configurations.\n- **Secret Manager:** Centralized projects are created for a team responsible for managing and auditing the use of sensitive application secrets to help meet compliance requirements.\n- **Cloud Key Management Service (Cloud KMS):** Centralized projects are created for a team responsible for managing and auditing encryption keys to help meet compliance requirements.\n- **Security Command Center:** Threat detection and monitoring capabilities are provided using a combination of built-in security controls from Security Command Center and custom solutions that let you detect and respond to security events.\n\nFor alternatives to these key decisions, see\n[alternatives](/architecture/blueprints/security-foundations/summary#alternatives).\n\nWhat's next\n-----------\n\n- Read about [authentication and\n authorization](/architecture/blueprints/security-foundations/authentication-authorization) (next document in this series)."]]